mozilla / infosec.mozilla.org

Guidelines, principles published on https://infosec.mozilla.org
Mozilla Public License 2.0
95 stars 65 forks source link

'Terrapin' vulnerability - and suggested ciphers #175

Open jesusbagpuss opened 11 months ago

jesusbagpuss commented 11 months ago

The ssh config guidance includes ciphers that are part of the https://terrapin-attack.com/ vulnerability e.g. https://github.com/mozilla/infosec.mozilla.org/blob/bb3f88ef1df6b0bc31b5c09b7f8ec00431b6a60c/docs/guidelines/openssh.md?plain=1#L36C9-L36C38

The guidance on the above site is:

If you feel uncomfortable waiting for your SSH implementation to provide a patch, you can workaround this vulnerability by temporarily disabling the affected chacha20-poly1305@openssh.com encryption and -etm@openssh.com MAC algorithms in the configuration of your SSH server (or client), and use unaffected algorithms like AES-GCM instead.

Not sure if removing the chacha20-poly1305@openssh.com cipher from the suggested config, or referencing the vulnerability and impacted versions of openSSH server/clients is the best option.

SuperSandro2000 commented 10 months ago

Is the connection only downgraded to any other enabled cipher? Then we would worst case use the second best cipher which IMO does not warrant doesn't poly chacha. As openssh wrote, this does not impact confidentially or secrecy.