OpenSSH Security and SHA1
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
openssh (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
We should enhance Security by disabling SHA1 or, if not possible (older Clients) by changing the KexAlgorithms, Ciphers and MACs order.
For e.g. by :
1. If we add Support for older Clients we should change this:
#### OpenSSH Security ####
KexAlgorithms <email address hidden>
Ciphers <email address hidden>,<email address hidden>,<email address hidden>
MACs <email address hidden>,<email address hidden>,<email address hidden>,<email address hidden>
2. If we just Support new Clients we should change this :
[...]
HostKey /etc/ssh/
HostKey /etc/ssh/
[...]
#### OpenSSH Security ####
KexAlgorithms <email address hidden>
Ciphers <email address hidden>,<email address hidden>,<email address hidden>
MACs <email address hidden>,<email address hidden>,<email address hidden>,<email address hidden>
For more Information about my report go here:
information type: | Private Security → Public Security |
Hello Eldin, you're right that it is time to begin migrating away from SHA-1 in default OpenSSH configurations. However there is some historical baggage in parts of the launchpad infrastructure that prevented upgrading algorithms earlier. (Strictly speaking, the defaults aren't tied to launchpad but a configuration that doesn't allow developers to work out of the box is less than ideal.)
Some related bugs that might help explain the situation: /bugs.launchpad .net/ubuntu/ +source/ openssh/ +bug/1445620 /bugs.launchpad .net/ubuntu/ +source/ openssh/ +bug/1445624 /bugs.launchpad .net/ubuntu/ +source/ openssh/ +bug/1445625
https:/
https:/
https:/
A site with many general guidelines that may influence more than just default keysize and hash selections: https:/ /stribika. github. io/2015/ 01/04/secure- secure- shell.html
And, of course, whatever we select should be tested against Cisco gear, since there's always a bug or two with every openssh configuration change that prevents people from logging into or using Cisco equipment.
Colin, is it feasible to start making algorithm changes yet?
Thanks