Skip to content

Commit

Permalink
Merge pull request #7 from IceCodeNew/migrate-terrapin-attack
Browse files Browse the repository at this point in the history
disable AES CTR ciphers to mitigate the Terrapin attack
  • Loading branch information
k4yt3x authored Dec 21, 2023
2 parents b1efcd4 + 736e799 commit f37d597
Showing 1 changed file with 5 additions and 3 deletions.
8 changes: 5 additions & 3 deletions sshd_config
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
# Name: K4YT3X Hardened OpenSSH Configuration
# Author: K4YT3X
# Date Created: October 5, 2020
# Last Updated: November 20, 2020
# Last Updated: December 21, 2023

# Licensed under the GNU General Public License Version 3 (GNU GPL v3),
# available at: https://www.gnu.org/licenses/gpl-3.0.txt
# (C) 2020 K4YT3X
# (C) 2020-2023 K4YT3X

########## Binding ##########

Expand Down Expand Up @@ -96,7 +96,9 @@ PubkeyAuthentication yes
########## Cryptography ##########

# explicitly define cryptography algorithms to avoid the use of weak algorithms
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
# AES CTR modes have been removed to mitigate the Terrapin attack
# https://terrapin-attack.com/
Ciphers aes256-gcm@openssh.com,aes128-gcm@openssh.com
HostKeyAlgorithms rsa-sha2-512,rsa-sha2-256,ssh-ed25519
MACs hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,umac-128-etm@openssh.com

Expand Down

0 comments on commit f37d597

Please sign in to comment.