Date: Sat, 28 Jul 2018 19:35:49 +0000 (UTC) From: Conrad Meyer <cem@FreeBSD.org> To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r336836 - head/release/tools Message-ID: <201807281935.w6SJZn9G005833@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: cem Date: Sat Jul 28 19:35:49 2018 New Revision: 336836 URL: https://svnweb.freebsd.org/changeset/base/336836 Log: Remove insecure ciphers from GCE sshd configuration They were added for unclear reasons in r277263. The current OpenSSH defaults (7.5+) are reasonable, and do not include the insecure rc4 cipher: chacha20-poly1305@openssh.com, aes128-ctr,aes192-ctr,aes256-ctr, aes128-gcm@openssh.com,aes256-gcm@openssh.com, aes128-cbc,aes192-cbc,aes256-cbc I think I recall there being a reason for a specific list of ciphers on GCE at the time, but I do not recall what it was, and cannot find any current GCE documentation of such a list. So, just revert the explicit configuration and use sane openssh defaults. PR: 230092 Submitted by: Gustavo Scalet <gustavo.scalet AT collabora.com> MFC after: 3 days Security: yes Modified: head/release/tools/gce.conf Modified: head/release/tools/gce.conf ============================================================================== --- head/release/tools/gce.conf Sat Jul 28 19:08:00 2018 (r336835) +++ head/release/tools/gce.conf Sat Jul 28 19:35:49 2018 (r336836) @@ -66,7 +66,6 @@ EOF ChallengeResponseAuthentication no X11Forwarding no AcceptEnv LANG -Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc AllowAgentForwarding no ClientAliveInterval 420 EOF
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201807281935.w6SJZn9G005833>