Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Request: disable weak and suspect crypto #304

Open
wolfgangrupprecht opened this issue May 17, 2024 · 3 comments
Open

Request: disable weak and suspect crypto #304

wolfgangrupprecht opened this issue May 17, 2024 · 3 comments

Comments

@wolfgangrupprecht
Copy link

Crypto flaws and suspect crypto are hard for the normal user to understand or even easily research. It would be nice if the out of the box defaults were to disable any suspect or weak crypto. The attached file is the log of "ssh-audit" run against dropbear_2024.85.

ssh-audit.log

@WolfWings
Copy link

Not a developer on this project, but I try to help issues along in projects I use when I spot things!

So tossing this over the wall without even stripping out the ANSI escape codes which make the file gibberish here on github is not the most approachable to getting this worked efficiently, and this could likely have been better handled as a pull request instead.

This 'audit' is very subjective and pushes for as many restrictions as possible even when there's not a large corpus of evidence for some of the suggestions or when the items in question are still mandatory to the protocol.

  • NIST ECDSA curves have no alternative and are widely deployed and used by a lot of systems; their status has been an ongoing debate for decades now with no conclusive evidence they're vulnerable in roughly 20 years.
  • diffie-hellman-group14-sha1 has been disabled in OpenSSH since 8.2 (released in early 2020) by default, and they'll be removing it entirely soon, so 100% agreed that should get tossed from the default configuration and likely the whole codebase.
  • diffie-hellman-group14-sha256 is mandatory to the SSH protocol on the latest RFCs that deprecate diffie-hellman-group14-sha1.
  • ssh-rsa should indeed be disabled by default, OpenSSH has since 8.8 released in 2021 because it is indeed broke as a joke.
  • hmac-sha1 is mandatory to the SSH protocol, and while sha1 is considered compromised as a hash itself, it's use in an HMAC construct is still considered valid and safe because HMAC does not rely on the collision-resistance of the hash used.
  • diffie-hellman-group16-sha512 should be added if/when possible, yes.
  • There's no explanation for why adding the 'twofish' ciphers are suggested? Reinforcing that this 'audit' tool is subjective not objective in nature.
  • Adding the "GCM" variants of AES is not mentioned, which again more 'why twofish and not this?' subjective vs objective implication.

The above should hopefully help whatever dev picks this up at least know what's in the attached audit log.

@mkj
Copy link
Owner

mkj commented May 24, 2024 via email

@M95D
Copy link
Contributor

M95D commented Jul 21, 2024

I have a PR opened for OpenWrt Dropbear package. I added almost all config options available, including all crypto options.
May I ask those of you who understand crypto better than me, to review the defaults and comments in the Config.in ? (Crypto options are at the end.)

PR

Config.in

Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants