From owner-freebsd-security@FreeBSD.ORG Tue Jan 13 03:00:05 2015 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 392CD793; Tue, 13 Jan 2015 03:00:05 +0000 (UTC) Received: from roadkill.tharned.org (roadkill.tharned.org [75.145.12.185]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id EF8E068D; Tue, 13 Jan 2015 03:00:04 +0000 (UTC) Received: from angus.tharned.org (angus.tharned.org [10.10.10.7]) (authenticated bits=0) by roadkill.tharned.org (8.14.9/8.14.9) with ESMTP id t0D2xpKX087659 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 12 Jan 2015 20:59:56 -0600 (CST) (envelope-from gcr+freebsd-security@tharned.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=tharned.org; s=2014; t=1421117997; bh=AQuJV4O7YxzGysBqzQxvNzkj99NnxkeVxGpxC6KJuyE=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=IjB/imf1jKd4RyEMH4An0MCpK2tKQf44fN+Q6sGg/4Z1YxNKYA8bo1HTF4F/sblbv tWgvdNW3Ye4udsfpC8Oj74js6bJIeSXyFxnkFCKWmslnOjfTgFjr3o8oRDDyYIQMtb mHmshdtYD98RQIdAi+D23p9/EK1zg3b4tTKH8j0B4HLuuP1OHpWIXbyy4ZqAyHc1vB NVBVIxH0uC5Krx0Cip0MdZRoyTiTC8r8sb2K81trzahizfEza7nwq8lWjNwUUhrDIa wGeUlp06ifZowdYu/IqWUul4bkv6wgiQCD5Tui8JQbEY5LqinyKGMlXQvlu/QImCqK KgMuAUhcUxsrw== Date: Mon, 12 Jan 2015 20:59:50 -0600 (CST) From: Greg Rivers To: Jonathan Anderson , Benjamin Kaduk , Ondra Knezour , Zoran Kolic , Paul Hoffman Subject: Re: Securing SSH In-Reply-To: <54B45084.102@weboutsourcing.cz> Message-ID: References: <54B45084.102@weboutsourcing.cz> User-Agent: Alpine 2.11 (BSF 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.4.3 (roadkill.tharned.org [75.145.12.185]); Mon, 12 Jan 2015 20:59:57 -0600 (CST) Cc: freebsd-security@freebsd.org X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Jan 2015 03:00:05 -0000 On Sun, 11 Jan 2015, Jonathan Anderson wrote: > I can't comment much on the elliptic-curve stuff, but I think it's a bit > of a stretch to say that SHA-1 isn't safe for use in a KDF. > On Sun, 11 Jan 2015, Benjamin Kaduk wrote: > The author also appears to not understand the difference between > single-DES and triple-DES, so I would expect the value of that posting > to be only as a brainstormed list of ideas to consider for further > analysis. > On Mon, 12 Jan 2015, Ondra Knezour wrote: > You may also want to consult The applied crypto hardening book draft at > https://bettercrypto.org/ if you are looking for some "instant" security > inspiration. > Thank you all for your informative replies. I suspected that the article was a bit naive. Like many, I don't have a deep knowledge of cryptography, so I appreciate your input. I thought it was worthwhile to ask and perhaps generate some discussion about FreeBSD's default SSH configuration. On Mon, 12 Jan 2015, Zoran Kolic wrote: > In fact, you got answer on openbsd misc list. > On Mon, 12 Jan 2015, Paul Hoffman wrote: > Can you point to that for the rest of us? I'd rather not wade in > openbsd-misc.... > It took a lot of searching to find, but I suspect he's talking about , which fails parts 3 through 6 of the Boy Scout Law. -- Greg