[Bug 933480] Re: Picks hmac-md5 over hmac-sha1

Clint Byrum clint at fewbar.com
Sat Feb 18 23:46:42 UTC 2012


Hi Chris, thanks for taking the time to file this bug and help us make
Ubuntu better.

According to RFC 6151, this is not an urgent matter:

http://tools.ietf.org/html/rfc6151

I do think that it is rather odd that hmac-md5 is still the default, but
the upstream openssh authors seems to find that acceptable, and so I
think we can also follow their lead. This is perhaps something to take
up with the OpenSSH developers on their mailing list.

Because it is not urgent and upstream has not seen fit to correct the
issue, I am marking this bug as Wishlist. It is definitely something to
consider, so I'm marking it as Confirmed.

Chris, it would be fantastic if you would forward this bug to the
OpenSSH mailing list to get the ball rolling on on a discussion. Once
you've done so, report back here the results of the discussion, and we
can mark this as Triaged (if there is a change to make) or perhaps close
it if upstream is not interested in changing the default.

** Changed in: openssh (Ubuntu)
   Importance: Undecided => Wishlist

** Changed in: openssh (Ubuntu)
       Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/933480

Title:
  Picks hmac-md5 over hmac-sha1

Status in “openssh” package in Ubuntu:
  Confirmed

Bug description:
  The OpenSSH client defaults to picking hmac-md5, which is based on the
  demonstrably insecure MD5 algorithm:

  faux at wilf:~% ssh -v localhost true 2>&1 | grep hmac
  debug1: kex: server->client aes128-ctr hmac-md5 none
  debug1: kex: client->server aes128-ctr hmac-md5 none

  MD5 has had practical vulnerabilities for around eight years, and its
  use is highly discouraged.  SHA1 is a supported alternative, and is
  supported by the packaged openssh-server, and many other ssh
  implementations.

  MD5 is selected as man ssh_config suggests the default algorithms are, in order of preference (most preferred first):
      hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-ripemd160,hmac-sha1-96,hmac-md5-96

  Please append:
      MACs hmac-sha1,hmac-md5,umac-64 at openssh.com,hmac-ripemd160,hmac-sha1-96,hmac-md5-96

  ...to /etc/ssh/ssh_config, such that the client will prefer SHA-1:

  faux at wilf:~% ssh -v localhost true 2>&1 | grep hmac
  debug1: kex: server->client aes128-ctr hmac-sha1 none
  debug1: kex: client->server aes128-ctr hmac-sha1 none

  This should have no compatibility concerns as MD5 is still a supported
  algorithm.

  Note that non-privileged users can override this setting either way on
  a per-connection basis by specifying MACs in ~/.ssh/config.

  ProblemType: Bug
  DistroRelease: Ubuntu 11.10
  Package: openssh-client 1:5.8p1-7ubuntu1
  ProcVersionSignature: Ubuntu 3.0.0-16.28-generic 3.0.17
  Uname: Linux 3.0.0-16-generic x86_64
  NonfreeKernelModules: nvidia
  ApportVersion: 1.23-0ubuntu4
  Architecture: amd64
  CheckboxSubmission: b0d31efda01870980e2e5a89390b685c
  CheckboxSystem: 6ce041aeed0a2c17b3343b66d157175d
  Date: Thu Feb 16 13:59:43 2012
  EcryptfsInUse: Yes
  InstallationMedia: Ubuntu 10.10 "Maverick Meerkat" - Release amd64 (20101007)
  ProcEnviron:
   PATH=(custom, user)
   LANG=en_GB.UTF-8
   SHELL=/bin/zsh
  RelatedPackageVersions:
   ssh-askpass       N/A
   libpam-ssh        N/A
   keychain          N/A
   ssh-askpass-gnome 1:5.8p1-7ubuntu1
  SSHClientVersion: OpenSSH_5.8p1 Debian-7ubuntu1, OpenSSL 1.0.0e 6 Sep 2011
  SourcePackage: openssh
  UpgradeStatus: Upgraded to oneiric on 2011-05-03 (289 days ago)
  modified.conffile..etc.ssh.ssh.config: [modified]
  mtime.conffile..etc.ssh.ssh.config: 2012-02-16T13:59:11.376423

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/933480/+subscriptions




More information about the foundations-bugs mailing list