Protection against Spectre, Meltdown, Rowhammer, RAMBleed and other side-channel attacks has been added to OpenSSH.
These recently uncovered attack methods can allow malicious actors to obtain passwords, encryption keys and other sensitive information from memory by leveraging bit flips or speculative execution.
OpenSSH, the free and open source version of the Secure Shell (SSH) tools designed for securely controlling devices and transferring data, now includes a mechanism designed to protect private keys at rest in memory, said OpenSSH developer Damien Miller.
Private keys, when not in use, are now encrypted with a symmetic key derived from a large “prekey” consisting of random data, Miller said. In order to obtain the protected private key, an attacker would first need to recover the entire prekey, which is not an easy task due to the bit error rates in current side-channel attack methods.
“Implementation-wise, keys are encrypted ‘shielded’ when loaded and then automatically and transparently unshielded when used for signatures or when being saved/serialised,” Miller explained. “Hopefully we can remove this in a few years time when computer architecture has become less unsafe.”
In the case of the recently disclosed RAMBleed, researchers demonstrated the impact of the attack by targeting OpenSSH and leaking a 2048-bit RSA key. However, they have highlighted that OpenSSH was merely a convenient target for demonstrating RAMBleed and it’s not more vulnerable compared to other software.
Related: Researchers Find a Dozen Undocumented OpenSSH Backdoors
Related: OpenSSH Vulnerability Exposes Servers to Brute Force Attacks
Related: OpenSSH Patches Serious Information Disclosure Flaw

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
