Bug 932483 - VUL-1: openssh: The Logjam Attack / weakdh.org
VUL-1: openssh: The Logjam Attack / weakdh.org
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: ---
Assigned To: Security Team bot
Security Team bot
maint:running:62308:moderate maint:re...
:
Depends on:
Blocks: CVE-2015-4000
  Show dependency treegraph
 
Reported: 2015-05-27 12:15 UTC by Alexander Bergmann
Modified: 2019-01-31 13:33 UTC (History)
13 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2015-05-27 12:15:58 UTC
+++ This bug was initially created as a clone of Bug #931600 +++

This bug refers to the openssh Logjam impact.
Comment 1 Sebastian Krahmer 2015-05-27 12:54:53 UTC
OpenSSH includes "weak", hardcoded DH parameters (Oakley Groups),
as required by RFC. Nevertheless, more recent versions are not
affected, as they are using ECDH Kex by default. Additionally, it can be
configured on server and client side which Kex algos are offered. It is not
possible (unlike with TLS) by a MiM to downgrade the offered Kex ciphers
to something like "export" or fixed DH parameters.

So, this is more of a configuratuion issue.

Some references on how to secure your SSH config:
https://stribika.github.io/2015/01/04/secure-secure-shell.html
https://presentations.nordisch.org/olddognewtricks/

AFAIS, sle11sp3 and sle12 already use ECDH Kex.
Comment 2 Sebastian Krahmer 2015-05-27 13:39:52 UTC
I also checked sle11sp1. As sle11sp1 is using openssh-5.1p1, this version
is already using "dynamic" DH parameters:

#if OPENSSL_VERSION_NUMBER < 0x00907000L
# define KEX_DEFAULT_KEX                \
        "diffie-hellman-group-exchange-sha1," \
        "diffie-hellman-group14-sha1," \
        "diffie-hellman-group1-sha1"
#else
# define KEX_DEFAULT_KEX                \
        "diffie-hellman-group-exchange-sha256," \
        "diffie-hellman-group-exchange-sha1," \
        "diffie-hellman-group14-sha1," \
        "diffie-hellman-group1-sha1"
#endif


which means that there are group parameters negotiated during Kex
with help of the moduli file. Only if this file does not exist,
its a fallback to use the hardcoded DH params. So this version is not affected
either. Later versions also add curve parameters in front of the proposal.
Comment 3 Sebastian Krahmer 2015-05-27 13:44:58 UTC
Though, it is recommended to "adjust" your moduli file (or to create it)
to remove all moduli with a bitlength below your "trust-boundary",
as recommended in the references from comment#1.

Note that 1024bit params are estimated to take ~45million coreyears of
computation, which is still quite a large time slice. :)
Comment 4 Swamp Workflow Management 2015-05-27 22:00:16 UTC
bugbot adjusting priority
Comment 7 Sebastian Krahmer 2015-06-01 09:01:36 UTC
We need to remove the 1023bit size DH params (which are indeed 1024bit in
size due to manpage flaw) from the moduli file. They are a prime target for
pre-compute DL/weakdh.

openssh-6.9 will ship without 1024bit sizes:
https://anongit.mindrot.org/openssh.git/tree/moduli

Also, we might want to think about enlarging DH_GRP_MIN in our
future builds.
Comment 8 Petr Cerny 2015-06-09 13:21:12 UTC
(In reply to Sebastian Krahmer from comment #7)
> We need to remove the 1023bit size DH params (which are indeed 1024bit in
> size due to manpage flaw) from the moduli file. They are a prime target for
> pre-compute DL/weakdh.
> 
> openssh-6.9 will ship without 1024bit sizes:
> https://anongit.mindrot.org/openssh.git/tree/moduli
> 
> Also, we might want to think about enlarging DH_GRP_MIN in our
> future builds.

Are we rolling this out across all code streams?
I'm fine with that (and all for it), just asking for confirmation/permission.

Maybe you can also assign to me, once the decision is made, so that I know I should proceed.
Comment 19 Andreas Stieger 2015-07-01 12:35:12 UTC
OpenSSH 6.9p1 removes 1k groups:

https://anongit.mindrot.org/openssh.git/commit/?h=V_6_9&id=5ab7d5fa03ad55bc438fab45dfb3aeb30a3c237a

From 5ab7d5fa03ad55bc438fab45dfb3aeb30a3c237a Mon Sep 17 00:00:00 2001
From: Darren Tucker <dtucker@zip.com.au>
Date: Thu, 28 May 2015 10:03:40 +1000
Subject: New moduli file from OpenBSD, removing 1k groups.

Remove 1k bit groups.
Comment 20 Swamp Workflow Management 2015-07-15 15:53:17 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-07-29.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62212
Comment 24 Marcus Meissner 2015-09-10 09:39:29 UTC
not sure if we can see this easily as reproducer.
Comment 25 Marcus Meissner 2015-09-10 10:04:19 UTC
(ssh -Q kex  HOSTNAME   shows the  kex algorithms, 

 sss -vv HOSTNAME   shows the kex exchanges, but not the dh group bitsize
)
Comment 26 Swamp Workflow Management 2015-09-11 13:10:08 UTC
SUSE-SU-2015:1544-1: An update that solves 5 vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 903649,932483,936695,938746,943006,943010
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Server 12 (src):    openssh-6.6p1-29.1, openssh-askpass-gnome-6.6p1-29.1
SUSE Linux Enterprise Desktop 12 (src):    openssh-6.6p1-29.1, openssh-askpass-gnome-6.6p1-29.1
Comment 27 Swamp Workflow Management 2015-09-11 15:12:19 UTC
SUSE-SU-2015:1547-1: An update that solves 5 vulnerabilities and has 5 fixes is now available.

Category: security (moderate)
Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Server for VMWare 11-SP3 (src):    openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
SUSE Linux Enterprise Server 11-SP3 (src):    openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
Comment 28 Swamp Workflow Management 2015-09-11 16:12:32 UTC
SUSE-SU-2015:1547-2: An update that solves 5 vulnerabilities and has 5 fixes is now available.

Category: security (moderate)
Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Desktop 11-SP3 (src):    openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    openssh-6.2p2-0.17.1, openssh-askpass-gnome-6.2p2-0.17.3
Comment 29 Swamp Workflow Management 2015-09-21 07:12:27 UTC
SUSE-SU-2015:1581-1: An update that solves 5 vulnerabilities and has 6 fixes is now available.

Category: security (important)
Bug References: 673532,903649,905118,914309,916549,932483,936695,938746,943006,943010,945493
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Server for VMWare 11-SP3 (src):    openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
SUSE Linux Enterprise Server 11-SP3 (src):    openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
SUSE Linux Enterprise Desktop 11-SP3 (src):    openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    openssh-6.2p2-0.21.1, openssh-askpass-gnome-6.2p2-0.21.3
Comment 31 Swamp Workflow Management 2015-10-07 14:55:28 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-10-21.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62308
Comment 32 Swamp Workflow Management 2015-10-07 16:11:32 UTC
SUSE-SU-2015:1695-1: An update that solves 5 vulnerabilities and has 5 fixes is now available.

Category: security (moderate)
Bug References: 903649,932483,936695,938746,939932,943006,943010,945484,945493,947458
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600,CVE-2015-6563,CVE-2015-6564
Sources used:
SUSE Linux Enterprise Server 11-SP4 (src):    openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3
SUSE Linux Enterprise Desktop 11-SP4 (src):    openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    openssh-6.6p1-13.1, openssh-askpass-gnome-6.6p1-13.3
Comment 34 Swamp Workflow Management 2015-10-28 16:11:04 UTC
SUSE-SU-2015:1840-1: An update that solves three vulnerabilities and has four fixes is now available.

Category: security (moderate)
Bug References: 673532,903649,905118,914309,932483,936695,938746
CVE References: CVE-2015-4000,CVE-2015-5352,CVE-2015-5600
Sources used:
SUSE Linux Enterprise Server 11-SP2-LTSS (src):    openssh-5.1p1-41.69.1, openssh-askpass-gnome-5.1p1-41.69.4
Comment 36 Marcus Meissner 2016-03-23 08:32:05 UTC
released
Comment 39 Romanos Dodopoulos 2016-05-23 08:51:27 UTC
According to the latest change, it was decided to raise the minimum accepted size of the prime numbers to 2048 bits:

Added openssh-6.6p1-disable_short_DH_parameters.patch:
> +Raise minimal size of DH group parameters to 2048 bits like upstream did in
> +7.2. 1024b values are believed to be in breaking range for state adversaries
> +and the default moduli shipped with openssh have been around long enough to
> +make it more likely for them to be broken.

However, the moduli file still contains 1536-bit prime numbers which, according to Sebastian's commends bellow, is not recommended.

(In reply to Sebastian Krahmer from comment #3)
> Though, it is recommended to "adjust" your moduli file (or to create it)
> to remove all moduli with a bitlength below your "trust-boundary",
> as recommended in the references from comment#1.

(In reply to Sebastian Krahmer from comment #7)
> We need to remove the 1023bit size DH params (which are indeed 1024bit in
> size due to manpage flaw) from the moduli file. They are a prime target for
> pre-compute DL/weakdh.
> 
> openssh-6.9 will ship without 1024bit sizes:
> https://anongit.mindrot.org/openssh.git/tree/moduli

Finally, upstream seems to have removed 1535 bit primes from the moduli file as well.

That is perhaps not important but I mention it nevertheless.
Comment 40 Swamp Workflow Management 2016-05-23 18:08:17 UTC
SUSE-SU-2016:1386-1: An update that solves three vulnerabilities and has 9 fixes is now available.

Category: security (moderate)
Bug References: 729190,932483,945484,945493,947458,948902,960414,961368,962313,965576,970632,975865
CVE References: CVE-2015-8325,CVE-2016-1908,CVE-2016-3115
Sources used:
SUSE Linux Enterprise Server 12-SP1 (src):    openssh-6.6p1-42.1, openssh-askpass-gnome-6.6p1-42.1
SUSE Linux Enterprise Server 12 (src):    openssh-6.6p1-42.1, openssh-askpass-gnome-6.6p1-42.1
SUSE Linux Enterprise Desktop 12-SP1 (src):    openssh-6.6p1-42.1, openssh-askpass-gnome-6.6p1-42.1
SUSE Linux Enterprise Desktop 12 (src):    openssh-6.6p1-42.1, openssh-askpass-gnome-6.6p1-42.1
Comment 41 Bernhard Wiedemann 2016-05-27 10:00:37 UTC
This is an autogenerated message for OBS integration:
This bug (932483) was mentioned in
https://build.opensuse.org/request/show/398334 13.2 / openssh
Comment 42 Swamp Workflow Management 2016-05-31 17:09:41 UTC
openSUSE-SU-2016:1455-1: An update that solves three vulnerabilities and has 9 fixes is now available.

Category: security (moderate)
Bug References: 729190,932483,945484,945493,947458,948902,960414,961368,962313,965576,970632,975865
CVE References: CVE-2015-8325,CVE-2016-1908,CVE-2016-3115
Sources used:
openSUSE Leap 42.1 (src):    openssh-6.6p1-11.1, openssh-askpass-gnome-6.6p1-11.1
Comment 43 Swamp Workflow Management 2016-06-08 14:09:16 UTC
SUSE-SU-2016:1528-1: An update that solves three vulnerabilities and has 7 fixes is now available.

Category: security (moderate)
Bug References: 729190,932483,948902,960414,961368,961494,962313,965576,970632,975865
CVE References: CVE-2015-8325,CVE-2016-1908,CVE-2016-3115
Sources used:
SUSE Linux Enterprise Server 11-SP4 (src):    openssh-6.6p1-21.1, openssh-askpass-gnome-6.6p1-21.3
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    openssh-6.6p1-21.1, openssh-askpass-gnome-6.6p1-21.3
Comment 45 Swamp Workflow Management 2016-09-26 19:09:43 UTC
SUSE-SU-2016:2388-1: An update that solves 5 vulnerabilities and has 5 fixes is now available.

Category: security (moderate)
Bug References: 932483,948902,959096,962313,962794,970632,975865,981654,989363,992533
CVE References: CVE-2015-8325,CVE-2016-1908,CVE-2016-3115,CVE-2016-6210,CVE-2016-6515
Sources used:
SUSE OpenStack Cloud 5 (src):    openssh-6.2p2-0.33.2, openssh-askpass-gnome-6.2p2-0.33.5
SUSE Manager Proxy 2.1 (src):    openssh-6.2p2-0.33.2, openssh-askpass-gnome-6.2p2-0.33.5
SUSE Manager 2.1 (src):    openssh-6.2p2-0.33.2, openssh-askpass-gnome-6.2p2-0.33.5
SUSE Linux Enterprise Server 11-SP3-LTSS (src):    openssh-6.2p2-0.33.2, openssh-askpass-gnome-6.2p2-0.33.5
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    openssh-6.2p2-0.33.2, openssh-askpass-gnome-6.2p2-0.33.5
SUSE Linux Enterprise Debuginfo 11-SP3 (src):    openssh-6.2p2-0.33.2, openssh-askpass-gnome-6.2p2-0.33.5
Comment 46 Andreas Stieger 2016-10-05 12:43:39 UTC
still in progress
Comment 48 Swamp Workflow Management 2016-10-17 18:09:35 UTC
SUSE-SU-2016:2555-1: An update that solves 5 vulnerabilities and has 8 fixes is now available.

Category: security (moderate)
Bug References: 729190,932483,948902,960414,961368,961494,962313,965576,970632,975865,981654,989363,992533
CVE References: CVE-2015-8325,CVE-2016-1908,CVE-2016-3115,CVE-2016-6210,CVE-2016-6515
Sources used:
SUSE Linux Enterprise Server 11-SECURITY (src):    openssh-openssl1-6.6p1-15.1
Comment 49 Marcus Meissner 2016-10-19 11:44:48 UTC
released
Comment 51 Swamp Workflow Management 2017-01-11 10:01:09 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2017-01-25.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/63339