Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 28 Jul 2018 19:35:49 +0000 (UTC)
From:      Conrad Meyer <cem@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r336836 - head/release/tools
Message-ID:  <201807281935.w6SJZn9G005833@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: cem
Date: Sat Jul 28 19:35:49 2018
New Revision: 336836
URL: https://svnweb.freebsd.org/changeset/base/336836

Log:
  Remove insecure ciphers from GCE sshd configuration
  
  They were added for unclear reasons in r277263.  The current OpenSSH
  defaults (7.5+) are reasonable, and do not include the insecure rc4 cipher:
  
                     chacha20-poly1305@openssh.com,
                     aes128-ctr,aes192-ctr,aes256-ctr,
                     aes128-gcm@openssh.com,aes256-gcm@openssh.com,
                     aes128-cbc,aes192-cbc,aes256-cbc
  
  I think I recall there being a reason for a specific list of ciphers on GCE
  at the time, but I do not recall what it was, and cannot find any
  current GCE documentation of such a list.
  
  So, just revert the explicit configuration and use sane openssh defaults.
  
  PR:		230092
  Submitted by:	Gustavo Scalet <gustavo.scalet AT collabora.com>
  MFC after:	3 days
  Security:	yes

Modified:
  head/release/tools/gce.conf

Modified: head/release/tools/gce.conf
==============================================================================
--- head/release/tools/gce.conf	Sat Jul 28 19:08:00 2018	(r336835)
+++ head/release/tools/gce.conf	Sat Jul 28 19:35:49 2018	(r336836)
@@ -66,7 +66,6 @@ EOF
 ChallengeResponseAuthentication no
 X11Forwarding no
 AcceptEnv LANG
-Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
 AllowAgentForwarding no
 ClientAliveInterval 420
 EOF



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201807281935.w6SJZn9G005833>