svn commit: r303716 - head/crypto/openssh

Slawa Olhovchenkov slw at zxy.spb.ru
Sun Aug 7 18:23:20 UTC 2016


On Sun, Aug 07, 2016 at 09:06:37PM +0300, Andrey Chernov wrote:

> On 07.08.2016 20:43, Andrey Chernov wrote:
> > On 07.08.2016 20:37, Slawa Olhovchenkov wrote:
> >> On Sun, Aug 07, 2016 at 08:34:55PM +0300, Andrey Chernov wrote:
> >>
> >>> On 07.08.2016 20:31, Andrey Chernov wrote:
> >>>> On 07.08.2016 19:14, Bruce Simpson wrote:
> >>>>> On 07/08/16 15:40, Warner Losh wrote:
> >>>>>> That’s a cop-out answer. We, as a project, need to articulate to our
> >>>>>> users, whom we care about, why this rather obnoxious hit to usability
> >>>>>> was taken. The answer must be more complete than “We just disabled
> >>>>>> it because upstream disabled it for reasons we’re too lazy to explain
> >>>>>> or document how to work around"
> >>>>>
> >>>>> Alcatel-Lucent OmniSwitch 6800 login broken (pfSense 2.3.2 which
> >>>>> accepted the upstream change, workaround no-go)
> >>>>>
> >>>>> [2.3.2-RELEASE][root at gw.lab]/root: ssh -l admin
> >>>>> -oKexAlgorithms=+diffie-hellman-group1-sha1 192.168.1.XXX
> >>>>> Fssh_ssh_dispatch_run_fatal: Connection to 192.168.1.XXX port 22: DH GEX
> >>>>> group out of range
> >>>>>
> >>>>
> >>>> DH prime size must be at least 2048, openssh now refuse lower values.
> >>>> Commonly used DH size 1024 can be easily broken. See https://weakdh.org
> >>>>
> >>> diffie-hellman-group1-sha1 use DH 1024 and insecure sha1 both.
> >>
> >> IMHO, this is wrong choise: totaly lost of control now vs teoretical
> >> compromise of control in the future.
> > 
> > Please note that it was not my choice and I can't answer what to do with
> > non-upgradeable hardware question, address it to the author. I just tell
> > you _why_ it happens.
> > 
> 
> BTW, compromise is practical enough. From https://weakdh.org/ "A close
> reading of published NSA leaks shows that the agency's attacks on VPNs
> are consistent with having achieved such a break."

For this compromise need

1) NSA interesed to me
2) NSA must be able to access to weak device for traffic
intercept

This is imposible at this time.

Also, if NSA can be able to intercept such traffic weak crypto will be
last resort of my trouble.




More information about the svn-src-head mailing list