Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Track and show which algorithms are considered (still) secure, which insecure / weak #26

Open
fingolfin opened this issue Oct 30, 2015 · 3 comments

Comments

@fingolfin
Copy link
Owner

This ties in with issue #8, but this information should not just be displayed when clicking on a protocol; rather, it should also be visible in the global comparision page. Say, by allowing users to only show secure protocols.

@fingolfin
Copy link
Owner Author

Some notes on known weaknesses (of course, all of these should also be justified, ideally with references):

  • all *-96 hmac are insecure
  • anything based on md5 is insecure
  • anything based on sha1 is suspect, possibly insecure
  • "none" is of course insecure
  • ssh-dsa is insecure (?)
  • arcfour* is insecure
  • rijndael* is a deprecated synonym for AES
  • -cbc mode is less secure than -ctr
  • ...

@diaxen
Copy link

diaxen commented Dec 21, 2020

There is a common misbelief that md5 and sha1 based hmac algorithms are not secure. However the collision resistance of the hash function is not required to make the hmac construction secure. Proof: https://link.springer.com/chapter/10.1007/11818175_36

@fingolfin
Copy link
Owner Author

Nevertheless, consensus in the secsh community is clear: any methods involving md5 and sha1 are considered as insecure / weak, which is what this issue is about.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants