| Summary: | forbid old Ciphers, KexAlgorithms and MACs by default | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | kolAflash |
| Component: | Miscellaneous | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | enhancement | CC: | djm |
| Priority: | P5 | ||
| Version: | 6.6p1 | ||
| Hardware: | Other | ||
| OS: | Linux | ||
|
Description
kolAflash
2015-01-08 05:38:57 AEDT
An alternative approach could be a warning, if those old ones are in use. Putty (graphical SSH client) currently already warns about ciphers arcfour and des by default. Nevertheless Putty also still lacks a default warning for 3des and all the others mentioned here. http://www.chiark.greenend.org.uk/~sgtatham/putty/ We continually review the defaults and deprecate unsafe crypto as fast as we feel we can, but we need to ship an SSH implementation that works with others out there. The default algorithms that are selected (ecdh curve25519 / aes-ctr / umac-64-etm) are quite safe and there is no downgrade attack. There is no realistic threat against the NIST EC curves, nor against hmac-md5. You're welcome to make these changes to you own configurations. I don't know any halfway recent SSH implementation that shouldn't work without these. Nevertheless: What about a user-warning in interactive mode? closing resolved bugs as of 8.6p1 release |