[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#774711: recommendations for changing openssh defaults



Jens Thiele writes:
> Hi,
> 
> thanks for your great work

I should make it clear, I was only applying the advice I found in

  https://stribika.github.io/2015/01/04/secure-secure-shell.html

to what versions exist in Debian, stribika and others get credit for that 
work.

Also I realized I had some mistakes in my charts/recommendations:

* I forgot to fill in the Kex stretch column (but it's the same as sid)
* I said "aes*-gcm: since squeeze" but it's only existed since jessie
* I said to keep aes*-cbc, but the above page doesn't list them in the
  recommended Ciphers list (I guess they aren't AE?), so drop them.

So for current openssh communicating with squeeze, that leaves only

Ciphers aes256-ctr,aes192-ctr,aes128-ctr
MACs hmac-sha2-512,hmac-sha2-256,hmac-ripemd160

in common but it will still work. I haven't looked at lenny.

> > * diffie-hellman-group-exchange-sha256: has existed since squeeze at least
> 
> Afair I have seen small default primes with this one. Did you inspect this?

I didn't.

-- 
Matt Taggart
taggart@debian.org


Reply to: