mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-07-18 19:41:01 -05:00
Terrapin warning: say if reconfiguration can help.
The Terrapin vulnerability affects the modified binary packet protocol used with ChaCha20+Poly1305, and also CBC-mode ciphers in ETM mode. It's best prevented by the new strict-kex mode, but if the server can't handle that protocol alteration, another approach is to change PuTTY's configuration so that it will negotiate a different algorithm. That may not be possible either (an obvious case being if the server has been manually configured to _only_ support vulnerable modes). But if it is possible, then it would be nice for us to detect that and show how to do it. That could be a hard problem in general, but the most likely cause of it is configuring ChaCha20 to the top of the cipher list, so that it's selected ahead of things that aren't vulnerable. And it's reasonably easy to do just one fantasy-renegotiation, having moved ChaCha20 down to below the warn line, and see if that sorts it out. If it does, we can pass on that advice to the user.
This commit is contained in:
1
ssh.h
1
ssh.h
@ -1908,6 +1908,7 @@ bool get_commasep_word(ptrlen *list, ptrlen *word);
|
||||
typedef enum WeakCryptoReason {
|
||||
WCR_BELOW_THRESHOLD, /* user has told us to consider it weak */
|
||||
WCR_TERRAPIN, /* known vulnerability CVE-2023-48795 */
|
||||
WCR_TERRAPIN_AVOIDABLE, /* same, but demoting ChaCha20 can avoid it */
|
||||
} WeakCryptoReason;
|
||||
|
||||
SeatPromptResult verify_ssh_host_key(
|
||||
|
Reference in New Issue
Block a user