REPRODUCIBILITY: 100%
OS VERSION: 4.5.0.25 and below, fixed in 4.6 and higher
HARDWARE: any
UI LANGUAGE: any
REGRESSION: no
DESCRIPTION:
It has been confirmed that this issue is fixed in the upcoming Sailfish OS 4.6 release, “Sauna”.
Older Sailfish OS ships with OpenSSH version 8.8p1, which is vulnerable to a certain attack called Terrapin.
See https://terrapin-attack.com/ for details.
(Read it thoroughly, especially the first entry in the FAQ. → Don’t panic.)
PRECONDITIONS:
Stock install of OpenSSH on any Sailfish OS phone.
STEPS TO REPRODUCE:
See the website link above. Using their vulnerability scanner one gets something like this output when running on a SFOS phone:
./Terrapin_Scanner_Linux_aarch64 -connect localhost:22
================================================================================
==================================== Report ====================================
================================================================================
Remote Banner: SSH-2.0-OpenSSH_8.8
ChaCha20-Poly1305 support: true
CBC-EtM support: false
Strict key exchange support: false
The scanned peer is VULNERABLE to Terrapin.
Note: This tool is provided as is, with no warranty whatsoever. It determines
the vulnerability of a peer by checking the supported algorithms and
support for strict key exchange. It may falsely claim a peer to be
vulnerable if the vendor supports countermeasures other than strict key
exchange.
For more details visit our website available at https://terrapin-attack.com
EXPECTED RESULT:
n/a
ACTUAL RESULT:
n/a
MODIFICATIONS:
n/a
ADDITIONAL INFORMATION:
On Sailfish OS GitHub, PR#4 was merged, which upgrades OpenSSH to version 9.6p1 which should not be affected.
Therefore there is reason to believe that It has been confirmed that this issue is already fixed in the upcoming Sailfish OS 4.6 release, “Sauna”.