[ https://issues.apache.org/jira/browse/SSHD-1004?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17159812#comment-17159812 ]
Guillaume Nodet commented on SSHD-1004: --------------------------------------- Btw, I just found out some discrepancies between [https://github.com/apache/mina-sshd/blob/master/sshd-common/src/main/java/org/apache/sshd/common/config/ConfigFileReaderSupport.java#L103-L104] and [https://github.com/apache/mina-sshd/blob/master/sshd-core/src/main/java/org/apache/sshd/common/BaseBuilder.java#L111-L121] and I suppose this may be the same for ciphers, kex algorithms, etc... We should use a single source for the default values. > Disable weak security settings > ------------------------------ > > Key: SSHD-1004 > URL: https://issues.apache.org/jira/browse/SSHD-1004 > Project: MINA SSHD > Issue Type: Improvement > Affects Versions: 2.4.0 > Reporter: Lyor Goldstein > Priority: Major > Labels: ssh > > [OpenSSH to deprecate SHA-1 logins due to security > risk|https://www.zdnet.com/article/openssh-to-deprecate-sha-1-logins-due-to-security-risk/] > Including {{hmac-md5, hmac-ripemd160}} and also {{ssh-rsa}} and {{ssh-dss}} > key exchanges. For the time being we will not include them by default but > leave the code in place in case users still need them -- This message was sent by Atlassian Jira (v8.3.4#803005) --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org