Passive network attackers can obtain private RSA host keys from vulnerable SSH servers by observing computational faults during connection establishment, allowing them to masquerade as compromised hosts and intercept sensitive data.
View full story…