You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@mina.apache.org by "Achim Hügen (Jira)" <ji...@apache.org> on 2020/12/01 07:40:00 UTC

[jira] [Created] (SSHD-1107) Diffie Hellmann group exchange minimum key size should be configurable for security reasons

Achim Hügen created SSHD-1107:
---------------------------------

             Summary: Diffie Hellmann group exchange minimum key size should be configurable for security reasons
                 Key: SSHD-1107
                 URL: https://issues.apache.org/jira/browse/SSHD-1107
             Project: MINA SSHD
          Issue Type: Bug
    Affects Versions: 2.5.1
            Reporter: Achim Hügen


Currently the minimum key size for DH group exchange is 1024 bit (for example when using diffie-hellman-group-exchange-sha256 for KEX)

This is below the current recommendations of 2048 bit (see [NIST|https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf], Table 2-1 and [https://tools.ietf.org/id/draft-ietf-curdle-ssh-kex-sha2-09.html#rfc.section.3.4).]

For compatibility reasons it is still essential to support diffie-hellman-group-exchange-sha256, but the minimum key size should be configurable, so that a server operator can harden its server.

The minimum size is hardcoded in org.apache.sshd.common.util.security.SecurityUtils#MIN_DHGEX_KEY_SIZE

This could be made configurable via a system property like one already exists for the maximum (see MAX_DHGEX_KEY_SIZE_PROP)

 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@mina.apache.org
For additional commands, e-mail: dev-help@mina.apache.org