We have a remote office with a service that scans for vulnerabilities. It's for PCI compliance (this site doesn't require it it's just a staff work from home office) and its triggering because if we have SSH enabled it picks up that ssh-dss is still available and running ssh -v <host> does show ssh-dss being offered.
The actual public key (password login disabled) is an 2048 key, but it still offeres it and the scanner picks that up making our report look messy. Overall though reading it sounds like dropbear dropped a number of less secure exchanges and cypers a while ago but appears ASUS hasn't updated? Is this something we can override in JFFS or someting else?
I can set it to a non-standard port but that's just hiding the issue not actually resolving it and in general be nice to force more secure settings.
Actual report:
Threat
The SSH protocol (Secure Shell) is a method for secure remote login from one computer to another. The SSH Server is using a small Public Key.
Best practices require that RSA digital signatures be 2048 or more bits long to provide adequate security. Key lengths of 1024 are acceptable through 2013, but since 2011 they are considered deprecated.
For more information, please refer to NIST Special Publication 800-131A (http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf).
Only server keys that are not part of a certificate are reported in this QID. OpenSSH certificates using short keys are reported in QID 38733. X.509 certificates using short
keys are reported in QID 38171.
IMPACT:
A man-in-the-middle attacker can exploit this vulnerability to record the communication to decrypt the session key and even the messages.
SOLUTION:
DSA keys and RSA keys shorter than 2048 bits are considered vulnerable. It is recommended to install a RSA public key length of at least 2048 bits or greater, or to switch to ECDSA or EdDSA.
RESULT:
Algorithm Length
ssh-dss 1024 bits
The actual public key (password login disabled) is an 2048 key, but it still offeres it and the scanner picks that up making our report look messy. Overall though reading it sounds like dropbear dropped a number of less secure exchanges and cypers a while ago but appears ASUS hasn't updated? Is this something we can override in JFFS or someting else?
I can set it to a non-standard port but that's just hiding the issue not actually resolving it and in general be nice to force more secure settings.
Actual report:
Threat
The SSH protocol (Secure Shell) is a method for secure remote login from one computer to another. The SSH Server is using a small Public Key.
Best practices require that RSA digital signatures be 2048 or more bits long to provide adequate security. Key lengths of 1024 are acceptable through 2013, but since 2011 they are considered deprecated.
For more information, please refer to NIST Special Publication 800-131A (http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf).
Only server keys that are not part of a certificate are reported in this QID. OpenSSH certificates using short keys are reported in QID 38733. X.509 certificates using short
keys are reported in QID 38171.
IMPACT:
A man-in-the-middle attacker can exploit this vulnerability to record the communication to decrypt the session key and even the messages.
SOLUTION:
DSA keys and RSA keys shorter than 2048 bits are considered vulnerable. It is recommended to install a RSA public key length of at least 2048 bits or greater, or to switch to ECDSA or EdDSA.
RESULT:
Algorithm Length
ssh-dss 1024 bits