Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Terrapin advice #1354

Closed
david-mohr opened this issue Dec 28, 2023 · 2 comments
Closed

Terrapin advice #1354

david-mohr opened this issue Dec 28, 2023 · 2 comments
Labels

Comments

@david-mohr
Copy link

I have run the terrapin scanner (https://github.com/RUB-NDS/Terrapin-Scanner) against an our server module and it is reporting as vulnerable. I was wondering if you have any advice on how to mitigate the vulnerability. According to the website https://terrapin-attack.com/

In more technical terms, if your SSH implementations supports (and is configured to offer) the chacha20-poly1305@openssh.com encryption algorithm, or any encryption algorithm suffixed -cbc in combination with any MAC algorithm suffixed -etm@openssh.com, you are vulnerable to Terrapin.

Also

AES-GCM (RFC5647) is not affected by Terrapin

Or perhaps there is a way to enable "strict kex" which (assuming the client also supports it) would also shutdown any attempt to exploit the issue.

Thanks!

@mscdex
Copy link
Owner

mscdex commented Dec 28, 2023

Upgrade to v1.15.0.

@david-mohr
Copy link
Author

Works like a charm, thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants