Skip to content

Commit

Permalink
Re-add AES-CBC ciphers to the default cipher list on the server.
Browse files Browse the repository at this point in the history
PR:		207679
  • Loading branch information
dag-erling committed Mar 11, 2016
1 parent bb6f58c commit ba453f4
Show file tree
Hide file tree
Showing 3 changed files with 12 additions and 4 deletions.
8 changes: 7 additions & 1 deletion crypto/openssh/FREEBSD-upgrade
@@ -1,4 +1,3 @@

FreeBSD maintainer's guide to OpenSSH-portable
==============================================

Expand Down Expand Up @@ -166,6 +165,13 @@
ignore HPN-related configuration options to avoid breaking existing
configurations.

A) AES-CBC

The AES-CBC ciphers were removed from the server-side proposal list
in 6.7p1 due to theoretical weaknesses and the availability of
superior ciphers (including AES-CTR and AES-GCM). We have re-added
them for compatibility with third-party clients.



This port was brought to you by (in no particular order) DARPA, NAI
Expand Down
5 changes: 3 additions & 2 deletions crypto/openssh/myproposal.h
Expand Up @@ -113,10 +113,11 @@
#define KEX_SERVER_ENCRYPT \
"chacha20-poly1305@openssh.com," \
"aes128-ctr,aes192-ctr,aes256-ctr" \
AESGCM_CIPHER_MODES
AESGCM_CIPHER_MODES \
",aes128-cbc,aes192-cbc,aes256-cbc"

#define KEX_CLIENT_ENCRYPT KEX_SERVER_ENCRYPT "," \
"aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc"
"3des-cbc"

#define KEX_SERVER_MAC \
"umac-64-etm@openssh.com," \
Expand Down
3 changes: 2 additions & 1 deletion crypto/openssh/sshd_config.5
Expand Up @@ -482,7 +482,8 @@ The default is:
.Bd -literal -offset indent
chacha20-poly1305@openssh.com,
aes128-ctr,aes192-ctr,aes256-ctr,
aes128-gcm@openssh.com,aes256-gcm@openssh.com
aes128-gcm@openssh.com,aes256-gcm@openssh.com,
aes128-cbc,aes192-cbc,aes256-cbc
.Ed
.Pp
The list of available ciphers may also be obtained using the
Expand Down

0 comments on commit ba453f4

Please sign in to comment.