/
Security Bulletin – Clarity SFTP Service Vulnerability & Remediation

Security Bulletin – Clarity SFTP Service Vulnerability & Remediation

Rego is dedicated to protecting and securing your data stored in Clarity, hosted by Rego on Amazon Web Services.  Rego abides by the security frameworks published by NIST, AWS, and other organizations to ensure we meet our legal and contractual obligations with all of our customers. As part of this commitment, we routinely evaluate security threats and remediate issues as necessary.

Rego plans to update the AWS SFTP security policy by removing deprecated weak security ciphers by August 17th, 2024 in the Canada region and on September 21st, 2024 for the USA region. For connections to the Clarity SFTP site, cryptographic algorithms will be restricted to the list below.

** Immediate attention is required if you are using a weak cipher not included in the list below. In such cases, please collaborate with your Information Security team and SFTP client vendor to update your SFTP client connection to a supported cryptographic algorithm. If you have any additional questions please contact our support team. **

SSH Ciphers

SSH Ciphers

aes128-ctr

aes128-gcm@openssh.com

aes192-ctr

aes256-ctr

aes256-gcm@openssh.com

SSH KEXs

SSH KEXs

curve25519-sha256

curve25519-sha256@libssh.org

diffie-hellman-group16-sha512

diffie-hellman-group18-sha512

diffie-hellman-group-exchange-sha256

ecdh-nistp256-kyber-512r3-sha256-d00@openquantumsafe.org

ecdh-nistp384-kyber-768r3-sha384-d00@openquantumsafe.org

ecdh-nistp521-kyber-1024r3-sha512-d00@openquantumsafe.org

ecdh-sha2-nistp256

ecdh-sha2-nistp384

ecdh-sha2-nistp521

x25519-kyber-512r3-sha256-d00@amazon.com

SSH Macs

SSH Macs

hmac-sha2-256-etm@openssh.com

hmac-sha2-512-etm@openssh.com

TlsCiphers

TlsCiphers

TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256

TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

Please note that there is a single SFTP service which is common for all environments. Hence when the change implemented, it will apply to all environments at the same time.  We have thus set up a test SFTP server with the updated security policy implemented, so that you can test new SFTP connectivity and functionality. 

Related content