SHA-1 practical recommendations?
James Ralston
ralston at pobox.com
Thu Mar 11 08:06:38 AEDT 2021
As others have mentioned, there is guidance about this in
draft-ietf-curdle-ssh-kex-sha2:
https://datatracker.ietf.org/doc/draft-ietf-curdle-ssh-kex-sha2/
In summary, of these SHA-1 KexAlgorithms:
* diffie-hellman-group1-sha1
* diffie-hellman-group14-sha1
* diffie-hellman-group-exchange-sha1
and these SHA-1 GSSAPIKexAlgorithms:
* gss-gex-sha1-
* gss-group1-sha1-
* gss-group14-sha1-
…if it is necessary to enable one of them for backward compatibility
with clients/servers that support only SHA-1 algorithms, then this is
the only one that should be enabled:
* diffie-hellman-group14-sha1 (for KexAlgorithms)
* gss-group14-sha1- (for GSSAPIKexAlgorithms)
…because of the three, only group14-sha1 is using a 2048-bit MODP
group. So if one must be enabled, it is the least-bad one to enable.
This reasoning was explained in a previous version of the kex draft:
https://tools.ietf.org/id/draft-ietf-curdle-ssh-kex-sha2-11.html
Unfortunately, the explanation in the current version of the draft is
arguably less clear.
More information about the openssh-unix-dev
mailing list