Re: OpenSSH SHA-1 deprecation, developing FAQ, etc

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 11/03/2021 23:06, Kevin Fenzi wrote:
> On Thu, Mar 11, 2021 at 03:50:57PM +0100, Daniel Pocock wrote:
>>
>>
>> On 11/03/2021 12:13, Florian Weimer wrote:
>>> * Richard W. M. Jones:
>>>
>>>> I really hope we don't remove the ability to connect to old servers
>>>> (eg. running RHEL 5).  At the moment you have to opt-in by setting the
>>>> crypto-policy to LEGACY and running update-crypto-policies(8), which
>>>> is bearable.
>>>
>>> In the past (long, long ago), I had to enable Telnet on target devices
>>> to work around incompatible cryptography policies.  I hope we are not
>>> going to return to that.
>>
>> Giving people an option to use broken crypto on-demand may appear
>> reasonable at first glance.  In practice, there are sites where people
>> turn it on to meet a deadline or end a service outage and then they
>> never go back to remove it.
> 
> Yeah. ;( 
> However, a command line version might be ok... at least then it's pretty
> clear what you are doing and you want it to go away so you don't have to
> type as much. :) 
> 
>> Nonetheless, all I'm really looking at in this thread is to parse what
>> the OpenSSH releases say into specific advice for current and recent
>> Fedora releases.
> 
> I think we will need to wait for the openssh maintainers here. 
> Ultimately it's their call how much we diverge from upstream, but I
> suspect the answer will be 'as little as possible'. :) 

One piece of advice that we could put on a wiki about OpenSSH:
recommending that people familiarize themselves with the Fedora security
announcements, etc

https://fedoraproject.org/wiki/SecurityBasics#Subscribing_to_Security_Announcement_Services

This always makes sense for any distribution.

Based on the thread here and on the other list, I think it is safe to
put some basic facts on a wiki page too:

- the values stored on disk are only keys and not hashes.  Therefore,
only the minimum key size (e.g. RSA 2048) is a concern for existing keys
on disk.  The hash issues are not a concern for the values in known_hosts.

- SHA1 in Key exchange is not the same as HMAC-SHA1 message
authentication.  The former is a concern, the latter is not.  People
don't need to change MACs

- people who want to remove SHA1 on their server need to change
KexAlgorithms in /etc/ssh/sshd_config (??) and be aware that legacy
clients will no longer connect

- people who want to disable SHA1 from their client can do so in
~/.config/ssh or /etc/ssh/ssh_config as they prefer, modifying
KexAlgorithms (??) and be aware that they can no longer connect to
really old servers and appliances, unless they workaround (next point)

- people who want to enable SHA1 for a single client connection attempt
can do so on the command line (example)

- Fedora (34? 35?) will have OpenSSH with "UpdateHostKeys yes" by default

- people on any older Fedora who want to proactively update the
known_hosts entries on their clients can do so in ~/.config/ssh or
/etc/ssh/ssh_config as they prefer

- maybe a sample script to poll all the servers in known_hosts

- sample ssh client command with debug output
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux