[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#774711: openssh: OpenSSH should have stronger ciphers selected at least on the server side.



retitle 774711 OpenSSH should use stronger crypto algo and parameters respectively disable others
stop

Hi.

First, I've modified the title, since I think it's useless to only
harden servers while clients would be left at "less secure" defaults.
Also, the title "should have stronger ciphers selected" was kinda
misleading, since stronger ciphers were actually selected - the problem
was rather that "weaker" ones are still allowed as well.


Then, FYI, I posted information about these two bugs on the
openssh-unix-dev mailing list.


Cheers,
Chris.


[0] https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-January/033297.html

Attachment: smime.p7s
Description: S/MIME cryptographic signature


Reply to: