Dropbear 2025.87
Matt Johnston
matt at ucc.asn.au
Thu Mar 6 00:02:53 AWST 2025
Hi all,
Dropbear 2025.87 is released.
It adds post-quantum key exchange methods, and disables sha1
by default.
Cheers,
Matt
2025.87 - 5 March 2025
Note >> for compatibility/configuration changes
- >> Disable SHA-1 algorithms by default. SHA-1 has known weakness and
most implementations support alternatives.
- Add post-quantum key exchange. These avoid the possibility of current
stored traffic being decrypted using a possible future quantum
computer.
sntrup761 added by Matt Johnston, using sntrup761 implementation from
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and
Christine van Vredendaal, with integration work from OpenSSH.
ML-KEM added by Loganaden Velvindron, Jaykishan Mutkawoa, Kavish Nadan,
using libcrux, also based on OpenSSH work.
These do increase code size, at least sntrup761 is recommended,
see default_options.h
- >> Decompression is disabled on the server, compression
is still supported.
This avoids attack surface for zlib and saves runtime memory.
- Add -D server flag to specify authorized_keys directory, from Darren Tucker.
- Include remote host in "Login attempt with wrong user" message for fail2ban,
patch from MichaIng.
- Workaround writing hostkeys on FUSE filesystem that don't
support hardlinks, reported by elijahr.
- Fix truncated error messages such as host key mismatch.
- >> Preference aes256 ahead of aes128 for the client. chacha20-poly1305
is still first preference.
- Fix ubsan failure in curve25519 code, reported by Steven Bytnar.
Has no effect on execution.
More information about the Dropbear
mailing list