SSH vulnerabilities Packet sizes during initial login reveal authentication methods username and password lengths number of RSA authorized_keys options successes, failures, and refusals