-
-
Notifications
You must be signed in to change notification settings - Fork 126
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Put insecure ciphers and digest dependencies behind a non-default feature #420
Comments
I failed to notice that Also, the |
Unsafe algorithms are disabled by default, but you are right that we could additionally feature-gate those dependencies |
Are the set of default algorithms documented anywhere? Is there e.g. a unit test that verifies that unsafe algorithms (e.g. the "none" cipher) are disabled by default? |
They are listed in |
It would be nice to get this into the documentation somehow. Even if I know to look at |
I find it surprising that
russh
has dependencies ondes
andblowfish
crates by default. These ciphers have not been trusted for a long time, and haven't been enabled by default in ssh servers for many years (link, link).If known bad ciphers need to be supported, I think they should be gated behind a feature flag that is off by default, accompanied by a warning that they are insecure.
There are also some insecure digest crates used by
russh-keys
:md5
was broken and disabled by ssh servers a long time ago (link), and should not be enabled by default.sha1
was broken a bit more recently (link), but also probably long enough ago to remove it from the default features.The text was updated successfully, but these errors were encountered: