I think the proposal rampaging went one algorithm too far. sha1 is the
best algorithm supported by many clients and it's still pretty secure.
without it, a lot of clients have stopped working. temporarily alieve
the pain?


Index: myproposal.h
===================================================================
RCS file: /cvs/src/usr.bin/ssh/myproposal.h,v
retrieving revision 1.40
diff -u -p -r1.40 myproposal.h
--- myproposal.h        30 Apr 2014 19:07:48 -0000      1.40
+++ myproposal.h        11 Jul 2014 09:31:21 -0000
@@ -69,19 +69,19 @@
        "umac-128-...@openssh.com," \
        "hmac-sha2-256-...@openssh.com," \
        "hmac-sha2-512-...@openssh.com," \
+       "hmac-sha1-...@openssh.com," \
        "umac...@openssh.com," \
        "umac-...@openssh.com," \
        "hmac-sha2-256," \
-       "hmac-sha2-512" \
+       "hmac-sha2-512," \
+       "hmac-sha1"
 
 #define KEX_CLIENT_MAC KEX_SERVER_MAC "," \
        "hmac-md5-...@openssh.com," \
-       "hmac-sha1-...@openssh.com," \
        "hmac-ripemd160-...@openssh.com," \
        "hmac-sha1-96-...@openssh.com," \
        "hmac-md5-96-...@openssh.com," \
        "hmac-md5," \
-       "hmac-sha1," \
        "hmac-ripemd160," \
        "hmac-ripemd...@openssh.com," \
        "hmac-sha1-96," \
@@ -102,16 +102,16 @@
        "umac-128-...@openssh.com," \
        "hmac-sha2-256-...@openssh.com," \
        "hmac-sha2-512-...@openssh.com," \
+       "hmac-sha1-...@openssh.com," \
        "umac...@openssh.com," \
        "umac-...@openssh.com," \
        "hmac-sha2-256," \
-       "hmac-sha2-512"
+       "hmac-sha2-512," \
+       "hmac-sha1"
 
 #define KEX_CLIENT_KEX KEX_SERVER_KEX
 #define        KEX_CLIENT_ENCRYPT KEX_SERVER_ENCRYPT
-#define KEX_CLIENT_MAC KEX_SERVER_MAC "," \
-       "hmac-sha1-...@openssh.com," \
-       "hmac-sha1"
+#define KEX_CLIENT_MAC KEX_SERVER_MAC
 
 #endif /* WITH_OPENSSL */
 

Reply via email to