XMPP Service Operators - 2025-02-18


  1. jonas’

    Qualys struck again: https://marc.info/?l=oss-security&m=173986993304277&w=2 (MitM in ssh client under centain circumstances; pre-auth resource exhaustion (both memory and CPU) in both client and server)

  2. moparisthebest

    Nice, after last set of openssh vulns I changed it to no longer listen on the public interface, now I have to connect via wireguard to ssh in, little peace of mind against this kind of stuff

  3. jonas’

    wait until the first wireguard rce ;)

  4. jonas’

    but yeah.

  5. jonas’

    I'm also looking forward to when I do that.

  6. roughnecks

    https://lists.debian.org/debian-security-announce/2025/msg00030.html

  7. moparisthebest

    wireguard has the huge advantage that it's invisible to attackers / network scanners, it won't respond unless you have the right keys

  8. TheCoffeMaker

    wg is the way to go

  9. roughnecks

    wg is the w(t)g :D

    😂 1
  10. TheCoffeMaker

    > wg is the w(t)g :D 😂

  11. robbystk

    Looks like the default settings in recent versions mitigate this sufficiently, right?

  12. moparisthebest

    I don't think so

  13. jonas’

    robbystk, they mitigate the MitM, but not the resource exhaustion (on the client side at the very least, not sure about server)

  14. Menel

    The update I did earlier mitigates it I guess

  15. moparisthebest

    > robbystk, they mitigate the MitM, but not the resource exhaustion (on the client side at the very least, not sure about server) Well openssh defaults mean nothing vs what your distro ships or what you have configured, they specifically note that freebsd shipped with this enabled

  16. moparisthebest

    So upgrade or at least check your config

  17. robbystk

    > On the server side, this attack can be easily mitigated by mechanisms that are already built in OpenSSH The defaults for LoginGraceTime, MaxStartups, and PerSourcePenalties look reasonable to me. Are any of you tweaking those at all?

  18. robbystk

    moparisthebest: good point that the distro can modify the defaults. I will check my configs

  19. jonas’

    one way to check is `ssh -G some-host | grep -i verify`, though you should note that settings can change by the target host you connect to

  20. tom

    Wgitm attack?