===================== OpenSSH Best Practice ===================== Key Types ========= Supported Key Types ------------------- OpenSSH supports using different key types. For the current protocol version 2 the supported key types are: * `Digital Signature Algorithm (DSA) `_ * `Ron Rivest, Adi Shamir and Leonard Adleman Algorithm (RSA) `_ OpenSSH `version 5.7 `_ and newer support additionally: * `Elliptic Curve Digital Signature Algorithm (ECDSA) `_ Broken Key Types (aka Debian OpenSSL vulnerability) --------------------------------------------------- In April 2006 Debian added a patch to OpenSSL to fix valgrind errors (`#363516 `_). In May 2008 it was discovered that this patch caused a weak Random Number Generator (RNG) due to almost no entropy in the pool. Having such a weak RNG limited the amount of possible different key generations to such a minimum that, in the case of OpenSSH to less than 32'000, a simple brute force attack with all possible keys is rather quickly to acchieve. Since OpenSSL is reused in other projects, keys affected by this include OpenSSH, OpenVPN, DNSSEC and more. Notably GnuPG was not affected. For more information see: * `Common Vulnerabilities and Exposures List (CVE-2008-0166) `_ * `Debian Security Announcement (DSA-1571) `_ * `LWN: "Debian, OpenSSL, and a lack of cooperation" `_ * `LWN: "Debian vulnerability has widespread effects" `_ RSA keys rely only during key generation on a strong RNG. Therefore any RSA keys created with a vulnerable OpenSSL version need to be replaced with ones created from a fixed OpenSSL version. RSA keys can be easily checked against a blacklist of vulnerable keys and in the case of OpenSSH, authentication attempts be rejected. In Debian this is done through the `openssh-blacklist `_ package. Individual keys can be checked with the ssh-vulnkey program. DSA keys rely both during key generation and key usage (signing) on a strong RNG. The same procedure for RSA keys applies to any DSA keys created with a vulnerable OpenSSL version too. Additionally, from a system administration point, it is not possible to ensure that existing non-vulernable DSA user keys are not used on vulnerable systems. It is enough to get a signature made from a non-vulnerable DSA key on a system with a vulnerable OpenSSL version to compute the private key. Therefore, all DSA keys should be considered to be vulnerable. ECDSA does not suffer from the OpenSSL vulnerability. There are issues with it from time to time as it is a rather newly implemented algorithm (e.g. `CVE-2008-5077 `_, `CVE-2011-1945 `_). There are several rumours that NSA has subverted EC-based algorithms (FIXME: add links to the usual suspects). `Dan Bernstein `_ and `Tanja Lange `_ have presented their own curve (`Curve25519 `_) which has been adopted by OpenSSH and others. However, it remains to be seen if this curve has been proberly choosen and implemented. Recommended Key Types --------------------- We recommend to: * neither use nor create any DSA host keys * not allow DSA user keys for authentication * install both openssh-blacklist and openssh-blacklist-extra packages * use RSA only for both host and user keys Key Sizes ========= Supported Key Sizes ------------------- OpenSSH supports using different key sizes. For the current protocol version 2 the supported key sizes are: * 1024 bits for `DSA `_ * 768 to 4096 bits for `RSA `_ OpenSSH `version 5.7 `_ and newer support additionally: * 256, 384 or 521 bits for `ECDSA `_ Broken Key Sizes ---------------- FIXME Recommended Key Sizes --------------------- We recommend to: * use 4096 bits for `RSA `_ * use 521 bits for `ECDSA `_