-
Notifications
You must be signed in to change notification settings - Fork 325
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
enable more secure SSH algorithms und ciphers for dropbear #223
Comments
This is not critical as SSH is not used on Gluon by default. If OpenWrt decides to merge thoses patches, they'll make it into Gluon eventually. |
I don't think @tcatm's argument is valid, as SSH many people use SSH with Gluon. We do so ourselves and we recommend others to do so. The more interesting question is if the patch is important enough to include it even though OpenWrt hasn't so far. In my opionion it isn't, as HMAC-SHA1 is much stronger than SHA1 itself. Even HMAC-MD5 is considered quite secure despite MD5's weaknesses, with HMAC-SHA1 we'll be fine for many years. So I agree with @tcatm's opinion to wait until these patches make it into OpenWrt. |
time has passed, but current gluon versions dropbear still doesn't support modern cryptography? |
OpenWrt has enabled curve25519-sha256 by default since January, so I think we should backport that change now. |
curve25519-sha256 support is backported now. |
I have just tried to use my ssh-ed25519 key, but I was unable to log in. Is it supported? |
@nomaster: no, ed25519 is not supported at all by the current dropbear version 2016.74, I don't know if it is in development. Also, we use the default dropbear config from LEDE, which disables ECDSA using the NIST curves to save space. curve25519-sha256 is supported as a key exchange method, but that's as far as ECC support goes at the moment. |
Includes a few security updates and enables Curve25519 support. Fixes freifunk-gluon#223
Dropbear supports ed25519 since 05.2020: Release Notes: OpenWRT Master (not released) is supporting it |
it is very unlikely that we will backport this. The OpenWrt team plans to do a new release soon and then we will benefit from those changes. |
Please enable more secure SSH algorithms und ciphers hmac-sha2-256 and hmac-sha2-512 for dropbear recommed by BetterCrypto p.19 https://bettercrypto.org/static/applied-crypto-hardening.pdf.
A patch is available for OpenWrt at http://patchwork.openwrt.org/patch/6322/.
The text was updated successfully, but these errors were encountered: