bugzilla-daemon at mindrot.org
2015-Jan-07 18:38 UTC
[Bug 2333] New: forbid old Ciphers, KexAlgorithms and MACs by default
https://bugzilla.mindrot.org/show_bug.cgi?id=2333
Bug ID: 2333
Summary: forbid old Ciphers, KexAlgorithms and MACs by default
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at mindrot.org
Reporter: kolAflash at kolahilft.de
OpenSSH shouldn't allow old Ciphers, KexAlgorithms and MACs by default,
if they are not explicitly enabled in the the servers or users
configuration file.
(should be still possible to enable those by configuration file, if
user wishes so)
I'm thinking of disabling (by default) these:
Ciphers
arcfour256,
arcfour128,
3des-cbc,
arcfour
Maybe also disable by default:
Ciphers
blowfish-cbc,
cast128-cbc,
aes192-cbc,
aes256-cbc
I'm not quite sure about these.
Especially about blowfish. I guess it's deprecated by twofish?
Also disable these (by default):
KexAlgorithms
diffie-hellman-group-exchange-sha1,
diffie-hellman-group14-sha1,
diffie-hellman-group1-sha1
And disable these (by default):
MACs
hmac-md5-etm at openssh.com,
hmac-sha1-etm at openssh.com,
umac-64-etm at openssh.com,
hmac-sha1-96-etm at openssh.com,
hmac-md5-96-etm at openssh.com,
hmac-md5,hmac-sha1,
umac-64 at openssh.com,
hmac-sha1-96,
hmac-md5-96
Maybe NIST curves should be disabled by default too.
At least since OpenSSH has ed25519!
--
These are the algorithms I currently got enabled:
KexAlgorithms
curve25519-sha256 at libssh.org,diffie-hellman-group-exchange-sha256
Ciphers
chacha20-poly1305 at openssh.com,aes256-gcm at openssh.com,aes128-gcm at
openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
MACs
hmac-sha2-512-etm at openssh.com,hmac-sha2-256-etm at
openssh.com,hmac-ripemd160-etm at openssh.com,umac-128-etm at
openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,hmac-ripemd160 at
openssh.com
These are my sources of information:
https://stribika.github.io/2015/01/04/secure-secure-shell.html
https://bettercrypto.org/static/applied-crypto-hardening.pdf
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2015-Jan-07 19:10 UTC
[Bug 2333] forbid old Ciphers, KexAlgorithms and MACs by default
https://bugzilla.mindrot.org/show_bug.cgi?id=2333 --- Comment #1 from kolAflash at kolahilft.de --- An alternative approach could be a warning, if those old ones are in use. Putty (graphical SSH client) currently already warns about ciphers arcfour and des by default. Nevertheless Putty also still lacks a default warning for 3des and all the others mentioned here. http://www.chiark.greenend.org.uk/~sgtatham/putty/ -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2015-Jan-07 21:30 UTC
[Bug 2333] forbid old Ciphers, KexAlgorithms and MACs by default
https://bugzilla.mindrot.org/show_bug.cgi?id=2333
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |WONTFIX
CC| |djm at mindrot.org
--- Comment #2 from Damien Miller <djm at mindrot.org> ---
We continually review the defaults and deprecate unsafe crypto as fast
as we feel we can, but we need to ship an SSH implementation that works
with others out there. The default algorithms that are selected (ecdh
curve25519 / aes-ctr / umac-64-etm) are quite safe and there is no
downgrade attack.
There is no realistic threat against the NIST EC curves, nor against
hmac-md5.
You're welcome to make these changes to you own configurations.
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2015-Jan-08 09:53 UTC
[Bug 2333] forbid old Ciphers, KexAlgorithms and MACs by default
https://bugzilla.mindrot.org/show_bug.cgi?id=2333 --- Comment #3 from kolAflash at kolahilft.de --- I don't know any halfway recent SSH implementation that shouldn't work without these. Nevertheless: What about a user-warning in interactive mode? -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2021-Apr-23 04:58 UTC
[Bug 2333] forbid old Ciphers, KexAlgorithms and MACs by default
https://bugzilla.mindrot.org/show_bug.cgi?id=2333
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #4 from Damien Miller <djm at mindrot.org> ---
closing resolved bugs as of 8.6p1 release
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
Possibly Parallel Threads
- enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS
- enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS
- enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS
- SSH Weak Ciphers
- SSH Weak Ciphers