| Summary: | Insecure 1023 and 1535 bit moduli sizes in /etc/ssh/moduli (Logjam) | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Karsten Weiss <knweiss> |
| Component: | openssh | Assignee: | Jakub Jelen <jjelen> |
| Status: | CLOSED WONTFIX | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | low | ||
| Version: | 7.3 | CC: | mgrepl, mjtrangoni, nmavrogi, szidek |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2018-12-07 13:05:32 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Karsten Weiss
2016-11-21 09:07:11 UTC
Well, saying that 1023 bits is not enough today is questionable. Based on the table on the top of the page 8 [1], the times are sill quite large to believe it can be true (millions core-years to pre-computation, 30 core-days for a single connection is not much real-time decryption). But for future, bumping the values as upstream does is preferable and planned. Thank you for the report. For the RHEL6 and RHEL5, it is probably too late to make it default, but feel free to contact your Red Hat support if you consider this important. [1] https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf Thanks for you reply. FWIW there are also the current NIST recommendations: See chapter 5 of http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf. Quote: "SP 800-56A DH and MQV schemes using finite fields: The use of the finite field schemes in SP 800-56A is acceptable if len(p) >= 2048 and len(q) >= 224. Otherwise, their use is disallowed." Also, http://eprint.iacr.org/2016/995.pdf recommends "safe-primes of documented provenance of at least 2048 bits". The paper https://eprint.iacr.org/2016/961.pdf concludes with this lesson: "Our results are yet another reminder that 1024-bit primes should be considered insecure for the security of cryptosystems based on the hardness of discrete logarithms. The discrete logarithm computation for our backdoored prime was only feasible because of the 1024-bit size, and the most effective protection against any backdoor of this type has always been to use key sizes for which any computation is infeasible. NIST recommended transitioning away from 1024-bit key sizes for DSA, RSA, and Diffie-Hellman in 2010 [6]. Unfortunately, such key sizes remain in wide use in practice." [6] E. Barker and A. Roginsky. Transitions: Recommendation for transitioning the use of cryptographic algorithms and key lengths. Technical report, National Institute of Standards and Technology, 2011. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-131a.pdf I'm no cryptographer but IMHO there's no good argument for *keeping* the 1023 bits moduli. Also, from a security best practice point of view it wouldn't hurt to generate an all new /etc/ssh/moduli file for each Red Hat Linux minor release i.e. rotating *all* generators and moduli with each minor release instead of using the same values for 10+ years of RH Enterprise support. We do not want to change the default in mid-release this much. Especially without any simple way to revert for legacy clients/servers connections as upstream did it. Also other libraries are not following there yet. We are aware of this problem and plan to resolve this system-wide. For hardening, it is very easy to remove the short moduli from /etc/ssh/moduli in post-install scripts/configuration management. |