mailarchive of the ptxdist mailing list
 help / color / mirror / Atom feed
* [ptxdist] [PATCH 0/3] OpenSSH improvements
@ 2015-06-09 16:57 Clemens Gruber
  2015-06-09 16:57 ` [ptxdist] [PATCH 1/3] openssh: Generate Ed25519 keys instead of DSA keys Clemens Gruber
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Clemens Gruber @ 2015-06-09 16:57 UTC (permalink / raw)
  To: ptxdist; +Cc: Clemens Gruber

Hi,

I have three OpenSSH patches for ptxdist: Generating Ed25519 keys by
default (and no longer generating DSA keys by default), enabling the
privilege separation sandbox and bumping the version to 6.8p1

Best regards,
Clemens

Clemens Gruber (3):
  openssh: Generate Ed25519 keys instead of DSA keys
  openssh: Enable pre-auth sandboxing
  openssh: Bump to current stable version 6.8p1

 generic/etc/rc.once.d/openssh | 8 ++++----
 generic/etc/ssh/sshd_config   | 4 ++--
 rules/openssh.make            | 4 ++--
 3 files changed, 8 insertions(+), 8 deletions(-)

-- 
2.4.2


-- 
ptxdist mailing list
ptxdist@pengutronix.de

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [ptxdist] [PATCH 1/3] openssh: Generate Ed25519 keys instead of DSA keys
  2015-06-09 16:57 [ptxdist] [PATCH 0/3] OpenSSH improvements Clemens Gruber
@ 2015-06-09 16:57 ` Clemens Gruber
  2015-06-09 16:57 ` [ptxdist] [PATCH 2/3] openssh: Enable pre-auth sandboxing Clemens Gruber
  2015-06-09 16:57 ` [ptxdist] [PATCH 3/3] openssh: Bump to current stable version 6.8p1 Clemens Gruber
  2 siblings, 0 replies; 4+ messages in thread
From: Clemens Gruber @ 2015-06-09 16:57 UTC (permalink / raw)
  To: ptxdist; +Cc: Clemens Gruber

As it is very likely that weak DSA and ECDSA keys are created on
embedded systems (entropy problems), I suggest replacing DSA with
Ed25519, a elliptic curve signature scheme which was designed with
those problems in mind. Having not enough entropy is not that
critical with Ed25519 as it was with DSA or ECDSA.

Besides being more secure than DSA, its performance is better too.

More info on Ed25519: http://ed25519.cr.yp.to

Signed-off-by: Clemens Gruber <clemens.gruber@pqgruber.com>
---
 generic/etc/rc.once.d/openssh | 8 ++++----
 generic/etc/ssh/sshd_config   | 2 +-
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/generic/etc/rc.once.d/openssh b/generic/etc/rc.once.d/openssh
index 83e6e37..0a63433 100644
--- a/generic/etc/rc.once.d/openssh
+++ b/generic/etc/rc.once.d/openssh
@@ -3,12 +3,12 @@
 PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
 
 OPENSSH_RSAKEY_DEFAULT="/etc/ssh/ssh_host_rsa_key"
-OPENSSH_DSAKEY_DEFAULT="/etc/ssh/ssh_host_dsa_key"
+OPENSSH_ED25519KEY_DEFAULT="/etc/ssh/ssh_host_ed25519_key"
 
 test -n "$OPENSSH_RSAKEY" || \
 	OPENSSH_RSAKEY=$OPENSSH_RSAKEY_DEFAULT
-test -n "$OPENSSH_DSAKEY" || \
-	OPENSSH_DSAKEY=$OPENSSH_DSAKEY_DEFAULT
+test -n "$OPENSSH_ED25519KEY" || \
+	OPENSSH_ED25519KEY=$OPENSSH_ED25519KEY_DEFAULT
 
 gen_key() {
 
@@ -29,5 +29,5 @@ gen_key() {
 }
 
 gen_key rsa "$OPENSSH_RSAKEY"
-gen_key dsa "$OPENSSH_DSAKEY"
+gen_key ed25519 "$OPENSSH_ED25519KEY"
 
diff --git a/generic/etc/ssh/sshd_config b/generic/etc/ssh/sshd_config
index 7cd7897..f529fc4 100644
--- a/generic/etc/ssh/sshd_config
+++ b/generic/etc/ssh/sshd_config
@@ -20,7 +20,7 @@ Protocol 2
 #HostKey /etc/ssh/ssh_host_key
 # HostKeys for protocol version 2
 HostKey /etc/ssh/ssh_host_rsa_key
-HostKey /etc/ssh/ssh_host_dsa_key
+HostKey /etc/ssh/ssh_host_ed25519_key
 
 # Lifetime and size of ephemeral version 1 server key
 #KeyRegenerationInterval 1h
-- 
2.4.2


-- 
ptxdist mailing list
ptxdist@pengutronix.de

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [ptxdist] [PATCH 2/3] openssh: Enable pre-auth sandboxing
  2015-06-09 16:57 [ptxdist] [PATCH 0/3] OpenSSH improvements Clemens Gruber
  2015-06-09 16:57 ` [ptxdist] [PATCH 1/3] openssh: Generate Ed25519 keys instead of DSA keys Clemens Gruber
@ 2015-06-09 16:57 ` Clemens Gruber
  2015-06-09 16:57 ` [ptxdist] [PATCH 3/3] openssh: Bump to current stable version 6.8p1 Clemens Gruber
  2 siblings, 0 replies; 4+ messages in thread
From: Clemens Gruber @ 2015-06-09 16:57 UTC (permalink / raw)
  To: ptxdist; +Cc: Clemens Gruber

On Linux, OpenSSH tries to use seccomp and falls back to
rlimit if seccomp is not available.
Since OpenSSH 6.2, the Linux seccomp-filter sandbox is
supported on ARM platforms.

Signed-off-by: Clemens Gruber <clemens.gruber@pqgruber.com>
---
 generic/etc/ssh/sshd_config | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/generic/etc/ssh/sshd_config b/generic/etc/ssh/sshd_config
index f529fc4..7856f70 100644
--- a/generic/etc/ssh/sshd_config
+++ b/generic/etc/ssh/sshd_config
@@ -88,7 +88,7 @@ PermitRootLogin yes
 #PrintLastLog yes
 #TCPKeepAlive yes
 #UseLogin no
-#UsePrivilegeSeparation yes
+UsePrivilegeSeparation sandbox
 #PermitUserEnvironment no
 #Compression delayed
 #ClientAliveInterval 0
-- 
2.4.2


-- 
ptxdist mailing list
ptxdist@pengutronix.de

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [ptxdist] [PATCH 3/3] openssh: Bump to current stable version 6.8p1
  2015-06-09 16:57 [ptxdist] [PATCH 0/3] OpenSSH improvements Clemens Gruber
  2015-06-09 16:57 ` [ptxdist] [PATCH 1/3] openssh: Generate Ed25519 keys instead of DSA keys Clemens Gruber
  2015-06-09 16:57 ` [ptxdist] [PATCH 2/3] openssh: Enable pre-auth sandboxing Clemens Gruber
@ 2015-06-09 16:57 ` Clemens Gruber
  2 siblings, 0 replies; 4+ messages in thread
From: Clemens Gruber @ 2015-06-09 16:57 UTC (permalink / raw)
  To: ptxdist; +Cc: Clemens Gruber

Signed-off-by: Clemens Gruber <clemens.gruber@pqgruber.com>
---
 rules/openssh.make | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/rules/openssh.make b/rules/openssh.make
index b43e147..4277148 100644
--- a/rules/openssh.make
+++ b/rules/openssh.make
@@ -17,8 +17,8 @@ PACKAGES-$(PTXCONF_OPENSSH) += openssh
 #
 # Paths and names
 #
-OPENSSH_VERSION	:= 6.6p1
-OPENSSH_MD5	:= 3e9800e6bca1fbac0eea4d41baa7f239
+OPENSSH_VERSION	:= 6.8p1
+OPENSSH_MD5	:= 08f72de6751acfbd0892b5f003922701
 OPENSSH		:= openssh-$(OPENSSH_VERSION)
 OPENSSH_SUFFIX	:= tar.gz
 OPENSSH_URL	:= \
-- 
2.4.2


-- 
ptxdist mailing list
ptxdist@pengutronix.de

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2015-06-09 16:58 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-06-09 16:57 [ptxdist] [PATCH 0/3] OpenSSH improvements Clemens Gruber
2015-06-09 16:57 ` [ptxdist] [PATCH 1/3] openssh: Generate Ed25519 keys instead of DSA keys Clemens Gruber
2015-06-09 16:57 ` [ptxdist] [PATCH 2/3] openssh: Enable pre-auth sandboxing Clemens Gruber
2015-06-09 16:57 ` [ptxdist] [PATCH 3/3] openssh: Bump to current stable version 6.8p1 Clemens Gruber

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox