diff options
author | djm@openbsd.org <djm@openbsd.org> | 2019-02-23 08:20:43 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2019-02-24 10:51:46 +1100 |
commit | 9b61130fbd95d196bce81ebeca94a4cb7c0d5ba0 (patch) | |
tree | 3ad20b470660a2193096586ccbf8acf6f580da4a /ssh_config.5 | |
parent | 37638c752041d591371900df820f070037878a2d (diff) |
upstream: openssh-7.9 accidentally reused the server's algorithm lists
in the client for KEX, ciphers and MACs. The ciphers and MACs were identical
between the client and server, but the error accidentially disabled the
diffie-hellman-group-exchange-sha1 KEX method.
This fixes the client code to use the correct method list, but
because nobody complained, it also disables the
diffie-hellman-group-exchange-sha1 KEX method.
Reported by nuxi AT vault24.org via bz#2697; ok dtucker
OpenBSD-Commit-ID: e30c33a23c10fd536fefa120e86af1842e33fd57
Diffstat (limited to 'ssh_config.5')
-rw-r--r-- | ssh_config.5 | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/ssh_config.5 b/ssh_config.5 index db01f130..087ca013 100644 --- a/ssh_config.5 +++ b/ssh_config.5 @@ -33,8 +33,8 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: ssh_config.5,v 1.290 2019/02/18 07:02:34 jmc Exp $ -.Dd $Mdocdate: February 18 2019 $ +.\" $OpenBSD: ssh_config.5,v 1.291 2019/02/23 08:20:43 djm Exp $ +.Dd $Mdocdate: February 23 2019 $ .Dt SSH_CONFIG 5 .Os .Sh NAME @@ -1058,7 +1058,6 @@ ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, diffie-hellman-group-exchange-sha256, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, -diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha256, diffie-hellman-group14-sha1 .Ed |