svn commit: r303716 - head/crypto/openssh
Bruce Simpson
bms at fastmail.net
Sun Aug 7 17:37:36 UTC 2016
On 07/08/16 18:34, Andrey Chernov wrote:
>>> Alcatel-Lucent OmniSwitch 6800 login broken (pfSense 2.3.2 which
>>> accepted the upstream change, workaround no-go)
>>>
>>> [2.3.2-RELEASE][root at gw.lab]/root: ssh -l admin
>>> -oKexAlgorithms=+diffie-hellman-group1-sha1 192.168.1.XXX
>>> Fssh_ssh_dispatch_run_fatal: Connection to 192.168.1.XXX port 22: DH GEX
>>> group out of range
>> DH prime size must be at least 2048, openssh now refuse lower values.
>> Commonly used DH size 1024 can be easily broken. See https://weakdh.org
>>
> diffie-hellman-group1-sha1 use DH 1024 and insecure sha1 both.
>
I appreciate that, but what do I as a user do about it? My distribution
has changed behaviour I rely on in an operational setting. My initial
reaction is likely to be one of confusion, and general dismay.
I appreciate that this is done for security reasons, but it could take
an arbitrarily long time for a lot of deployed hardware in current use
to be updated.
(On the other hand, the introduction of, say ED25519 has been more
gradual, and has tended to see uptake in e.g. Linux-based ARM products.)
More information about the svn-src-head
mailing list