Very interesting! Thank you for sharing. I will be testing this out.

On 04/10/2017 08:22 AM, Paul Heinlein wrote:
> I've got a CentOS 7 VM running off in the cloud. It exposes SSH on 
> port 22 to the world. I've thought about moving it to an alternate 
> port, and may someday do so, but in the meantime I've tried to keep up 
> with best practices for sshd configuration.
>
> I recently changed the KexAlgorithms setting, removing all 
> key-exchange algorithms based on NIST curves. (Google variants of 
> "ed25519 nist ssh ecdh" for my reasoning.) Anyway, the new setting:
>
> KexAlgorithms 
> curve25519-sha...@libssh.org,diffie-hellman-group-exchange-sha256
>
> All of my machines (MacOS 10.12, CentOS 6, CentOS 7) can work with 
> this setting, so I don't have to worry about infinite backward 
> compatibility.
>
> One interesting and unintended result of this change is that many SSH 
> scanners will fail while trying to negotiate a key exchange. The log 
> entries are short and sweet:
>
> sshd[18200]: fatal: Unable to negotiate a key exchange method [preauth]
>
> The number of scanners that even get through to the stage of 'Invalid 
> user' has dropped from a couple hundred per day to less than a dozen.
>
> Everyone's situation is different, of course, and this alteration may 
> not work in your environment -- but you may find it worthwhile raising 
> the bar on the KexAlgorithm, Ciphers, and MACs in your sshd_config, 
> especially if your SSH daemon is exposed to the world at large.
>

_______________________________________________
PLUG mailing list
PLUG@lists.pdxlinux.org
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to