https://bugzilla.mindrot.org/show_bug.cgi?id=2333
Bug ID: 2333
Summary: forbid old Ciphers, KexAlgorithms and MACs by default
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: [email protected]
Reporter: [email protected]
OpenSSH shouldn't allow old Ciphers, KexAlgorithms and MACs by default,
if they are not explicitly enabled in the the servers or users
configuration file.
(should be still possible to enable those by configuration file, if
user wishes so)
I'm thinking of disabling (by default) these:
Ciphers
arcfour256,
arcfour128,
3des-cbc,
arcfour
Maybe also disable by default:
Ciphers
blowfish-cbc,
cast128-cbc,
aes192-cbc,
aes256-cbc
I'm not quite sure about these.
Especially about blowfish. I guess it's deprecated by twofish?
Also disable these (by default):
KexAlgorithms
diffie-hellman-group-exchange-sha1,
diffie-hellman-group14-sha1,
diffie-hellman-group1-sha1
And disable these (by default):
MACs
[email protected],
[email protected],
[email protected],
[email protected],
[email protected],
hmac-md5,hmac-sha1,
[email protected],
hmac-sha1-96,
hmac-md5-96
Maybe NIST curves should be disabled by default too.
At least since OpenSSH has ed25519!
--
These are the algorithms I currently got enabled:
KexAlgorithms
[email protected],diffie-hellman-group-exchange-sha256
Ciphers
[email protected],[email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr
MACs
[email protected],[email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,[email protected]
These are my sources of information:
https://stribika.github.io/2015/01/04/secure-secure-shell.html
https://bettercrypto.org/static/applied-crypto-hardening.pdf
--
You are receiving this mail because:
You are watching the assignee of the bug.
_______________________________________________
openssh-bugs mailing list
[email protected]
https://lists.mindrot.org/mailman/listinfo/openssh-bugs