2015-12-23 03:56:13 +01:00
# ssh-audit
2021-08-26 19:12:13 +02:00
[![License ](https://img.shields.io/badge/license-MIT-brightgreen.svg )](https://github.com/jtesta/ssh-audit/blob/master/LICENSE)
[![PyPI Downloads ](https://img.shields.io/pypi/dm/ssh-audit )](https://pypi.org/project/ssh-audit/)
[![Docker Pulls ](https://img.shields.io/docker/pulls/positronsecurity/ssh-audit )](https://hub.docker.com/r/positronsecurity/ssh-audit)
2021-08-26 20:39:24 +02:00
[![Build Status ](https://github.com/jtesta/ssh-audit/actions/workflows/tox.yaml/badge.svg )](https://github.com/jtesta/ssh-audit/actions)
2021-08-26 19:12:13 +02:00
[![PRs Welcome ](https://img.shields.io/badge/PRs-welcome-brightgreen.svg )](https://github.com/jtesta/ssh-audit/blob/master/CONTRIBUTING.md)
2019-10-07 16:59:52 +02:00
**ssh-audit** is a tool for ssh server & client configuration auditing.
2015-12-23 04:52:21 +01:00
2020-09-27 02:14:29 +02:00
[jtesta/ssh-audit ](https://github.com/jtesta/ssh-audit/ ) (v2.0+) is the updated and maintained version of ssh-audit forked from [arthepsy/ssh-audit ](https://github.com/arthepsy/ssh-audit ) (v1.x) due to inactivity.
2021-03-05 00:23:12 +01:00
- [Features ](#features )
- [Usage ](#usage )
- [Screenshots ](#screenshots )
- [Server Standard Audit Example ](#server-standard-audit-example )
- [Server Policy Audit Example ](#server-policy-audit-example )
- [Client Standard Audit Example ](#client-standard-audit-example )
- [Hardening Guides ](#hardening-guides )
- [Pre-Built Packages ](#pre-built-packages )
- [Web Front-End ](#web-front-end )
- [ChangeLog ](#changelog )
2015-12-23 04:52:21 +01:00
## Features
2016-09-20 11:26:14 +02:00
- SSH1 and SSH2 protocol server support;
2019-10-07 16:59:52 +02:00
- analyze SSH client configuration;
2016-09-20 11:26:14 +02:00
- grab banner, recognize device or software and operating system, detect compression;
2015-12-23 04:52:21 +01:00
- gather key-exchange, host-key, encryption and message authentication code algorithms;
- output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc);
2016-10-10 13:08:01 +02:00
- output algorithm recommendations (append or remove based on recognized software version);
2016-09-20 11:26:14 +02:00
- output security information (related issues, assigned CVE list, etc);
2016-08-12 15:33:34 +02:00
- analyze SSH version compatibility based on algorithm information;
2016-10-10 13:08:01 +02:00
- historical information from OpenSSH, Dropbear SSH and libssh;
2020-09-27 19:13:38 +02:00
- policy scans to ensure adherence to a hardened/standard configuration;
2019-11-30 23:15:54 +01:00
- runs on Linux and Windows;
2023-11-28 05:35:40 +01:00
- supports Python 3.8 - 3.12;
2019-09-28 00:19:49 +02:00
- no dependencies
2015-12-23 04:52:21 +01:00
## Usage
```
2020-07-16 18:07:02 +02:00
usage: ssh-audit.py [options] < host >
2015-12-23 04:52:21 +01:00
2020-07-16 18:07:02 +02:00
-h, --help print this help
2016-09-20 11:26:14 +02:00
-1, --ssh1 force ssh version 1 only
2016-09-24 22:02:39 +02:00
-2, --ssh2 force ssh version 2 only
2016-10-26 17:56:38 +02:00
-4, --ipv4 enable IPv4 (order of precedence)
-6, --ipv6 enable IPv6 (order of precedence)
2016-09-02 17:08:15 +02:00
-b, --batch batch output
2019-09-28 00:16:50 +02:00
-c, --client-audit starts a server on port 2222 to audit client
2019-11-07 02:40:25 +01:00
software config (use -p to change port;
use -t to change timeout)
2024-04-18 19:58:13 +02:00
--conn-rate-test=N[:max_rate] perform a connection rate test (useful
for collecting metrics related to
susceptibility of the DHEat vuln).
Testing is conducted with N concurrent
sockets with an optional maximum rate
of connections per second.
2021-03-02 17:27:40 +01:00
-d, --debug Enable debug output.
2024-04-18 19:58:13 +02:00
--dheat=N[:kex[:e_len]] continuously perform the DHEat DoS attack
(CVE-2002-20001) against the target using N
concurrent sockets. Optionally, a specific
key exchange algorithm can be specified
instead of allowing it to be automatically
chosen. Additionally, a small length of
the fake e value sent to the server can
be chosen for a more efficient attack (such
as 4).
2022-10-27 16:11:05 +02:00
-g, --gex-test=< x [ , y , . . . ] > dh gex modulus size test
< min1:pref1:max1 [ , min2:pref2:max2 , . . . ] >
< x-y [ :step ] >
2021-05-21 01:04:35 +02:00
-j, --json JSON output (use -jj to enable indents)
2016-09-02 17:08:15 +02:00
-l, --level=< level > minimum output level (info|warn|fail)
2024-03-14 22:58:16 +01:00
-L, --list-policies list all the official, built-in policies. Use with -v
to view policy change logs.
2020-08-12 01:28:53 +02:00
--lookup=< alg1 , alg2 , . . . > looks up an algorithm(s) without
connecting to a server
2024-02-17 05:16:07 +01:00
-m, --manual print the man page (Docker, PyPI, Snap, and Windows
builds only)
2020-07-16 18:07:02 +02:00
-M, --make-policy=< policy.txt > creates a policy based on the target server
(i.e.: the target server has the ideal
configuration that other servers should
adhere to)
-n, --no-colors disable colors
-p, --port=< port > port to connect
2020-10-19 23:27:37 +02:00
-P, --policy=< "policy name" | policy.txt> run a policy test using the
specified policy
2024-04-18 19:58:13 +02:00
--skip-rate-test skip the connection rate test during standard audits
(used to safely infer whether the DHEat attack
is viable)
2019-08-18 16:03:03 +02:00
-t, --timeout=< secs > timeout (in seconds) for connection and reading
2019-09-28 00:16:50 +02:00
(default: 5)
2020-07-16 18:07:02 +02:00
-T, --targets=< hosts.txt > a file containing a list of target hosts (one
per line, format HOST[:PORT])
2021-02-06 04:12:27 +01:00
--threads=< threads > number of threads to use when scanning multiple
targets (-T/--targets) (default: 32)
2020-07-16 18:07:02 +02:00
-v, --verbose verbose output
2015-12-23 04:52:21 +01:00
```
2021-08-27 17:19:18 +02:00
* if both IPv4 and IPv6 are used, order of precedence can be set by using either `-46` or `-64` .
* batch flag `-b` will output sections without header and without empty lines (implies verbose flag).
* verbose flag `-v` will prefix each line with section type and algorithm name.
2020-09-27 19:13:38 +02:00
* an exit code of 0 is returned when all algorithms are considered secure (for a standard audit), or when a policy check passes (for a policy audit).
2015-12-23 04:52:21 +01:00
2020-09-27 19:13:38 +02:00
Basic server auditing:
```
ssh-audit localhost
ssh-audit 127.0.0.1
ssh-audit 127.0.0.1:222
ssh-audit ::1
ssh-audit [::1]:222
```
2020-09-27 19:24:37 +02:00
To run a standard audit against many servers (place targets into servers.txt, one on each line in the format of `HOST[:PORT]` ):
2020-09-27 19:13:38 +02:00
```
ssh-audit -T servers.txt
```
2020-10-16 02:36:08 +02:00
To audit a client configuration (listens on port 2222 by default; connect using `ssh -p 2222 anything@localhost` ):
2020-09-27 19:13:38 +02:00
```
ssh-audit -c
```
To audit a client configuration, with a listener on port 4567:
```
ssh-audit -c -p 4567
```
2021-02-02 15:54:10 +01:00
To list all official built-in policies (hint: use resulting policy names with `-P` /`--policy`):
2020-09-27 19:13:38 +02:00
```
ssh-audit -L
```
To run a policy audit against a server:
```
2020-10-19 23:27:37 +02:00
ssh-audit -P ["policy name" | path/to/server_policy.txt] targetserver
2020-09-27 19:13:38 +02:00
```
To run a policy audit against a client:
```
2020-10-19 23:27:37 +02:00
ssh-audit -c -P ["policy name" | path/to/client_policy.txt]
2020-09-27 19:13:38 +02:00
```
To run a policy audit against many servers:
```
2020-10-19 23:27:37 +02:00
ssh-audit -T servers.txt -P ["policy name" | path/to/server_policy.txt]
2020-09-27 19:13:38 +02:00
```
2021-02-02 15:54:10 +01:00
To create a policy based on a target server (which can be manually edited):
2020-09-27 19:13:38 +02:00
```
ssh-audit -M new_policy.txt targetserver
```
2024-04-18 19:58:13 +02:00
To run the DHEat CPU exhaustion DoS attack ([CVE-2002-20001](https://nvd.nist.gov/vuln/detail/CVE-2002-20001)) against a target using 10 concurrent sockets:
```
ssh-audit --dheat=10 targetserver
```
To run the DHEat attack using the `diffie-hellman-group-exchange-sha256` key exchange algorithm:
```
ssh-audit --dheat=10:diffie-hellman-group-exchange-sha256 targetserver
```
To run the DHEat attack using the `diffie-hellman-group-exchange-sha256` key exchange algorithm along with very small but non-standard packet lengths (this may result in the same CPU exhaustion, but with many less bytes per second being sent):
```
ssh-audit --dheat=10:diffie-hellman-group-exchange-sha256:4 targetserver
```
2021-03-05 00:23:12 +01:00
## Screenshots
2020-09-27 19:13:38 +02:00
### Server Standard Audit Example
Below is a screen shot of the standard server-auditing output when connecting to an unhardened OpenSSH v5.3 service:
2019-09-06 00:52:32 +02:00
![screenshot ](https://user-images.githubusercontent.com/2982011/64388792-317e6f80-d00e-11e9-826e-a4934769bb07.png )
2015-12-23 04:52:21 +01:00
2020-09-27 19:13:38 +02:00
### Server Policy Audit Example
2021-02-02 15:54:10 +01:00
