Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Verify the current crypto settings #162

Closed
artem-sidorenko opened this issue Jan 14, 2017 · 3 comments
Closed

Verify the current crypto settings #162

artem-sidorenko opened this issue Jan 14, 2017 · 3 comments
Assignees
Milestone

Comments

@artem-sidorenko
Copy link
Member

@bazbremner raised this point in the GH-141 and myself and @atomic111 had this topic also in some phone call in the last days

So we should check following things:

My idea would be to go completely through the following docs and check the things above:

I already have some interesting findings: as I said above, we use ECDSA and here the snippet from the blogpost of @stribika:

  1. ECDSA with SHA256, SHA384 or SHA512 depending on key size
    ...
    Number 2 here involves NIST suckage and should be disabled as well. Another important disadvantage of DSA and ECDSA is that it uses randomness for each signature. If the random numbers are not the best quality, then it is possible to recover the secret key.

Maybe it would be also nice to ask @stribika for a review of our findings and changes.

@atomic111 what do you think? something I missed? Do you have time to do this in the next week, if not - its fine, I can do this and you can review it :)

@atomic111
Copy link
Member

@artem-sidorenko no update of ciphers, macs and kexs needed. but we have to update the ssh host keys according to the list in dev-sec/ssh-baseline#76

@artem-sidorenko
Copy link
Member Author

@atomic111 Ok, I'll provide a PR in the next days

@artem-sidorenko
Copy link
Member Author

thanks:)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants