Skip to content
This repository has been archived by the owner on Oct 21, 2022. It is now read-only.

SSH Server on surf-dev2.edubadges.nl has CBC Mode Ciphers Enabled #1

Open
sveeke opened this issue Jun 18, 2018 · 1 comment
Open
Assignees
Labels
bug-infrastructure Bugs inside SURFnet's infrastructure risk-low Security issues with a low impact
Milestone

Comments

@sveeke
Copy link
Contributor

sveeke commented Jun 18, 2018

threatLevel="Low" type="Insecure SSL/TLS Configuration"

The SSH server is configured to support Cipher Block Chaining (CBC) encryption.

To verify the issue:

nmap -sT -sV -p22 surf-dev2.edubadges.nl --script=ssh2-enum-algos -Pn

Output shows:

The following client-to-server Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc

The following server-to-client Cipher Block Chaining (CBC) algorithms
are supported : 

  3des-cbc
  aes128-cbc
  aes192-cbc
  aes256-cbc
  blowfish-cbc
  cast128-cbc

Impact:
This may allow an attacker to recover the plaintext message from the ciphertext.

Recommendation:
Disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.

@sveeke sveeke added the bug-infrastructure Bugs inside SURFnet's infrastructure label Jun 18, 2018
@sveeke sveeke added this to the Pilot 2018 milestone Jun 18, 2018
@sveeke sveeke self-assigned this Jun 18, 2018
@sveeke
Copy link
Contributor Author

sveeke commented Jun 18, 2018

I'll take this one when setting up the new pilot environments.

@sveeke sveeke added the risk-low Security issues with a low impact label Jun 18, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bug-infrastructure Bugs inside SURFnet's infrastructure risk-low Security issues with a low impact
Projects
None yet
Development

No branches or pull requests

1 participant