Skip to content

Commit ca8bacd

Browse files
committed
ssh: add more kex and remove sha1 from preferred mac/kex
1 parent 40c6400 commit ca8bacd

File tree

3 files changed

+34
-4
lines changed

3 files changed

+34
-4
lines changed

ssh/common.go

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,8 @@ var supportedKexAlgos = []string{
4848
// P384 and P521 are not constant-time yet, but since we don't
4949
// reuse ephemeral keys, using them for ECDH should be OK.
5050
kexAlgoECDH256, kexAlgoECDH384, kexAlgoECDH521,
51-
kexAlgoDH14SHA256, kexAlgoDH14SHA1, kexAlgoDH1SHA1,
51+
kexAlgoDH14SHA256, kexAlgoDH16SHA512, kexAlgoDH18SHA512,
52+
kexAlgoDH14SHA1, kexAlgoDH1SHA1,
5253
}
5354

5455
// serverForbiddenKexAlgos contains key exchange algorithms, that are forbidden
@@ -63,7 +64,7 @@ var serverForbiddenKexAlgos = map[string]struct{}{
6364
var preferredKexAlgos = []string{
6465
kexAlgoCurve25519SHA256, kexAlgoCurve25519SHA256LibSSH,
6566
kexAlgoECDH256, kexAlgoECDH384, kexAlgoECDH521,
66-
kexAlgoDH14SHA256, kexAlgoDH14SHA1,
67+
kexAlgoDH14SHA256,
6768
}
6869

6970
// supportedHostKeyAlgos specifies the supported host-key algorithms (i.e. methods
@@ -88,6 +89,10 @@ var supportedMACs = []string{
8889
"hmac-sha1", "hmac-sha1-96",
8990
}
9091

92+
var preferredMACs = []string{
93+
"[email protected]", "hmac-sha2-256",
94+
}
95+
9196
var supportedCompressions = []string{compressionNone}
9297

9398
// hashFuncs keeps the mapping of supported signature algorithms to their
@@ -285,7 +290,7 @@ func (c *Config) SetDefaults() {
285290
}
286291

287292
if c.MACs == nil {
288-
c.MACs = supportedMACs
293+
c.MACs = preferredMACs
289294
}
290295

291296
if c.RekeyThreshold == 0 {

ssh/kex.go

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ const (
2323
kexAlgoDH1SHA1 = "diffie-hellman-group1-sha1"
2424
kexAlgoDH14SHA1 = "diffie-hellman-group14-sha1"
2525
kexAlgoDH14SHA256 = "diffie-hellman-group14-sha256"
26+
kexAlgoDH16SHA512 = "diffie-hellman-group16-sha512"
27+
kexAlgoDH18SHA512 = "diffie-hellman-group18-sha512"
2628
kexAlgoECDH256 = "ecdh-sha2-nistp256"
2729
kexAlgoECDH384 = "ecdh-sha2-nistp384"
2830
kexAlgoECDH521 = "ecdh-sha2-nistp521"
@@ -430,6 +432,28 @@ func init() {
430432
hashFunc: crypto.SHA256,
431433
}
432434

435+
// This is the group called diffie-hellman-group16-sha512 in RFC
436+
// 8268 and Oakley Group 16 in RFC 3526.
437+
p, _ = new(big.Int).SetString("FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3DC2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F83655D23DCA3AD961C62F356208552BB9ED529077096966D670C354E4ABC9804F1746C08CA18217C32905E462E36CE3BE39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9DE2BCBF6955817183995497CEA956AE515D2261898FA051015728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6BF12FFA06D98A0864D87602733EC86A64521F2B18177B200CBBE117577A615D6C770988C0BAD946E208E24FA074E5AB3143DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D788719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA993B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199FFFFFFFFFFFFFFFF", 16)
438+
439+
kexAlgoMap[kexAlgoDH16SHA512] = &dhGroup{
440+
g: new(big.Int).SetInt64(2),
441+
p: p,
442+
pMinus1: new(big.Int).Sub(p, bigOne),
443+
hashFunc: crypto.SHA512,
444+
}
445+
446+
// This is the group called diffie-hellman-group18-sha512 in RFC
447+
// 8268 and Oakley Group 18 in RFC 3526.
448+
p, _ = new(big.Int).SetString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
449+
450+
kexAlgoMap[kexAlgoDH18SHA512] = &dhGroup{
451+
g: new(big.Int).SetInt64(2),
452+
p: p,
453+
pMinus1: new(big.Int).Sub(p, bigOne),
454+
hashFunc: crypto.SHA512,
455+
}
456+
433457
kexAlgoMap[kexAlgoECDH521] = &ecdh{elliptic.P521()}
434458
kexAlgoMap[kexAlgoECDH384] = &ecdh{elliptic.P384()}
435459
kexAlgoMap[kexAlgoECDH256] = &ecdh{elliptic.P256()}

ssh/test/session_test.go

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,8 @@ func TestKeyExchanges(t *testing.T) {
403403
// diffie-hellman-group-exchange-sha1 and diffie-hellman-group-exchange-sha256
404404
// are not included in the default list of supported kex so we have to add them
405405
// here manually.
406-
kexOrder = append(kexOrder, "diffie-hellman-group-exchange-sha1", "diffie-hellman-group-exchange-sha256")
406+
kexOrder = append(kexOrder, "diffie-hellman-group-exchange-sha1", "diffie-hellman-group-exchange-sha256",
407+
"diffie-hellman-group16-sha512", "diffie-hellman-group18-sha512")
407408
for _, kex := range kexOrder {
408409
t.Run(kex, func(t *testing.T) {
409410
server := newServer(t)

0 commit comments

Comments
 (0)