Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable Weak SSH Ciphers #121

Closed
mfeit-internet2 opened this issue Apr 27, 2016 · 1 comment
Closed

Disable Weak SSH Ciphers #121

mfeit-internet2 opened this issue Apr 27, 2016 · 1 comment

Comments

@mfeit-internet2
Copy link
Member

Via perfsonar-users:
Good afternoon,

The people responsible for PNNL network hygiene routinely scan our perfSONAR hosts. People from big DOE also scan our perfSONAR hosts. The managers at PNNL want a squeaky clean report from both the big DOE and PNNL scanners. To get that that they want us to disable certain SSH ciphers.

Would you please update the perfSONAR configuration scripts to append these three lines to /etc/ssh/sshd_config so that our local fix doesn't get overwritten in the future? I see you're already forcing SSH Protocol 2, which is a great start.

# Disable weak SSH crypto algorithms
Ciphers aes128-ctr,aes192-ctr,aes256-ctr
MACs hmac-sha1,hmac-sha1-96,hmac-sha2-256,hmac-sha2-512

Thank you and best regards,

Bill Nickless / bill.nickless@pnnl.gov / +1 509 713 2455

@apertome
Copy link
Contributor

apertome commented Jan 5, 2017

This is essentially a duplicate of #97, in which we have already disabled these weak ciphers. We will be revisiting this again before the 4.0 final release.

@apertome apertome closed this as completed Jan 5, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants