From Fedora Project Wiki

No edit summary
No edit summary
Line 6: Line 6:
#:<pre>
#:<pre>
#::cp /etc/ssh/sshd_config sshd_config.bak
#::cp /etc/ssh/sshd_config sshd_config.bak
#::echo 'Ciphers aes128-cbc' >/etc/ssh/sshd_config
#::echo -e 'Match *\n    Ciphers 3des-cbc' >>/etc/ssh/sshd_config
#::service sshd restart</pre>
#::service sshd restart</pre>
# Switch to NORMAL profile
# Switch to NORMAL profile
#:<pre>
#:<pre>
#::update-crypto-policies --set NORMAL</pre>
#::update-crypto-policies --set DEFAULT</pre>
# Connect to the server
# Connect to the server
#:<pre>
#:<pre>

Revision as of 13:47, 29 March 2017

Description

OpenSSH support


How to test

We will test if openssh client respects current policy

  1. Prepare ssh server that uses old crypto
    cp /etc/ssh/sshd_config sshd_config.bak
    echo -e 'Match *\n Ciphers 3des-cbc' >>/etc/ssh/sshd_config
    service sshd restart
  2. Switch to NORMAL profile
    update-crypto-policies --set DEFAULT
  3. Connect to the server
    ssh -vv localhost 'echo CONNECTED'
  4. Switch to FUTURE profile
    update-crypto-policies --set FUTURE
  5. Connect to the server
    ssh -vv localhost 'echo CONNECTED'
  6. Restore original settings
    cp sshd_config.bak /etc/ssh/sshd_config
    service sshd restart

Expected Results

  1. sshd server starts successfully
  2. no error
  3. connection is established - CONNECTED is printed
  4. no error
  5. connection is NOT established
  6. sshd server starts successfully