ssh cannot use modern cipher due to linking to prehistoric OpenSSL/OSSLShim 0.9.8 from 2011
| Originator: | pepi.zawodsky | ||
| Number: | rdar://15433594 | Date Originated: | 2013-11-10 |
| Status: | open | Resolved: | |
| Product: | ssh, OS X Mavericks | Product Version: | OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 |
| Classification: | security | Reproducible: | always |
Summary: ssh provided with OS X Mavericks is linked against a prehistoric version of OpenSSL/OSSLShim 0.9.8r from 2011. This prevents the use of secure and modern ciphers and HMACs with ssh. Steps to Reproduce: Add aes128-gcm@openssh.com,aes256-gcm@openssh.com as preferred ciphers to /etc/sshd_config or /etc/ssh_config or ~/.ssh/config. Upon trying to connect ssh complains about an illegal cipher setting and will refuse to run. Checking man 5 ssh_config in the Cipher section shows an example with aes128-gcm@openssh.com,aes256-gcm@openssh.com suggesting that these ciphers actually should work. Since AES-GCM was only added in OpenSSL 1.0.1 this can't work. So either the man page give misleading (and hence leading to frustration) information or, actually the case, ssh is linked against a prehistory version of OpenSSL from 2011 preventing the use of AES-GCM. Expected Results: AES-GCM should be available as a working cipher as the documentation suggests. Actual Results: Trying to use aes128-gcm@openssh.com,aes256-gcm@openssh.com as ciphers results in an error message about an illegal cipher setting. Version: OS X 10.9 Mavericks 13A603 OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 Notes: SSH should be immediately updated to the current 6.4 release to work around CVE-2013-4548 AND be linked against the _current_ openssl 1.0.1 version enabling the use of secure ciphers and MACs. Not being able to have an as-secure-as-possible SSH environment on OS X is absolutely not acceptable due to the US Governments and NSA's attacks on human rights, information security, and computer systems which require the use of secure and modern ciphers.
Comments
Please note: Reports posted here will not necessarily be seen by Apple. All problems should be submitted at bugreport.apple.com before they are posted here. Please only post information for Radars that you have filed yourself, and please do not include Apple confidential information in your posts. Thank you!