-
jonas’
Qualys struck again: https://marc.info/?l=oss-security&m=173986993304277&w=2 (MitM in ssh client under centain circumstances; pre-auth resource exhaustion (both memory and CPU) in both client and server)
-
moparisthebest
Nice, after last set of openssh vulns I changed it to no longer listen on the public interface, now I have to connect via wireguard to ssh in, little peace of mind against this kind of stuff
-
jonas’
wait until the first wireguard rce ;)
-
jonas’
but yeah.
-
jonas’
I'm also looking forward to when I do that.
-
roughnecks
https://lists.debian.org/debian-security-announce/2025/msg00030.html
-
moparisthebest
wireguard has the huge advantage that it's invisible to attackers / network scanners, it won't respond unless you have the right keys
-
TheCoffeMaker
wg is the way to go
-
roughnecks
wg is the w(t)g :D
😂 1 -
TheCoffeMaker
> wg is the w(t)g :D 😂 ↺
-
robbystk
Looks like the default settings in recent versions mitigate this sufficiently, right?
-
moparisthebest
I don't think so
-
jonas’
robbystk, they mitigate the MitM, but not the resource exhaustion (on the client side at the very least, not sure about server)
-
Menel
The update I did earlier mitigates it I guess
-
moparisthebest
> robbystk, they mitigate the MitM, but not the resource exhaustion (on the client side at the very least, not sure about server) Well openssh defaults mean nothing vs what your distro ships or what you have configured, they specifically note that freebsd shipped with this enabled ↺
-
moparisthebest
So upgrade or at least check your config
-
robbystk
> On the server side, this attack can be easily mitigated by mechanisms that are already built in OpenSSH The defaults for LoginGraceTime, MaxStartups, and PerSourcePenalties look reasonable to me. Are any of you tweaking those at all?
-
robbystk
moparisthebest: good point that the distro can modify the defaults. I will check my configs
-
jonas’
one way to check is `ssh -G some-host | grep -i verify`, though you should note that settings can change by the target host you connect to
-
tom
Wgitm attack?