| Summary: | Will future versions of openssh not support DHE because of "dheater" vulnerability :CVE-2002-20001? | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | renmingshuai <rmsh1216> |
| Component: | sshd | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED FIXED | ||
| Severity: | enhancement | CC: | djm |
| Priority: | P5 | ||
| Version: | 8.8p1 | ||
| Hardware: | Other | ||
| OS: | All | ||
|
Description
renmingshuai
2022-02-11 14:57:39 AEDT
Not based on that attack, it's AFAIK a denial of service only that is already mitigated by existing measures in sshd including LoginGraceTime and MaxStartups. Is it a vulnerability in DHE algorithm protocol, not in openssh? It's probably an intrinsic issue to any cryptographic key agreement protocol that an attacker can cause the server to do useless work. I don't think ECDSA or any of the PQ KEM algorithms will be any less susceptible, though they are faster so the impact is less. OpenSSH 9.3 has been released. Close resolved bugs |