Steve Sether
2019-Dec-26 03:02 UTC
Settable minimum RSA key sizes on the client end for legacy devices.
Recently I tried to turn on SSH on my 12 year old APC-UPS.? I soon discovered that I couldn't connect to it because my newer version of openssh doesn't support RSA key sizes below 1024 bits. I'd rather not dredge up a big fight, but I _would_ like to express a desire for some form of overriding the minimum key size.? Basically I've had to turn on telnet access again, lowering security.? The HTTPS protocol options on the device are old enough that no modern browser will connect to it either.? So essentially I'm left at going back to the mid 90s and use telnet, or HTTP to connect to this device. To me, not providing a way to over-ride the minimum key size is just a bit heavy-handed.? The vendor doesn't support this device anymore, and it's failed all attempts at replacing the 768 bit key with a 1024 bit one.? The firmware is upgraded to the last release in 2010. I understand that a 768 bit RSA key was factored 10 years ago, though with a very large computing effort, so it's vulnerable to a pretty expensive attack. I note that other legacy, potentially insecure options are supported via configuration changes. https://www.openssh.com/legacy.html Why isn't the same true for a minimum key size?? This device isn't exactly ancient at around 12 years old and a 10 year old firmware.? I'd imagine there's other hardware that has limited support for ssh key sizes that the current openssh won't connect to anymore.
David Newall
2019-Dec-26 06:07 UTC
Settable minimum RSA key sizes on the client end for legacy devices.
You can use openssl to generate a shorter key: $ openssl genprsa -out key.pem 768 $ ssh-keygen -y -f key.pem > key.pub # optional to get public key This works with a 768-bit RSA key (client: OpenSSH_7.2p2, OpenSSL 1.0.2g; server: OpenSSH_7.2p2, OpenSSL 1.0.2g) but not a 256-bit RSA key: I can generate the shorter key but the server requires a minimum of 768-bits. Hope this helps. -------- Forwarded Message -------- Subject: Settable minimum RSA key sizes on the client end for legacy devices. Date: Wed, 25 Dec 2019 21:02:36 -0600 From: Steve Sether <steve at sether.org> To: openssh-unix-dev at mindrot.org Recently I tried to turn on SSH on my 12 year old APC-UPS.? I soon discovered that I couldn't connect to it because my newer version of openssh doesn't support RSA key sizes below 1024 bits. I'd rather not dredge up a big fight, but I _would_ like to express a desire for some form of overriding the minimum key size.? Basically I've had to turn on telnet access again, lowering security.? The HTTPS protocol options on the device are old enough that no modern browser will connect to it either.? So essentially I'm left at going back to the mid 90s and use telnet, or HTTP to connect to this device. To me, not providing a way to over-ride the minimum key size is just a bit heavy-handed.? The vendor doesn't support this device anymore, and it's failed all attempts at replacing the 768 bit key with a 1024 bit one.? The firmware is upgraded to the last release in 2010. I understand that a 768 bit RSA key was factored 10 years ago, though with a very large computing effort, so it's vulnerable to a pretty expensive attack. I note that other legacy, potentially insecure options are supported via configuration changes. https://www.openssh.com/legacy.html Why isn't the same true for a minimum key size?? This device isn't exactly ancient at around 12 years old and a 10 year old firmware.? I'd imagine there's other hardware that has limited support for ssh key sizes that the current openssh won't connect to anymore. _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev at mindrot.org https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
Stuart Henderson
2019-Dec-26 12:35 UTC
Settable minimum RSA key sizes on the client end for legacy devices.
On 2019/12/25 21:02, Steve Sether wrote:> Basically I've had to turn on telnet access again, lowering security.Does it really lower security? The very old embedded OS is not going to be secure anyway, this type of device should only be used on a trusted private network. (New embedded OS are often not much better so I'd take the same view there). The RNG used to generate the key is probably rubbish too - I don't expect there to be all that much entropy in those 768 bits.. Not being able to use ssh is an annoyance but there are trade-offs to be made when using old hardware. The way I deal with these is to use telnet from a console server / "jump box" which itself runs modern sshd.> To me, not providing a way to over-ride the minimum key size is just a bit > heavy-handed.? The vendor doesn't support this device anymore, and it's > failed all attempts at replacing the 768 bit key with a 1024 bit one.The APC devices I used struggled with even a 768-bit key, I suspect handling numbers 2^256 times larger will be too hard on the CPU.> I note that other legacy, potentially insecure options are supported via > configuration changes. https://www.openssh.com/legacy.htmlMost of these (though not ssh-dss) relate to per-session keying. I think you can get away with a bit more weakness there (which would have to be attacked while the session is active and before rekeying) whereas short host keys are more of a long term risk. Note that other things were removed with no fallback available (also with good reason) - SSH1 for example.> Why isn't the > same true for a minimum key size?? This device isn't exactly ancient at > around 12 years old and a 10 year old firmware.? I'd imagine there's other > hardware that has limited support for ssh key sizes that the current > openssh won't connect to anymore.The other place I've seen it is on old switches but there is usually less reason to keep them than old power control hardware.> I'd rather not dredge up a big fight, but I _would_ like to express a > desire for some form of overriding the minimum key size.This can be done by recompiling if necessary. This restriction has been a pain for me at times but honestly I think it's for the best that it's been done.
Philipp Marek
2019-Dec-26 14:08 UTC
Settable minimum RSA key sizes on the client end for legacy devices.
>> I'd rather not dredge up a big fight, but I _would_ like to express a >> desire for some form of overriding the minimum key size. > > This can be done by recompiling if necessary. This restriction has been > a pain for me at times but honestly I think it's for the best that it's > been done.I may be alone with that opinion, but for such things I've always hoped for a global _variable_ whose location is available as a dynamic symbol in the ELF - so instead of getting all the sources (and all their dependencies, resp. the headers etc.) and reconfiguring (with all required research to get the right options) and recompiling, a 1-minute session with a hex editor to patch the 2 bytes would be enough... Yeah, some distributions make recompilation much easier (Debian has "apt-get source") - but still it's much more work than switching a few bytes.
Steve Sether
2019-Dec-26 20:17 UTC
Settable minimum RSA key sizes on the client end for legacy devices.
On 12/26/19 6:35 AM, Stuart Henderson wrote:> On 2019/12/25 21:02, Steve Sether wrote: >> Basically I've had to turn on telnet access again, lowering security. > Does it really lower security? The very old embedded OS is not going to > be secure anyway, this type of device should only be used on a trusted > private network. (New embedded OS are often not much better so I'd take > the same view there). > > The RNG used to generate the key is probably rubbish too - I don't expect > there to be all that much entropy in those 768 bits.. > > Not being able to use ssh is an annoyance but there are trade-offs to be > made when using old hardware. The way I deal with these is to use telnet > from a console server / "jump box" which itself runs modern sshd.For me personally?? No.? This is my home device, and I'm not really all that worried. For a lot of companies in the world? Absolutely.? This is primarily because it's extremely common to re-use administrator passwords.? Sniff some network traffic and raise your privilege level.? I think most people agree that the perimeter defense is not something you should rely on, and to use encryption inside your own network.? I understand that one can perform mitigations to lower the risk, but it just doesn't make sense to me that openSSH has decided to not support this. I've no doubt that someone could (likely) hack into the APC-UPS device with enough effort.? I don't personally know of any vulnerabilities for this device, (and I did just check).? So hacking into it would take some effort, finding an exploit, writing some kind of means to obtain a password from the device, etc.? Sniffing telnet and doing ARP poisoning attacks and the like is pretty trivial by comparison.? These are well known ways to obtain passwords that have been around for 20+ years, and the very reason ssh was invented in the 90s. Someone here suggested generating a 1024 bit RSA key offline and uploading it.? That's exactly what I tried doing, and the APC rejected it.? I suspect because, as you say below, the CPU isn't powerful enough for a 1024 bit key.>> To me, not providing a way to over-ride the minimum key size is just a bit >> heavy-handed.? The vendor doesn't support this device anymore, and it's >> failed all attempts at replacing the 768 bit key with a 1024 bit one. > The APC devices I used struggled with even a 768-bit key, I suspect > handling numbers 2^256 times larger will be too hard on the CPU. > >> I note that other legacy, potentially insecure options are supported via >> configuration changes. https://www.openssh.com/legacy.html > Most of these (though not ssh-dss) relate to per-session keying. > I think you can get away with a bit more weakness there (which would > have to be attacked while the session is active and before rekeying) > whereas short host keys are more of a long term risk. > > Note that other things were removed with no fallback available (also > with good reason) - SSH1 for example.ssh1 I can certainly understand, primarily because maintaining the protocol requires maintenance.? I don't see a huge amount of maintenance in a config option for minimum key size.? I also don't know that I've seen a device that only supports SSH1.? IIRC ssh2 came out in something like 1996, shortly after ssh1.? I'm not even sure if ssh1 really gained much popularity, since those early days it was just Tatu with his idea of encrypted telnet. I guess my main problem with setting this hard-coded is that it puts a LOT of control in the hands of the developers, and little or no control in the system administrators.? i.e. "We Know What's Good For You!".? Well, not for everyone.? One size rarely fits all.>> Why isn't the >> same true for a minimum key size?? This device isn't exactly ancient at >> around 12 years old and a 10 year old firmware.? I'd imagine there's other >> hardware that has limited support for ssh key sizes that the current >> openssh won't connect to anymore. > The other place I've seen it is on old switches but there is usually > less reason to keep them than old power control hardware. > >> I'd rather not dredge up a big fight, but I _would_ like to express a >> desire for some form of overriding the minimum key size. > This can be done by recompiling if necessary. This restriction has been > a pain for me at times but honestly I think it's for the best that it's > been done. >
Reasonably Related Threads
- Settable minimum RSA key sizes on the client end for legacy devices.
- Settable minimum RSA key sizes on the client end for legacy devices.
- Settable minimum RSA key sizes on the client end for legacy devices.
- [Bug 2523] New: An RSA private key file consistently gives "Badd Passphrase" errors, but worked before
- [Bug 2666] New: Ability to specify minimum RSA key size for user keys