Security Bulletin – Clarity SFTP Service Vulnerability & Remediation
Rego is dedicated to protecting and securing your data stored in Clarity, hosted by Rego on Amazon Web Services. Rego abides by the security frameworks published by NIST, AWS, and other organizations to ensure we meet our legal and contractual obligations with all of our customers. As part of this commitment, we routinely evaluate security threats and remediate issues as necessary.
Rego plans to update the AWS SFTP security policy by removing deprecated weak security ciphers by August 17th, 2024 in the Canada region and on September 21st, 2024 for the USA region. For connections to the Clarity SFTP site, cryptographic algorithms will be restricted to the list below.
** Immediate attention is required if you are using a weak cipher not included in the list below. In such cases, please collaborate with your Information Security team and SFTP client vendor to update your SFTP client connection to a supported cryptographic algorithm. If you have any additional questions please contact our support team. **
SSH Ciphers |
---|
aes128-ctr |
aes128-gcm@openssh.com |
aes192-ctr |
aes256-ctr |
aes256-gcm@openssh.com |
SSH KEXs |
---|
curve25519-sha256 |
curve25519-sha256@libssh.org |
diffie-hellman-group16-sha512 |
diffie-hellman-group18-sha512 |
diffie-hellman-group-exchange-sha256 |
ecdh-nistp256-kyber-512r3-sha256-d00@openquantumsafe.org |
ecdh-nistp384-kyber-768r3-sha384-d00@openquantumsafe.org |
ecdh-nistp521-kyber-1024r3-sha512-d00@openquantumsafe.org |
ecdh-sha2-nistp256 |
ecdh-sha2-nistp384 |
ecdh-sha2-nistp521 |
x25519-kyber-512r3-sha256-d00@amazon.com |
SSH Macs |
---|
hmac-sha2-256-etm@openssh.com |
hmac-sha2-512-etm@openssh.com |
TlsCiphers |
---|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 |
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 |
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 |
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 |
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 |
Please note that there is a single SFTP service which is common for all environments. Hence when the change implemented, it will apply to all environments at the same time. We have thus set up a test SFTP server with the updated security policy implemented, so that you can test new SFTP connectivity and functionality.