For PR207679 we moved AES-CBC ciphers to the default list on the server for POLA/backwards compatibility reasons. Several years later, undo this in advance of FreeBSD 13.
OpenSSH 7.9p1 removed aes-cbc from the default client list.
Differential D25833
Remove AES-CBC ciphers from default server and client lists. emaste on Jul 27 2020, 3:54 PM. Authored by Tags None Referenced Files
Details For PR207679 we moved AES-CBC ciphers to the default list on the server for POLA/backwards compatibility reasons. Several years later, undo this in advance of FreeBSD 13. OpenSSH 7.9p1 removed aes-cbc from the default client list.
Diff Detail
Event TimelineComment Actions cbc ciphers removed from client list in: From 70c1218fc45757a030285051eb4d209403f54785 Mon Sep 17 00:00:00 2001 From: "djm@openbsd.org" <djm@openbsd.org> Date: Sun, 7 May 2017 23:13:42 +0000 Subject: [PATCH 66/68] upstream commit Don't offer CBC ciphers by default in the client. ok markus@ Upstream-ID: 94c9ce8d0d1a085052e11c7f3307950fdc0901ef --- myproposal.h | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/myproposal.h b/myproposal.h index 072e36ec..c255147a 100644 --- a/myproposal.h +++ b/myproposal.h @@ -1,4 +1,4 @@ -/* $OpenBSD: myproposal.h,v 1.54 2016/09/28 16:33:07 djm Exp $ */ +/* $OpenBSD: myproposal.h,v 1.55 2017/05/07 23:13:42 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. @@ -121,8 +121,7 @@ "aes128-ctr,aes192-ctr,aes256-ctr" \ AESGCM_CIPHER_MODES -#define KEX_CLIENT_ENCRYPT KEX_SERVER_ENCRYPT "," \ - "aes128-cbc,aes192-cbc,aes256-cbc" +#define KEX_CLIENT_ENCRYPT KEX_SERVER_ENCRYPT #define KEX_SERVER_MAC \ "umac-64-etm@openssh.com," \ -- 2.27.0 Comment Actions Could we please get stances in /etc/sshd/ssh{,d}_config commented out that show how to enable these if they are needed? Comment Actions For example, Ciphers +aes128-cbc,aes192-cbc,aes256-cbc I'd rather not deviate from upstream, but if we must I'd rather do so in sshd_config, not in the source. Comment Actions Any idea why these were removed? There aren’t known attacks on correctly implemented CBC modes generally. Maybe it is specific to the openssh context. So, I am happy to defer to upstream defaults here. Comment Actions https://www.kb.cert.org/vuls/id/958563 :
Comment Actions Yes, as your example shows if thats what would allow a person to re-enable these should they be needed, and I am more concerned on the client side than the server, aka it is a royal pain to ssh into an old box if you do not remeber what it is you need to put on the ssh command line to make it work with boxes that use older crypto. Maybe this is not the same issue I am thinking of, but I often have to add -oHostKeyAlgorithms=+ssh-dss to the ssh command to access old boxes, and there is a way to add this in /etc/ssh/ssh_config as well. And again, I am just asking for COMMENTS showing what these values are, and agree absolutely no need to do this in the source code. |