Open jesusbagpuss opened 11 months ago
Is the connection only downgraded to any other enabled cipher? Then we would worst case use the second best cipher which IMO does not warrant doesn't poly chacha. As openssh wrote, this does not impact confidentially or secrecy.
The ssh config guidance includes ciphers that are part of the https://terrapin-attack.com/ vulnerability e.g. https://github.com/mozilla/infosec.mozilla.org/blob/bb3f88ef1df6b0bc31b5c09b7f8ec00431b6a60c/docs/guidelines/openssh.md?plain=1#L36C9-L36C38
The guidance on the above site is:
Not sure if removing the
chacha20-poly1305@openssh.com
cipher from the suggested config, or referencing the vulnerability and impacted versions of openSSH server/clients is the best option.