Skip to content

CBC CIphers not enabled by default #5279

@linuxus

Description

@linuxus

Hello folks,
I'm in the middle of doing an infrastructure deployment via Terrraform on a private cloud (OpenStack) and part of this deployment I'm creating resources (virtual routers). I have configuration steps for this virtual router that uses a ssh connection but there is an issue with the connection provisioner and here is the error:
ssh: handshake failed: ssh: no common algorithm for client to server cipher; client offered: [aes128-ctr aes192-ctr aes256-ctr [email protected] arcfour256 arcfour128], server offered: [aes128-cbc 3des-cbc blowfish-cbc cast128-cbc arcfour aes192-cbc aes256-cbc [email protected]]

The virtual router has *-cbc cipher enabled and I cannot disabled it nor update it with *-ctr ciphers because it's virtual embedded appliance with a strip down proprietary OS. Was/is anyone was/is able to add option flag to use less secure cipher for ssh session from Terraform source code to include this option. I understand that Go crypto/ssh does not by default support *-cbc cipher but there are some legacy network gears that are using these old versions. All of these are in a private behind firewall secure datacenter and I'm less concerned about this security matter until the virtual router os is updated with better ciphers.

Thank you in advance,
Abdi

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions