From 858178a142e1d1a89304808fcfc4ddaa725b3a1a Mon Sep 17 00:00:00 2001 From: Conrad Meyer Date: Sat, 28 Jul 2018 19:35:49 +0000 Subject: [PATCH] Remove insecure ciphers from GCE sshd configuration They were added for unclear reasons in r277263. The current OpenSSH defaults (7.5+) are reasonable, and do not include the insecure rc4 cipher: chacha20-poly1305@openssh.com, aes128-ctr,aes192-ctr,aes256-ctr, aes128-gcm@openssh.com,aes256-gcm@openssh.com, aes128-cbc,aes192-cbc,aes256-cbc I think I recall there being a reason for a specific list of ciphers on GCE at the time, but I do not recall what it was, and cannot find any current GCE documentation of such a list. So, just revert the explicit configuration and use sane openssh defaults. PR: 230092 Submitted by: Gustavo Scalet MFC after: 3 days Security: yes --- release/tools/gce.conf | 1 - 1 file changed, 1 deletion(-) diff --git a/release/tools/gce.conf b/release/tools/gce.conf index 1ae830ce7905..cda6b40ab7ac 100644 --- a/release/tools/gce.conf +++ b/release/tools/gce.conf @@ -66,7 +66,6 @@ EOF ChallengeResponseAuthentication no X11Forwarding no AcceptEnv LANG -Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc AllowAgentForwarding no ClientAliveInterval 420 EOF