Your Peace of Mind is our Commitment

Contact Us English Recent Articles

SSH Security Advisory

A minor problem has been discovered in the RSA signature handling functions of SSH Secure Shell and F-Secure SSH. Customers with a valid maintenance subscription should contact us for an upgraded version of SSH Secure Shell or F-Secure SSH that address the problem.

Problem

The handling of RSA signatures is faulty and may expose the users that use RSA keys with SSH Secure Shell or F-Secure SSH to a potential attack. Launching such an attack would be highly impractical and the risk is considered minor.

To conduct a successful attack, the attacker would need to have the public key and would need to pre-compute the signature data so that it looks like a valid PKCS#1signature. This is a non-trivial task to perform and according to analysis it requires a minimum of 267 RSA algorithm operations. Since the RSA algorithm is computationally fairly intensive, the time to undertake such an attack renders it impractical.

This problem however needs to be corrected by a maintenance release.

Fix

New versions of SSH Secure Shell that include the fix for the bug have been generated with version numbers 3.2.5 (for the 3.2 series) and 3.1.8 (for the 3.1 series).

The following versions of F-Secure SSH include the fix for the bug:

Who is Affected

The discovered bug affects all RSA algorithm operations performed by SSH Secure Shell clients and servers for recent versions (3.1 and 3.2 series) and F-Secure SSH versions earlier than those listed above.

More precisely the affected scenarios are:

SSH usage scenarios that are not affected:

In effect, most users and customers who run the SSH servers with default settings (ie. DSA host keys) and use password authentication need not worry. However, to be on the safe side it is suggested that they also consider upgrading.