Re: SSH tunnel key exchange methods

From: Dave Page <dpage(at)pgadmin(dot)org>
To: Akshay Joshi <akshay(dot)joshi(at)enterprisedb(dot)com>
Cc: Sven <svoop_6cedifwf9e(at)delirium(dot)ch>, pgAdmin Support <pgadmin-support(at)postgresql(dot)org>
Subject: Re: SSH tunnel key exchange methods
Date: 2015-11-30 13:08:38
Message-ID: 48AA5EAC-64A6-466E-9900-E32EDD4187C0@pgadmin.org
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgadmin-hackers pgadmin-support

Ok, thanks Akshay.

--
Dave Page
Blog: http://pgsnake.blogspot.com
Twitter: @pgsnake

EnterpriseDB UK:http://www.enterprisedb.com
The Enterprise PostgreSQL Company

> On 30 Nov 2015, at 12:57, Akshay Joshi <akshay(dot)joshi(at)enterprisedb(dot)com> wrote:
>
> Hi Dave
>
>> On Mon, Nov 30, 2015 at 10:41 AM, Akshay Joshi <akshay(dot)joshi(at)enterprisedb(dot)com> wrote:
>> Hi Dave
>>
>>> On Fri, Nov 27, 2015 at 3:01 PM, Dave Page <dpage(at)pgadmin(dot)org> wrote:
>>> On Fri, Nov 27, 2015 at 9:23 AM, Sven <svoop_6cedifwf9e(at)delirium(dot)ch> wrote:
>>> >> The key exchange methods offered when opening an SSH tunnel are all
>>> >> SHA1 and therefore too weak:
>>> >>
>>> >> [sshd] fatal: Unable to negotiate with xxx.xxx.xxx.xxx: no matching
>>> >> key exchange method found. Their offer:
>>> >> diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,
>>> >> diffie-hellman-group1-sha1 [preauth]
>>> >
>>> > Any news on this? If there's no easy way to add safer kexes, I suggest
>>> > you disable the SSH feature altogether. SHA1 is dead and IMO nobody
>>> > should trust a connection established with SHA1 kexes in order to talk
>>> > to databases.
>>>
>>> Akshay, you know that code best of all. How do we enable safer kexes?
>>
>> Today I'll look into it on priority and update accordingly.
>
> I have found that "diffie-hellman-group-exchange-sha256" support has been added to the libssh2 code on September 24, it's not released yet. Please check https://github.com/libssh2/libssh2/pull/48 . Today I have tried to update the libssh2, but facing some compilation issues which needs to be fixed. I am working on it and then check do we need to change our logic or libssh2 will automatically used "diffie-hellman-group-exchange-sha256".
>
>>>
>>> --
>>> Dave Page
>>> Blog: http://pgsnake.blogspot.com
>>> Twitter: @pgsnake
>>>
>>> EnterpriseDB UK: http://www.enterprisedb.com
>>> The Enterprise PostgreSQL Company
>>
>>
>>
>> --
>> Akshay Joshi
>> Principal Software Engineer
>>
>>
>>
>> Phone: +91 20-3058-9517
>> Mobile: +91 976-788-8246
>
>
>
> --
> Akshay Joshi
> Principal Software Engineer
>
>
>
> Phone: +91 20-3058-9517
> Mobile: +91 976-788-8246

In response to

Responses

Browse pgadmin-hackers by date

  From Date Subject
Next Message Sanket Mehta 2015-12-01 05:36:32 pgagent job failing to halt on failed step
Previous Message Akshay Joshi 2015-11-30 12:57:34 Re: SSH tunnel key exchange methods

Browse pgadmin-support by date

  From Date Subject
Next Message Chris Curvey 2015-11-30 13:37:38 crash in pgadmin3
Previous Message Akshay Joshi 2015-11-30 12:57:34 Re: SSH tunnel key exchange methods