mirror of
				https://github.com/decalage2/awesome-security-hardening.git
				synced 2025-11-03 23:35:35 +01:00 
			
		
		
		
	added IETF - Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH)
This commit is contained in:
		@@ -189,6 +189,7 @@ See also [Active Directory](#active-directory) and [ADFS](#adfs) below.
 | 
				
			|||||||
- [Positron Security SSH Hardening Guides](https://www.sshaudit.com/hardening_guides.html) (2017-2018) - focused on crypto algorithms
 | 
					- [Positron Security SSH Hardening Guides](https://www.sshaudit.com/hardening_guides.html) (2017-2018) - focused on crypto algorithms
 | 
				
			||||||
- [stribika - Secure Secure Shell](https://stribika.github.io/2015/01/04/secure-secure-shell.html) (2015) - some algorithm recommendations might be slightly outdated
 | 
					- [stribika - Secure Secure Shell](https://stribika.github.io/2015/01/04/secure-secure-shell.html) (2015) - some algorithm recommendations might be slightly outdated
 | 
				
			||||||
- [Applied Crypto Hardening: bettercrypto.org](https://bettercrypto.org/) - handy reference on how to configure the most common services’ crypto settings (TLS/SSL, PGP, SSH and other cryptographic tools)
 | 
					- [Applied Crypto Hardening: bettercrypto.org](https://bettercrypto.org/) - handy reference on how to configure the most common services’ crypto settings (TLS/SSL, PGP, SSH and other cryptographic tools)
 | 
				
			||||||
 | 
					- [IETF - Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH) draft-ietf-curdle-ssh-kex-sha2-10](https://tools.ietf.org/html/draft-ietf-curdle-ssh-kex-sha2-10) - update to the recommended set of key exchange methods for use in the Secure Shell (SSH) protocol to meet evolving needs for stronger security. This document updates RFC 4250.
 | 
				
			||||||
- [Gravitational - How to SSH Properly](https://gravitational.com/blog/how-to-ssh-properly) - how to configure SSH to use certificates and two-factor authentication
 | 
					- [Gravitational - How to SSH Properly](https://gravitational.com/blog/how-to-ssh-properly) - how to configure SSH to use certificates and two-factor authentication
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### TLS/SSL
 | 
					### TLS/SSL
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user