summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
authorJeff Forcier <jeff@bitprophet.org>2023-12-15 22:19:39 -0500
committerJeff Forcier <jeff@bitprophet.org>2023-12-15 22:20:09 -0500
commit4c7f0410c533cdf0df2890512237961f934f5ab9 (patch)
tree0c8b3cdb7ec0990c14b6b2799e583ab83cb26004
parent2566d2d5d94d331041d8ca3ab1d72ada93e642e2 (diff)
Early changelog re: Terrapin
-rw-r--r--sites/www/changelog.rst26
1 files changed, 26 insertions, 0 deletions
diff --git a/sites/www/changelog.rst b/sites/www/changelog.rst
index 45df830c..33f4ae1b 100644
--- a/sites/www/changelog.rst
+++ b/sites/www/changelog.rst
@@ -2,6 +2,32 @@
Changelog
=========
+- :bug:`-` Address `CVE xxx <https://terrapin-attack.com/>`_ (aka the "Terrapin
+ Attack", a vulnerability found in the SSH protocol re: treatment of packet
+ sequence numbers) as follows:
+
+ - The vulnerability only impacts encrypt-then-MAC digest algorithms in
+ tandem with CBC ciphers, and ChaCha20-poly1305; of these, Paramiko
+ currently only implements ``hmac-sha2-(256|512)-etm`` in tandem with
+ ``AES-CBC``. If you are unable to upgrade to Paramiko versions containing
+ the below fixes right away, you may instead use the
+ ``disabled_algorithms`` connection option to disable the ETM MACs and/or
+ the CBC ciphers (this option is present in Paramiko >=2.6).
+ - As the fix for the vulnerability requires both ends of the connection to
+ cooperate, the below changes will only take effect when the remote end is
+ OpenSSH >= TK (or equivalent, such as Paramiko in server mode, as of this
+ patch version) and configured to use the new "strict kex" mode. Paramiko
+ will always attempt to use "strict kex" mode if offered.
+ - Paramiko will raise TK if any protocol messages are received
+ out-of-order during key exchange. Previously, TK.
+ - Key (re)negotiation -- i.e. ``MSG_NEWKEYS``, whenever it is encountered
+ -- now resets packet sequence numbers. (This should be invisible to users
+ during normal operation, only causing exceptions if the exploit is
+ encountered.)
+
+ Thanks to Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk for submitting
+ details on the CVE prior to release.
+
- :bug:`-` Tweak ``ext-info-(c|s)`` detection during KEXINIT protocol phase;
the original implementation made assumptions based on an OpenSSH
implementation detail.