"Keystroke timing obfuscation" has been added to ssh(1) client in #OpenBSD -current.
This uses the recently added "ping@openssh.com" vendor extension described in the PROTOCOL file.
https://cvsweb.openbsd.org/src/usr.bin/ssh/PROTOCOL?annotate=HEAD
djm@ modified src/usr.bin/ssh/*: Add keystroke timing obfuscation to the client.
This attempts to hide inter-keystroke timings by sending interactive traffic at fixed intervals (default: every 20ms) when there is only a small amount of data being sent. It also sends fake "chaff" keystrokes for a random interval after the last real keystroke. These are controlled by a new ssh_config ObscureKeystrokeTiming keyword.
feedback/ok markus@
@brynet Excuse me my ignorance, but if I do not ask I will not know. Why does OpenBSD add such features? How does it improve my security?