[Labs-l] sshd config: using newer ciphers and protocols

Platonides platonides at gmail.com
Thu May 21 22:38:51 UTC 2015


On 21/05/15 21:31, Daniel Zahn wrote:
> Finding the right balance between security and supporting older
> clients can sometimes be tough, so sorry for any possible inconvience
> caused and let us know if any other issues that can't be solved by
> upgrading clients.
>
> Best regards,
>
> Daniel

Thanks for your work into safe ciphers, Daniel.

Is the list of compatible ssh clients after all such cipher stripping 
documented somewhere?



Also, I take the opportunity of warning everyone that there are 
trojanized putty versions out there¹ that send out the user credentials 
to the Bad Guys (not a risk for labs, but the same ssh client may be 
used for other servers where passphrase authentication *is* enabled). 
The official PuTTY web page is at 
http://www.chiark.greenend.org.uk/~sgtatham/putty/ with putty.zip 0.64 
sha256 being
ff7a0bde4008208a5e30097336c5a41a4ae99fb097839c01ca74cbff19cbe666

Needless to say, PuTTY users should be using the last version (0.64, 
released 2015-02-28), there are several crashes prior to 0.63 and 
although 0.64 does not really have big fixes (albeit the default of 
allowing a SSH-1 downgrade is a bit scary), there's little reason for 
not upgrading.


(I am assuming *nix users don't need to be reminded about using an 
updated client… Mac OS users maybe?)

Have a safe ssh connection!

¹ http://blogs.cisco.com/security/trojanized-putty-software
http://www.symantec.com/connect/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information



More information about the Labs-l mailing list