this post was submitted on 12 Jan 2024
29 points (100.0% liked)

Technology

37707 readers
384 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
top 6 comments
sorted by: hot top controversial new old
[–] [email protected] 6 points 10 months ago

If anyone out there is still using DSA, they need to be punished for negligence.

[–] [email protected] 5 points 10 months ago* (last edited 10 months ago) (2 children)

Finally! I wish OpenSSH also plan making RSA optional at build time, and set a timeline for removal shifted 1 or 2 years after DSA.

We are also likely to start exploring a post-quantum signature algorithm soon and are mindful of the overall size and complexity of the key/signature code.

That's great news, if OpenSSH contributors commit to adding post-quantum cryptography, it's bigger news than DSA removal.

[–] [email protected] 2 points 10 months ago (1 children)

The problem seems to be finding a post-quantum algorithm that doesn't get obliterated by pre-quantum computers like what happened to SIKE:

https://m-cacm.acm.org/news/269080-nist-post-quantum-cryptography-candidate-cracked/fulltext

[–] [email protected] 2 points 10 months ago* (last edited 10 months ago)

Good point, we just dodged a bullet there. It's worrying and reassuring at the same time. If it wasn't for NIST's open process for selecting new algorithms, they might not have discovered SIKE is broken until after it become a standard. Thankfully NIST has a years long, multi-round process for algo selection, where each team (and the public) can try to crack competitors' algorithms. This helps filter out weak ones before making a final decision on the standard algo.

[–] [email protected] 1 points 10 months ago (1 children)

That's doable for the server - but an OpenSSH client without RSA support will be useless for the next one or two decades, assuming the various appliance and cloud vendors react faster than they usually do.

[–] [email protected] 1 points 10 months ago* (last edited 10 months ago)

Different timelines could be set for client and server, for instance by disabling RSA by default for server software first, and 2 years later for client software.

As the article explain, optional doesn't mean it's gone. Distributions can and already distribute a separate version for OpenSSH with old algorithms (eg for sshv1) for people forced to work with old servers. Even if distributions do not, anyone can also build OpenSSH themselves with whatever option they want.