And what about SSH?
And what about SSH?
Posted May 21, 2015 14:48 UTC (Thu) by cesarb (subscriber, #6266)Parent article: Another crypto downgrade attack: Logjam
How much should we worry about SSH?
From my quick look at the "ssh -v" output, it seems to require at least a 1024-bit DH group when not using the newer elliptic curves. From what I have read, the DH group used comes from /etc/ssh/moduli, which doesn't seem to be regenerated on install at least on Ubuntu (I already found two machines with identical /etc/ssh/moduli files on a quick look). Would a state-level attacker have done the required precomputation for the /etc/ssh/moduli found in common Linux distributions?
Posted May 22, 2015 14:33 UTC (Fri)
by robbe (guest, #16131)
[Link]
Posted May 22, 2015 14:59 UTC (Fri)
by tialaramex (subscriber, #21167)
[Link] (3 responses)
Regenerating the values should be done very carefully, or else not at all, since erroneous inputs destroy the security of DH entirely. Switching towards Elliptic Curves may be a better choice.
Posted May 22, 2015 21:04 UTC (Fri)
by wahern (subscriber, #37304)
[Link] (2 responses)
In other words, just use OpenSSL to generate new DH parameters and move on to improving the rest of your software and infrastructure.
Posted May 24, 2015 9:35 UTC (Sun)
by reubenhwk (guest, #75803)
[Link] (1 responses)
Posted May 27, 2015 17:40 UTC (Wed)
by flussence (guest, #85566)
[Link]
And what about SSH?
And what about SSH?
And what about SSH?
And what about SSH?
And what about SSH?