[ 
https://issues.apache.org/jira/browse/SSHD-1004?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17159812#comment-17159812
 ] 

Guillaume Nodet commented on SSHD-1004:
---------------------------------------

Btw, I just found out some discrepancies between 
[https://github.com/apache/mina-sshd/blob/master/sshd-common/src/main/java/org/apache/sshd/common/config/ConfigFileReaderSupport.java#L103-L104]
 and 
[https://github.com/apache/mina-sshd/blob/master/sshd-core/src/main/java/org/apache/sshd/common/BaseBuilder.java#L111-L121]
 and I suppose this may be the same for ciphers, kex algorithms, etc...
We should use a single source for the default values.

> Disable weak security settings
> ------------------------------
>
>                 Key: SSHD-1004
>                 URL: https://issues.apache.org/jira/browse/SSHD-1004
>             Project: MINA SSHD
>          Issue Type: Improvement
>    Affects Versions: 2.4.0
>            Reporter: Lyor Goldstein
>            Priority: Major
>              Labels: ssh
>
> [OpenSSH to deprecate SHA-1 logins due to security 
> risk|https://www.zdnet.com/article/openssh-to-deprecate-sha-1-logins-due-to-security-risk/]
> Including {{hmac-md5, hmac-ripemd160}} and also {{ssh-rsa}} and {{ssh-dss}} 
> key exchanges. For the time being we will not include them by default but 
> leave the code in place in case users still need them



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org

Reply via email to