Skip to content

Confusing diffie-hellman-group-exchange-sha256 recommendation/output #334

@scop

Description

@scop

I see this in current (git master, 5ddd8cc) ssh-audit output

[...]
# key exchange algorithms
[...]
(kex) diffie-hellman-group-exchange-sha256 (3072-bit) -- [warn] does not provide protection against post-quantum attacks
                                                      `- [info] available since OpenSSH 4.4
                                                      `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 3072. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).
[...]
# algorithm recommendations (for OpenSSH 9.9)
(rec) !diffie-hellman-group-exchange-sha256 -- kex algorithm to change (increase modulus size to 3072 bits or larger) 

This is in a setup that has the moduli hardenings from https://www.sshaudit.com/hardening_guides.html already made ($5 >= 3071...).

What I find curious is that it first seems to say a 3072-bit diffie-hellman-group-exchange-sha256 is already in use, and then recommends to increase its modulus size to >= 3072.

Removing diffie-hellman-group-exchange-sha256 altogether gets rid of the warning, but it doesn't seem that's what's being recommended.

Could this be clarified somehow?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions