Re: Weak DH primes and openssh

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Sun, May 24, 2015 at 9:20 AM, Darren Tucker <dtucker@xxxxxxxxxx> wrote:

> [...]
> The other possible action that IMO would be reasonable but is not listed:
> remove all of the 1kbit and 1.5kbit groups
>

After some consideration we have decided to remove[1] the 1k bit groups
from the moduli file.   Vendors may want to consider doing this even for
older versions of OpenSSH (either by importing the new file, or by removing
them from the existing file) as it will result in stronger groups being
used for diffie-hellman-group-exchange-sha{1,256} transparently even if the
client prefers 1k bit groups (eg PuTTY and derivatives when using 128bit
ciphers).

[1]
https://anongit.mindrot.org/openssh.git/commit/?id=5ab7d5fa03ad55bc438fab45dfb3aeb30a3c237a

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4  37C9 C982 80C7 8FF4 FA69
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux