On 21/05/15 21:31, Daniel Zahn wrote:
Finding the right balance between security and supporting older
clients can sometimes be tough, so sorry for any possible inconvience
caused and let us know if any other issues that can't be solved by
upgrading clients.
Best regards,
Daniel
Thanks for your work into safe ciphers, Daniel.
Is the list of compatible ssh clients after all such cipher stripping
documented somewhere?
Also, I take the opportunity of warning everyone that there are
trojanized putty versions out there¹ that send out the user credentials
to the Bad Guys (not a risk for labs, but the same ssh client may be
used for other servers where passphrase authentication *is* enabled).
The official PuTTY web page is at
http://www.chiark.greenend.org.uk/~sgtatham/putty/ with putty.zip 0.64
sha256 being
ff7a0bde4008208a5e30097336c5a41a4ae99fb097839c01ca74cbff19cbe666
Needless to say, PuTTY users should be using the last version (0.64,
released 2015-02-28), there are several crashes prior to 0.63 and
although 0.64 does not really have big fixes (albeit the default of
allowing a SSH-1 downgrade is a bit scary), there's little reason for
not upgrading.
(I am assuming *nix users don't need to be reminded about using an
updated client… Mac OS users maybe?)
Have a safe ssh connection!
¹ http://blogs.cisco.com/security/trojanized-putty-software
http://www.symantec.com/connect/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information
_______________________________________________
Labs-l mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/labs-l