Replies: 3 comments
-
@jtesta - Apologies for dropping the ball with #206 and leaving it hanging. The last 12 months has been hectic for me. Your justification in #206 is that it's OK to sheild users of OpenSSH from a fail because there are no hardening steps they can perform (due to questionable design in OpenSSH) and the likelihood of 1024/1024/2048 being negotiated is minimal. I can't think of a solid example right now, but I've encountered systems featuring an SFTP component as a means of getting data in and out, and user configurable security settings were practically non-existent. So you were pretty much stuck with whatever the settings were that the dev compiled with. Let's suppose such a system acts in an SFTP server capacity and supports three host key algorithms - Well... Of course I don't beleive ssh-audit should do that. It should do exactly what it's currenly doing, telling the user the truth so they can make a decision whether to accept the shortcomings of the software, or to switch to an alternative. And I think that's exactly the approach that should be taken with OpenSSH regarding #206, giving the users the truth and letting them decide whether to:
|
Beta Was this translation helpful? Give feedback.
-
@ecki: Currently, ssh-audit reports the following:
So the user is already alerted about this situation, though this does not result in a warning nor failure. How would you prefer ssh-audit react instead?
@thecliguy: Could you more concretely describe what behavior you'd instead prefer from ssh-audit in this case? As shown above, ssh-audit does provide notes to the user, though it currently does not result in a warning nor failure. |
Beta Was this translation helpful? Give feedback.
-
It seems that OpenSSH will be removing the DH fallback mechanism in the next release(!). I opened #310 to track this development and correctly handle the new version when it arrives. |
Beta Was this translation helpful? Give feedback.
-
As reported in #206 OpenSShd has a rather insecure fallback and makes it nearly impossible to turn it off.
imho ssh-audit should not hide this finding but call openssh out on it.
This is also a problem for people who want to implement a strong crypto policy with the RH framework but miss the fact that this does not disable this parameters (unless you specify it correctly)
Beta Was this translation helpful? Give feedback.
All reactions