From: | Dave Page <dpage(at)pgadmin(dot)org> |
---|---|
To: | Akshay Joshi <akshay(dot)joshi(at)enterprisedb(dot)com> |
Cc: | Sven <svoop_6cedifwf9e(at)delirium(dot)ch>, pgAdmin Support <pgadmin-support(at)postgresql(dot)org> |
Subject: | Re: SSH tunnel key exchange methods |
Date: | 2015-11-30 13:08:38 |
Message-ID: | 48AA5EAC-64A6-466E-9900-E32EDD4187C0@pgadmin.org |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgadmin-hackers pgadmin-support |
Ok, thanks Akshay.
--
Dave Page
Blog: http://pgsnake.blogspot.com
Twitter: @pgsnake
EnterpriseDB UK:http://www.enterprisedb.com
The Enterprise PostgreSQL Company
> On 30 Nov 2015, at 12:57, Akshay Joshi <akshay(dot)joshi(at)enterprisedb(dot)com> wrote:
>
> Hi Dave
>
>> On Mon, Nov 30, 2015 at 10:41 AM, Akshay Joshi <akshay(dot)joshi(at)enterprisedb(dot)com> wrote:
>> Hi Dave
>>
>>> On Fri, Nov 27, 2015 at 3:01 PM, Dave Page <dpage(at)pgadmin(dot)org> wrote:
>>> On Fri, Nov 27, 2015 at 9:23 AM, Sven <svoop_6cedifwf9e(at)delirium(dot)ch> wrote:
>>> >> The key exchange methods offered when opening an SSH tunnel are all
>>> >> SHA1 and therefore too weak:
>>> >>
>>> >> [sshd] fatal: Unable to negotiate with xxx.xxx.xxx.xxx: no matching
>>> >> key exchange method found. Their offer:
>>> >> diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,
>>> >> diffie-hellman-group1-sha1 [preauth]
>>> >
>>> > Any news on this? If there's no easy way to add safer kexes, I suggest
>>> > you disable the SSH feature altogether. SHA1 is dead and IMO nobody
>>> > should trust a connection established with SHA1 kexes in order to talk
>>> > to databases.
>>>
>>> Akshay, you know that code best of all. How do we enable safer kexes?
>>
>> Today I'll look into it on priority and update accordingly.
>
> I have found that "diffie-hellman-group-exchange-sha256" support has been added to the libssh2 code on September 24, it's not released yet. Please check https://github.com/libssh2/libssh2/pull/48 . Today I have tried to update the libssh2, but facing some compilation issues which needs to be fixed. I am working on it and then check do we need to change our logic or libssh2 will automatically used "diffie-hellman-group-exchange-sha256".
>
>>>
>>> --
>>> Dave Page
>>> Blog: http://pgsnake.blogspot.com
>>> Twitter: @pgsnake
>>>
>>> EnterpriseDB UK: http://www.enterprisedb.com
>>> The Enterprise PostgreSQL Company
>>
>>
>>
>> --
>> Akshay Joshi
>> Principal Software Engineer
>>
>>
>>
>> Phone: +91 20-3058-9517
>> Mobile: +91 976-788-8246
>
>
>
> --
> Akshay Joshi
> Principal Software Engineer
>
>
>
> Phone: +91 20-3058-9517
> Mobile: +91 976-788-8246
From | Date | Subject | |
---|---|---|---|
Next Message | Sanket Mehta | 2015-12-01 05:36:32 | pgagent job failing to halt on failed step |
Previous Message | Akshay Joshi | 2015-11-30 12:57:34 | Re: SSH tunnel key exchange methods |
From | Date | Subject | |
---|---|---|---|
Next Message | Chris Curvey | 2015-11-30 13:37:38 | crash in pgadmin3 |
Previous Message | Akshay Joshi | 2015-11-30 12:57:34 | Re: SSH tunnel key exchange methods |