Skip to content
This repository was archived by the owner on Jan 24, 2022. It is now read-only.

Cipher compliance should be implementation independant (cipher == cipher@implementation => true) #405

Closed
exploide opened this issue Jul 16, 2017 · 4 comments · Fixed by #407
Assignees
Labels

Comments

@exploide
Copy link

Just scanned a machine and it recommends "Remove these key exchange algorithms: curve25519-sha256". Since this is probably the best one, it should not be removed. I guess this happens because ssh_scan is only aware of [email protected] (including the @... part).

@floatingatoll
Copy link

floatingatoll commented Jul 16, 2017 via email

@exploide
Copy link
Author

It is:

# cat /etc/redhat-release 
Fedora release 26 (Twenty Six)
# ssh -Version
OpenSSH_7.5p1, OpenSSL 1.1.0f-fips  25 May 2017

Actually, it advertises both, curve25519-sha256 and [email protected].

From the changelogs of OpenSSH 7.4:

sshd(8), ssh(1): Support the "curve25519-sha256" key exchange
method. This is identical to the currently-supported method named
"[email protected]".

@claudijd
Copy link
Contributor

I will try to fix this today and have it resolved.

My basic plan is this...

Make ciphers a Ruby object instead of a string so I can defined their comparability such that curve25519-sha256 == curve25519-sha256@foo => true

This shouldn't be that involved and I'll update folks when I'm done.

@claudijd claudijd self-assigned this Jul 20, 2017
@claudijd claudijd added the bug label Jul 20, 2017
@claudijd claudijd changed the title ssh_scan tells me to remove curve25519-sha256 Cipher compliance should be implementation independant (cipher == cipher@implementation => true) Jul 20, 2017
@claudijd
Copy link
Contributor

This is also a duplicate of mozilla/ssh_scan_api#79, but since the fix is in the ssh_scan lib I'll keep this as a parent and link so the other reporter has visibility that a fix is underway.

@claudijd claudijd marked this as a duplicate of mozilla/ssh_scan_api#79 Jul 20, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants