3des cipher and DH group size

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Dne 25.1.2014 11:17, Darren Tucker napsal(a):
> On Fri, Jan 24, 2014 at 05:28:03PM +0100, Petr Lautrbach wrote:
>> On 01/21/2014 05:14 PM, Petr Lautrbach wrote:
>>> Hello everybody,
>>>
>>> An issue was reported in RH bugzilla [1] about the size of the used DH
>>> group  when combined with the 3des-cbc cipher. OpenSSH uses the
>>> actual key length for the size estimation. This is probably fine as far
>>> as the cipher has the same number of bits of security as the key
>>> length. But this is not true for 3TDEA where the key size is 168 resp
>>> 192 but it's security is only 112.
>>>
>>> Given that the key size in openssh is set to 192, DH group size is
>>> estimated to 7680. But according to NIST SP 800-57, the size of DH key
>>> should be 2048 so openssh doesn't follow that  and it might cause
>>> problems with key exchanges with some servers.
>>>
>>
>> It was confirmed that openssh can't connect to the server with a server string
>> 'SSH-2.0-cryptlib' using diffie-hellman-group-exchange-sha1 and 3des-cbc with
>> SSH2_MSG_KEX_DH_GEX_REQUEST(1024<7680<8192).
>
> Thanks for the patch.  Since we are so close to the 6.5 release I have
> committed a smaller change that should still resolve the problem
> (confirmed by checking the debug output for the requested group sizes).
>

Works, thanks.

I'll try to communicate a change with the other side to follow RFC and 
provide at least  the largest group it knows.

Petr
-- 
Petr Lautrbach <plautrba at redhat.com>, Red Hat, Inc.


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux