Skip to content

Comments

configs/sshd_config: use secure crypto algos only#36

Merged
sayanchowdhury merged 1 commit intoflatcar-masterfrom
t-lo/sshd-safe-crypto-only
Mar 2, 2021
Merged

configs/sshd_config: use secure crypto algos only#36
sayanchowdhury merged 1 commit intoflatcar-masterfrom
t-lo/sshd-safe-crypto-only

Conversation

@t-lo
Copy link
Member

@t-lo t-lo commented Feb 18, 2021

Limit ciphers used by the SSH service to "known secure" only:

Limit ciphers used by the SSH service to "known secure" only:

- Limit Ciphers to chacha20-poly1305@openssh.com
                   aes128-ctr,aes192-ctr
                   aes256-ctr,aes128-gcm@openssh.com
                   aes256-gcm@openssh.com

- Limit Message Authentication Codes to hmac-sha2-256-etm@openssh.com
                                        hmac-sha2-512-etm@openssh.com
                                        hmac-sha2-256,hmac-sha2-512
                                        umac-128-etm@openssh.com
                                        umac-128@openssh.com

- Limit Key Exchange Algorithms to curve25519-sha256
                                   curve25519-sha256@libssh.org
                                   ecdh-sha2-nistp256
                                   ecdh-sha2-nistp384
                                   ecdh-sha2-nistp521
                                   diffie-hellman-group-exchange-sha256
                                   diffie-hellman-group16-sha512
                                   diffie-hellman-group18-sha512
                                   diffie-hellman-group14-sha256

Signed-off-by: Thilo Fromm <thilo@kinvolk.io>
@t-lo t-lo requested a review from a team February 18, 2021 15:18
@vbatts
Copy link
Member

vbatts commented Feb 18, 2021

there is some degree of awareness that there could be users carrying around old ssh keys. It's worth communicating to particularly test on the Alpha and Beta channels.

@t-lo
Copy link
Member Author

t-lo commented Feb 18, 2021

I don't think keys are affected at all (since we don't force pubkey ciphers), but some ancient ssh clients might break. I've left a note in the coreos-base PR; we'll line this out in our release notes.

Copy link
Member

@dongsupark dongsupark left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ok if CI passed

@sayanchowdhury sayanchowdhury merged commit 5979668 into flatcar-master Mar 2, 2021
@sayanchowdhury sayanchowdhury deleted the t-lo/sshd-safe-crypto-only branch March 2, 2021 14:12
jepio pushed a commit that referenced this pull request Feb 21, 2022
update-bootengine: fix containerised builds
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants