Je 2017-11-03 05:06, Jacob Leifman skribis:
I was finally able to bring our OpenBSD based Network Management System
up
to the current OS release (it was a couple of years out of date) but
this
process broke access to a large number of older HP switches on our
network.
Thorough analysis of the problem and study of the source code lead me
to
believe that the culprit is commit to usr.bin/ssh/dh.h rev 1.14:
increase the minimum modulus that we will send or accept in
diffie-hellman-group-exchange to 2048 bits;
Within the file it further explains that this is mitigation for DH
precomputation attacks. I understand and appreciate strengthening
server
code. But this breaks the use of SSH client leaving little recourse
other
than perhaps telnet with NO encryption instead of somewhat weak
encryption,
as the "server" is outside of our control. (I already checked that we
have
the latest firmware, less than one year old.)
Curiously, diffie-hellman-group1-sha1, which is the only one supported
by
the switches, is an accepted KexAlgorithm value in OpenSSH 7.6 (OBSD
6.2);
I was hoping that I could use it to explicitly request smaller DH but
ultimately it still dies with "Invalid key length" error.
Is this an oversight or is there a particular logic to intentionally
breaking compatibility with a not-insignificant base of installed
equipment?
Thank you,
Jacob Leifman
Educational Technology
Weymouth Public Schools
Hello,
I'm not sure if it's what you ask but I had a problem with old ssh
clients
not able to connect to a recent ssh server after a system upgrade. I had
to
add this to my sshd config (on the server) to allow them to connect :
KexAlgorithms +diffie-hellman-group1-sha1
Ciphers +aes128-cbc
Regards