Below is a screen shot of the policy auditing output when connecting to an un-hardened Ubuntu Server 20.04 machine (hint: use `-L` /`--list-policies` to see names of built-in policies to use with `-P` /`--policy`):
2020-09-27 19:13:38 +02:00
![screenshot ](https://user-images.githubusercontent.com/2982011/94370881-95178700-00c0-11eb-8705-3157a4669dc0.png )
After applying the steps in the hardening guide (see below), the output changes to the following:
![screenshot ](https://user-images.githubusercontent.com/2982011/94370873-87620180-00c0-11eb-9a59-469f61a56ce1.png )
### Client Standard Audit Example
2019-11-14 14:56:14 +01:00
Below is a screen shot of the client-auditing output when an unhardened OpenSSH v7.2 client connects:
2019-11-14 16:15:30 +01:00
![client_screenshot ](https://user-images.githubusercontent.com/2982011/68867998-b946c100-06c4-11ea-975f-1f47e4178a74.png )
2019-10-07 16:59:52 +02:00
2021-03-05 00:23:12 +01:00
## Hardening Guides
2019-11-26 17:47:35 +01:00
Guides to harden server & client configuration can be found here: [https://www.ssh-audit.com/hardening_guides.html ](https://www.ssh-audit.com/hardening_guides.html )
2021-03-05 00:23:12 +01:00
## Pre-Built Packages
2023-12-20 19:12:13 +01:00
Pre-built packages are available for Windows (see the [Releases ](https://github.com/jtesta/ssh-audit/releases ) page), PyPI, Snap, and Docker:
2020-03-13 04:20:31 +01:00
To install from PyPI:
```
$ pip3 install ssh-audit
```
2020-06-17 05:10:08 +02:00
To install the Snap package:
2020-03-13 04:20:31 +01:00
```
$ snap install ssh-audit
```
2020-10-20 17:31:50 +02:00
To install from Dockerhub:
```
$ docker pull positronsecurity/ssh-audit
```
2024-04-22 23:54:37 +02:00
(Then run with: `docker run -it --rm -p 2222:2222 positronsecurity/ssh-audit 10.1.1.1` )
2020-10-20 17:31:50 +02:00
2023-03-25 19:15:53 +01:00
The status of various other platform packages can be found below (via Repology):
< a href = "https://repology.org/project/ssh-audit/versions" > < img src = "https://repology.org/badge/vertical-allrepos/ssh-audit.svg?columns=4" alt = "Packaging status" align = "center" > < / a >
2021-03-05 00:23:12 +01:00
## Web Front-End
2020-09-27 19:24:37 +02:00
For convenience, a web front-end on top of the command-line tool is available at [https://www.ssh-audit.com/ ](https://www.ssh-audit.com/ ).
2015-12-23 04:52:21 +01:00
## ChangeLog
2021-10-15 06:19:04 +02:00
2024-04-30 01:11:47 +02:00
### v3.3.0-dev (???)
2024-07-03 03:31:36 +02:00
- Added built-in policies for Ubuntu 24.04 LTS server and client, and OpenSSH 9.8.
2024-06-30 01:05:20 +02:00
- Added IPv6 support for DHEat and connection rate tests.
2024-07-05 16:53:00 +02:00
- Added TCP port information to JSON policy scan results; credit [Fabian Malte Kopp ](https://github.com/dreizehnutters ).
2024-07-07 03:01:19 +02:00
- Added LANcom LCOS server recognition and Ed448 key extraction; credit [Daniel Lenski ](https://github.com/dlenskiSB ).
2024-07-03 02:56:11 +02:00
- Fixed crash when running with `-P` and `-T` options simultaneously.
2024-07-05 16:16:06 +02:00
- Fixed host key tests from only reporting a key type at most once despite multiple hosts supporting it; credit [Daniel Lenski ](https://github.com/dlenskiSB ).
2024-08-26 22:46:34 +02:00
- Fixed DHEat connection rate testing on MacOS X and BSD platforms; credit [Drew Noel ](https://github.com/drewmnoel ) and [Michael Osipov ](https://github.com/michael-o ).
2024-04-30 01:11:47 +02:00
2024-04-22 22:32:57 +02:00
### v3.2.0 (2024-04-22)
2024-04-18 19:58:13 +02:00
- Added implementation of the DHEat denial-of-service attack (see `--dheat` option; [CVE-2002-20001 ](https://nvd.nist.gov/vuln/detail/CVE-2002-20001 )).
2023-12-21 21:30:43 +01:00
- Expanded filter of CBC ciphers to flag for the Terrapin vulnerability. It now includes more rarely found ciphers.
2024-03-15 21:28:10 +01:00
- Fixed parsing of `ecdsa-sha2-nistp*` CA signatures on host keys. Additionally, they are now flagged as potentially back-doored, just as standard host keys are.
- Gracefully handle rare exceptions (i.e.: crashes) while performing GEX tests.
2024-02-17 04:40:53 +01:00
- The built-in man page (`-m`, `--manual` ) is now available on Docker, PyPI, and Snap builds, in addition to the Windows build.
2024-02-17 18:54:28 +01:00
- Snap builds are now architecture-independent.
2024-03-13 02:13:10 +01:00
- Changed Docker base image from `python:3-slim` to `python:3-alpine` , resulting in a 59% reduction in image size; credit [Daniel Thamdrup ](https://github.com/dallemon ).
2024-04-22 22:32:57 +02:00
- Added built-in policies for Amazon Linux 2023, Debian 12, OpenSSH 9.7, and Rocky Linux 9.
- Built-in policies now include a change log (use `-L -v` to view them).
2024-03-18 22:48:50 +01:00
- Custom policies now support the `allow_algorithm_subset_and_reordering` directive to allow targets to pass with a subset and/or re-ordered list of host keys, kex, ciphers, and MACs. This allows for the creation of a baseline policy where targets can optionally implement stricter controls; partial credit [yannik1015 ](https://github.com/yannik1015 ).
2024-03-19 19:45:19 +01:00
- Custom policies now support the `allow_larger_keys` directive to allow targets to pass with larger host keys, CA keys, and Diffie-Hellman keys. This allows for the creation of a baseline policy where targets can optionally implement stricter controls; partial credit [Damian Szuberski ](https://github.com/szubersk ).
2024-04-22 22:32:57 +02:00
- Color output is disabled if the `NO_COLOR` environment variable is set (see https://no-color.org/).
2024-03-14 21:01:48 +01:00
- Added 1 new key exchange algorithm: `gss-nistp384-sha384-*` .
2024-04-19 03:09:02 +02:00
- Added 1 new cipher: `aes128-ocb@libassh.org` .
2023-12-21 21:30:43 +01:00
2023-12-20 19:12:13 +01:00
### v3.1.0 (2023-12-20)
2023-12-19 20:03:28 +01:00
- Added test for the Terrapin message prefix truncation vulnerability ([CVE-2023-48795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795)).
- Dropped support for Python 3.7 (EOL was reached in June 2023).
2023-12-20 19:12:13 +01:00
- Added Python 3.12 support.
- In server policies, reduced expected DH modulus sizes from 4096 to 3072 to match the [online hardening guides ](https://ssh-audit.com/hardening_guides.html ) (note that 3072-bit moduli provide the equivalent of 128-bit symmetric security).
2023-11-28 02:07:36 +01:00
- In Ubuntu 22.04 client policy, moved host key types `sk-ssh-ed25519@openssh.com` and `ssh-ed25519` to the end of all certificate types.
2023-12-19 20:03:28 +01:00
- Updated Ubuntu Server & Client policies for 20.04 and 22.04 to account for key exchange list changes due to Terrapin vulnerability patches.
2023-11-28 03:33:13 +01:00
- Re-organized option host key types for OpenSSH 9.2 server policy to correspond with updated Debian 12 hardening guide.
2023-12-19 23:42:43 +01:00
- Added built-in policies for OpenSSH 9.5 and 9.6.
2023-12-20 19:12:13 +01:00
- Added an `additional_notes` field to the JSON output.
2023-10-22 22:43:04 +02:00
2023-09-07 13:45:07 +02:00
### v3.0.0 (2023-09-07)
2023-06-19 20:13:32 +02:00
- Results from concurrent scans against multiple hosts are no longer improperly combined; bug discovered by [Adam Russell ](https://github.com/thecliguy ).
2023-06-20 15:26:43 +02:00
- Hostname resolution failure no longer causes scans against multiple hosts to terminate unexpectedly; credit [Dani Cuesta ](https://github.com/daniel-cues ).
2023-06-20 22:12:30 +02:00
- Algorithm recommendations resulting from warnings are now printed in yellow instead of red; credit [Adam Russell ](https://github.com/thecliguy ).
2023-09-07 04:37:06 +02:00
- Added failure, warning, and info notes to JSON output (note that this results in a breaking change to the banner protocol, "enc", and "mac" fields); credit [Bareq Al-Azzawi ](https://github.com/BareqAZ ).
- Docker Makefile now creates multi-arch builds for amd64, arm64, and armv7; credit [Sebastian Cohnen ](https://github.com/tisba ).
2023-07-11 17:08:42 +02:00
- Fixed crash during GEX tests.
2023-09-03 22:13:00 +02:00
- Refined GEX testing against OpenSSH servers: when the fallback mechanism is suspected of being triggered, perform an additional test to obtain more accurate results.
2023-09-04 01:14:25 +02:00
- The color of all notes will be printed in green when the related algorithm is rated good.
2023-09-05 20:22:35 +02:00
- Prioritized host key certificate algorithms for Ubuntu 22.04 LTS client policy.
Marked all NIST K-, B-, and T-curves as unproven since they are so rarely used. Added 12 new host keys: 'ecdsa-sha2-curve25519', 'ecdsa-sha2-nistb233', 'ecdsa-sha2-nistb409', 'ecdsa-sha2-nistk163', 'ecdsa-sha2-nistk233', 'ecdsa-sha2-nistk283', 'ecdsa-sha2-nistk409', 'ecdsa-sha2-nistp224', 'ecdsa-sha2-nistp192', 'ecdsa-sha2-nistt571', 'ssh-dsa', 'x509v3-sign-rsa-sha256'. Added 15 key exchanges: 'curve448-sha512@libssh.org', 'ecdh-nistp256-kyber-512r3-sha256-d00@openquantumsafe.org', 'ecdh-nistp384-kyber-768r3-sha384-d00@openquantumsafe.org', 'ecdh-nistp521-kyber-1024r3-sha512-d00@openquantumsafe.org', 'ecdh-sha2-brainpoolp256r1@genua.de', 'ecdh-sha2-brainpoolp384r1@genua.de', 'ecdh-sha2-brainpoolp521r1@genua.de', 'kexAlgoDH14SHA1', 'kexAlgoDH1SHA1', 'kexAlgoECDH256', 'kexAlgoECDH384', 'kexAlgoECDH521', 'sm2kep-sha2-nistp256', 'x25519-kyber-512r3-sha256-d00@amazon.com', 'x25519-kyber512-sha512@aws.amazon.com'. Added 8 new ciphers: 'aes192-gcm@openssh.com', 'cast128-12-cbc', 'cast128-12-cfb', 'cast128-12-ecb', 'cast128-12-ofb', 'des-cfb', 'des-ecb', 'des-ofb'. Added 14 new MACs: 'cbcmac-3des', 'cbcmac-aes', 'cbcmac-blowfish', 'cbcmac-des', 'cbcmac-rijndael', 'cbcmac-twofish', 'hmac-sha256-96', 'md5', 'md5-8', 'ripemd160', 'ripemd160-8', 'sha1', 'sha1-8', 'umac-128'.
2023-09-06 02:10:37 +02:00
- Marked all NIST K-, B-, and T-curves as unproven since they are so rarely used.
2023-09-04 00:12:16 +02:00
- Added built-in policy for OpenSSH 9.4.
Marked all NIST K-, B-, and T-curves as unproven since they are so rarely used. Added 12 new host keys: 'ecdsa-sha2-curve25519', 'ecdsa-sha2-nistb233', 'ecdsa-sha2-nistb409', 'ecdsa-sha2-nistk163', 'ecdsa-sha2-nistk233', 'ecdsa-sha2-nistk283', 'ecdsa-sha2-nistk409', 'ecdsa-sha2-nistp224', 'ecdsa-sha2-nistp192', 'ecdsa-sha2-nistt571', 'ssh-dsa', 'x509v3-sign-rsa-sha256'. Added 15 key exchanges: 'curve448-sha512@libssh.org', 'ecdh-nistp256-kyber-512r3-sha256-d00@openquantumsafe.org', 'ecdh-nistp384-kyber-768r3-sha384-d00@openquantumsafe.org', 'ecdh-nistp521-kyber-1024r3-sha512-d00@openquantumsafe.org', 'ecdh-sha2-brainpoolp256r1@genua.de', 'ecdh-sha2-brainpoolp384r1@genua.de', 'ecdh-sha2-brainpoolp521r1@genua.de', 'kexAlgoDH14SHA1', 'kexAlgoDH1SHA1', 'kexAlgoECDH256', 'kexAlgoECDH384', 'kexAlgoECDH521', 'sm2kep-sha2-nistp256', 'x25519-kyber-512r3-sha256-d00@amazon.com', 'x25519-kyber512-sha512@aws.amazon.com'. Added 8 new ciphers: 'aes192-gcm@openssh.com', 'cast128-12-cbc', 'cast128-12-cfb', 'cast128-12-ecb', 'cast128-12-ofb', 'des-cfb', 'des-ecb', 'des-ofb'. Added 14 new MACs: 'cbcmac-3des', 'cbcmac-aes', 'cbcmac-blowfish', 'cbcmac-des', 'cbcmac-rijndael', 'cbcmac-twofish', 'hmac-sha256-96', 'md5', 'md5-8', 'ripemd160', 'ripemd160-8', 'sha1', 'sha1-8', 'umac-128'.
2023-09-06 02:10:37 +02:00
- Added 12 new host keys: `ecdsa-sha2-curve25519` , `ecdsa-sha2-nistb233` , `ecdsa-sha2-nistb409` , `ecdsa-sha2-nistk163` , `ecdsa-sha2-nistk233` , `ecdsa-sha2-nistk283` , `ecdsa-sha2-nistk409` , `ecdsa-sha2-nistp224` , `ecdsa-sha2-nistp192` , `ecdsa-sha2-nistt571` , `ssh-dsa` , `x509v3-sign-rsa-sha256` .
- Added 15 new key exchanges: `curve448-sha512@libssh.org` , `ecdh-nistp256-kyber-512r3-sha256-d00@openquantumsafe.org` , `ecdh-nistp384-kyber-768r3-sha384-d00@openquantumsafe.org` , `ecdh-nistp521-kyber-1024r3-sha512-d00@openquantumsafe.org` , `ecdh-sha2-brainpoolp256r1@genua.de` , `ecdh-sha2-brainpoolp384r1@genua.de` , `ecdh-sha2-brainpoolp521r1@genua.de` , `kexAlgoDH14SHA1` , `kexAlgoDH1SHA1` , `kexAlgoECDH256` , `kexAlgoECDH384` , `kexAlgoECDH521` , `sm2kep-sha2-nistp256` , `x25519-kyber-512r3-sha256-d00@amazon.com` , `x25519-kyber512-sha512@aws.amazon.com` .
- Added 8 new ciphers: `aes192-gcm@openssh.com` , `cast128-12-cbc` , `cast128-12-cfb` , `cast128-12-ecb` , `cast128-12-ofb` , `des-cfb` , `des-ecb` , `des-ofb` .
- Added 14 new MACs: `cbcmac-3des` , `cbcmac-aes` , `cbcmac-blowfish` , `cbcmac-des` , `cbcmac-rijndael` , `cbcmac-twofish` , `hmac-sha256-96` , `md5` , `md5-8` , `ripemd160` , `ripemd160-8` , `sha1` , `sha1-8` , `umac-128` .
2023-06-19 16:35:13 +02:00
2023-04-29 18:39:04 +02:00
### v2.9.0 (2023-04-29)
2022-10-11 02:51:37 +02:00
- Dropped support for Python 3.6, as it reached EOL at the end of 2021.
2023-02-02 01:29:54 +01:00
- Added Ubuntu Server & Client 22.04 hardening policies.
2022-04-10 18:16:25 +02:00
- Removed experimental warning tag from `sntrup761x25519-sha512@openssh.com` .
- Updated CVE database; credit [Alexandre Zanni ](https://github.com/noraj ).
2022-03-14 01:58:22 +01:00
- Added `-g` and `--gex-test` for granular GEX modulus size tests; credit [Adam Russell ](https://github.com/thecliguy ).
2021-10-15 06:19:04 +02:00
- Snap packages now print more user-friendly error messages when permission errors are encountered.
- JSON 'target' field now always includes port number; credit [tomatohater1337 ](https://github.com/tomatohater1337 ).
2023-03-25 19:15:53 +01:00
- JSON output now includes recommendations and CVE data.
2023-04-25 15:17:32 +02:00
- Mixed host key/CA key types (i.e.: RSA host keys signed with ED25519 CAs, etc.) are now properly handled.
2023-04-29 17:59:50 +02:00
- Warnings are now printed for 2048-bit moduli; partial credit [Adam Russell ](https://github.com/thecliguy ).
2023-03-24 02:36:02 +01:00
- SHA-1 algorithms now cause failures.
- CBC mode ciphers are now warnings instead of failures.
- Generic failure/warning messages replaced with more specific reasons (i.e.: 'using weak cipher' => 'using broken RC4 cipher').
2023-04-26 21:49:45 +02:00
- Updated built-in policies to include missing host key size information.
2023-04-28 03:40:47 +02:00
- Added built-in policies for OpenSSH 8.8, 8.9, 9.0, 9.1, 9.2, and 9.3.
2023-02-03 00:57:53 +01:00
- Added 33 new host keys: `dsa2048-sha224@libassh.org` , `dsa2048-sha256@libassh.org` , `dsa3072-sha256@libassh.org` , `ecdsa-sha2-1.3.132.0.10-cert-v01@openssh.com` , `eddsa-e382-shake256@libassh.org` , `eddsa-e521-shake256@libassh.org` , `null` , `pgp-sign-dss` , `pgp-sign-rsa` , `spki-sign-dss` , `spki-sign-rsa` , `ssh-dss-sha224@ssh.com` , `ssh-dss-sha384@ssh.com` , `ssh-dss-sha512@ssh.com` , `ssh-ed448-cert-v01@openssh.com` , `ssh-rsa-sha224@ssh.com` , `ssh-rsa-sha2-256` , `ssh-rsa-sha2-512` , `ssh-rsa-sha384@ssh.com` , `ssh-rsa-sha512@ssh.com` , `ssh-xmss-cert-v01@openssh.com` , `ssh-xmss@openssh.com` , `webauthn-sk-ecdsa-sha2-nistp256@openssh.com` , `x509v3-ecdsa-sha2-1.3.132.0.10` , `x509v3-sign-dss-sha1` , `x509v3-sign-dss-sha224@ssh.com` , `x509v3-sign-dss-sha256@ssh.com` , `x509v3-sign-dss-sha384@ssh.com` , `x509v3-sign-dss-sha512@ssh.com` , `x509v3-sign-rsa-sha1` , `x509v3-sign-rsa-sha224@ssh.com` , `x509v3-sign-rsa-sha384@ssh.com` , `x509v3-sign-rsa-sha512@ssh.com` .
Added the following 9 new host key types: 'dsa2048-sha224@libassh.org', 'dsa2048-sha256@libassh.org', 'dsa3072-sha256@libassh.org', 'ecdsa-sha2-1.3.132.0.10-cert-v01@openssh.com', 'eddsa-e382-shake256@libassh.org', 'eddsa-e521-shake256@libassh.org', 'null', 'pgp-sign-dss', 'pgp-sign-rsa'. Added the following 22 new key exchange algorithms: 'diffie-hellman-group-exchange-sha224@ssh.com', 'diffie-hellman-group-exchange-sha384@ssh.com', 'diffie-hellman-group14-sha224@ssh.com', 'diffie-hellman_group17-sha512', 'ecmqv-sha2', 'gss-13.3.132.0.10-sha256-*', 'gss-curve25519-sha256-*', 'gss-curve448-sha512-*', 'gss-gex-sha1-*', 'gss-gex-sha256-*', 'gss-group1-sha1-*', 'gss-group14-sha1-*', 'gss-group14-sha256-*', 'gss-group15-sha512-*', 'gss-group16-sha512-*', 'gss-group17-sha512-*', 'gss-group18-sha512-*', 'gss-nistp256-sha256-*', 'gss-nistp384-sha256-*', 'gss-nistp521-sha512-*', 'm383-sha384@libassh.org', 'm511-sha512@libassh.org'. Added the following 26 new ciphers: '3des-cfb', '3des-ecb', '3des-ofb', 'blowfish-cfb', 'blowfish-ecb', 'blowfish-ofb', 'camellia128-cbc@openssh.org', 'camellia128-ctr@openssh.org', 'camellia192-cbc@openssh.org', 'camellia192-ctr@openssh.org', 'camellia256-cbc@openssh.org', 'camellia256-ctr@openssh.org', 'cast128-cfb', 'cast128-ecb', 'cast128-ofb', 'idea-cfb', 'idea-ecb', 'idea-ofb', 'seed-ctr@ssh.com', 'serpent128-gcm@libassh.org', 'serpent256-gcm@libassh.org', 'twofish-cfb', 'twofish-ecb', 'twofish-ofb', 'twofish128-gcm@libassh.org', 'twofish256-gcm@libassh.org'. Added the following 4 new HMAC algorithms: 'hmac-sha224@ssh.com', 'hmac-sha256-2@ssh.com', 'hmac-sha384@ssh.com', 'hmac-whirlpool'.
2023-02-03 00:30:40 +01:00
- Added 46 new key exchanges: `diffie-hellman-group14-sha224@ssh.com` , `diffie-hellman_group17-sha512` , `diffie-hellman-group-exchange-sha224@ssh.com` , `diffie-hellman-group-exchange-sha384@ssh.com` , `ecdh-sha2-1.2.840.10045.3.1.1` , `ecdh-sha2-1.2.840.10045.3.1.7` , `ecdh-sha2-1.3.132.0.1` , `ecdh-sha2-1.3.132.0.16` , `ecdh-sha2-1.3.132.0.26` , `ecdh-sha2-1.3.132.0.27` , `ecdh-sha2-1.3.132.0.33` , `ecdh-sha2-1.3.132.0.34` , `ecdh-sha2-1.3.132.0.35` , `ecdh-sha2-1.3.132.0.36` , `ecdh-sha2-1.3.132.0.37` , `ecdh-sha2-1.3.132.0.38` , `ecdh-sha2-4MHB+NBt3AlaSRQ7MnB4cg==` , `ecdh-sha2-5pPrSUQtIaTjUSt5VZNBjg==` , `ecdh-sha2-9UzNcgwTlEnSCECZa7V1mw==` , `ecdh-sha2-D3FefCjYoJ/kfXgAyLddYA==` , `ecdh-sha2-h/SsxnLCtRBh7I9ATyeB3A==` , `ecdh-sha2-m/FtSAmrV4j/Wy6RVUaK7A==` , `ecdh-sha2-mNVwCXAoS1HGmHpLvBC94w==` , `ecdh-sha2-qCbG5Cn/jjsZ7nBeR7EnOA==` , `ecdh-sha2-qcFQaMAMGhTziMT0z+Tuzw==` , `ecdh-sha2-VqBg4QRPjxx1EXZdV0GdWQ==` , `ecdh-sha2-wiRIU8TKjMZ418sMqlqtvQ==` , `ecdh-sha2-zD/b3hu/71952ArpUG4OjQ==` , `ecmqv-sha2` , `gss-13.3.132.0.10-sha256-*` , `gss-curve25519-sha256-*` , `gss-curve448-sha512-*` , `gss-gex-sha1-*` , `gss-gex-sha256-*` , `gss-group14-sha1-*` , `gss-group14-sha256-*` , `gss-group15-sha512-*` , `gss-group16-sha512-*` , `gss-group17-sha512-*` , `gss-group18-sha512-*` , `gss-group1-sha1-*` , `gss-nistp256-sha256-*` , `gss-nistp384-sha256-*` , `gss-nistp521-sha512-*` , `m383-sha384@libassh.org` , `m511-sha512@libassh.org` .
2023-02-03 00:57:53 +01:00
- Added 28 new ciphers: `3des-cfb` , `3des-ecb` , `3des-ofb` , `blowfish-cfb` , `blowfish-ecb` , `blowfish-ofb` , `camellia128-cbc@openssh.org` , `camellia128-ctr@openssh.org` , `camellia192-cbc@openssh.org` , `camellia192-ctr@openssh.org` , `camellia256-cbc@openssh.org` , `camellia256-ctr@openssh.org` , `cast128-cfb` , `cast128-ecb` , `cast128-ofb` , `cast128-12-cbc@ssh.com` , `idea-cfb` , `idea-ecb` , `idea-ofb` , `rijndael-cbc@ssh.com` , `seed-ctr@ssh.com` , `serpent128-gcm@libassh.org` , `serpent256-gcm@libassh.org` , `twofish128-gcm@libassh.org` , `twofish256-gcm@libassh.org` , `twofish-cfb` , `twofish-ecb` , `twofish-ofb`
Added the following 9 new host key types: 'dsa2048-sha224@libassh.org', 'dsa2048-sha256@libassh.org', 'dsa3072-sha256@libassh.org', 'ecdsa-sha2-1.3.132.0.10-cert-v01@openssh.com', 'eddsa-e382-shake256@libassh.org', 'eddsa-e521-shake256@libassh.org', 'null', 'pgp-sign-dss', 'pgp-sign-rsa'. Added the following 22 new key exchange algorithms: 'diffie-hellman-group-exchange-sha224@ssh.com', 'diffie-hellman-group-exchange-sha384@ssh.com', 'diffie-hellman-group14-sha224@ssh.com', 'diffie-hellman_group17-sha512', 'ecmqv-sha2', 'gss-13.3.132.0.10-sha256-*', 'gss-curve25519-sha256-*', 'gss-curve448-sha512-*', 'gss-gex-sha1-*', 'gss-gex-sha256-*', 'gss-group1-sha1-*', 'gss-group14-sha1-*', 'gss-group14-sha256-*', 'gss-group15-sha512-*', 'gss-group16-sha512-*', 'gss-group17-sha512-*', 'gss-group18-sha512-*', 'gss-nistp256-sha256-*', 'gss-nistp384-sha256-*', 'gss-nistp521-sha512-*', 'm383-sha384@libassh.org', 'm511-sha512@libassh.org'. Added the following 26 new ciphers: '3des-cfb', '3des-ecb', '3des-ofb', 'blowfish-cfb', 'blowfish-ecb', 'blowfish-ofb', 'camellia128-cbc@openssh.org', 'camellia128-ctr@openssh.org', 'camellia192-cbc@openssh.org', 'camellia192-ctr@openssh.org', 'camellia256-cbc@openssh.org', 'camellia256-ctr@openssh.org', 'cast128-cfb', 'cast128-ecb', 'cast128-ofb', 'idea-cfb', 'idea-ecb', 'idea-ofb', 'seed-ctr@ssh.com', 'serpent128-gcm@libassh.org', 'serpent256-gcm@libassh.org', 'twofish-cfb', 'twofish-ecb', 'twofish-ofb', 'twofish128-gcm@libassh.org', 'twofish256-gcm@libassh.org'. Added the following 4 new HMAC algorithms: 'hmac-sha224@ssh.com', 'hmac-sha256-2@ssh.com', 'hmac-sha384@ssh.com', 'hmac-whirlpool'.
2023-02-03 00:30:40 +01:00
- Added 5 new MACs: `hmac-sha1-96@openssh.com` , `hmac-sha224@ssh.com` , `hmac-sha256-2@ssh.com` , `hmac-sha384@ssh.com` , `hmac-whirlpool` .
2021-10-15 06:19:04 +02:00
2021-08-26 21:24:34 +02:00
### v2.5.0 (2021-08-26)
2021-02-26 22:01:30 +01:00
- Fixed crash when running host key tests.
2021-05-25 01:50:25 +02:00
- Handles server connection failures more gracefully.
2021-05-21 01:04:35 +02:00
- Now prints JSON with indents when `-jj` is used (useful for debugging).
2021-05-21 00:03:24 +02:00
- Added MD5 fingerprints to verbose output.
2021-03-02 17:27:40 +01:00
- Added `-d` /`--debug` option for getting debugging output; credit [Adam Russell ](https://github.com/thecliguy ).
2021-05-21 00:03:24 +02:00
- Updated JSON output to include MD5 fingerprints. Note that this results in a breaking change in the 'fingerprints' dictionary format.
2021-05-31 21:49:56 +02:00
- Updated OpenSSH 8.1 (and earlier) policies to include `rsa-sha2-512` and `rsa-sha2-256` .
2021-08-25 18:30:38 +02:00
- Added OpenSSH v8.6 & v8.7 policies.
2021-07-08 16:18:25 +02:00
- Added 3 new key exchanges: `gss-gex-sha1-eipGX3TCiQSrx573bT1o1Q==` , `gss-group1-sha1-eipGX3TCiQSrx573bT1o1Q==` , and `gss-group14-sha1-eipGX3TCiQSrx573bT1o1Q==` .
2021-06-29 03:59:41 +02:00
- Added 3 new MACs: `hmac-ripemd160-96` , `AEAD_AES_128_GCM` , and `AEAD_AES_256_GCM` .
2021-02-26 22:01:30 +01:00
2021-02-24 02:39:18 +01:00
### v2.4.0 (2021-02-23)
2021-02-01 19:10:06 +01:00
- Added multi-threaded scanning support.
2021-02-06 04:12:27 +01:00
- Added built-in Windows manual page (see `-m` /`--manual`); credit [Adam Russell ](https://github.com/thecliguy ).
2020-11-06 02:24:09 +01:00
- Added version check for OpenSSH user enumeration (CVE-2018-15473).
2021-02-02 01:19:46 +01:00
- Added deprecation note to host key types based on SHA-1.
2021-02-02 18:22:50 +01:00
- Added extra warnings for SSHv1.
2021-02-23 22:02:20 +01:00
- Added built-in hardened OpenSSH v8.5 policy.
2021-02-02 01:19:46 +01:00
- Upgraded warnings to failures for host key types based on SHA-1.
2020-11-06 02:29:39 +01:00
- Fixed crash when receiving unexpected response during host key test.
2021-01-21 13:53:09 +01:00
- Fixed hang against older Cisco devices during host key test & gex test.
2021-02-01 19:10:06 +01:00
- Fixed improper termination while scanning multiple targets when one target returns an error.
2021-01-21 16:20:48 +01:00
- Dropped support for Python 3.5 (which reached EOL in Sept. 2020).
2021-02-23 22:02:20 +01:00
- Added 1 new key exchange: `sntrup761x25519-sha512@openssh.com` .
2020-11-06 02:24:09 +01:00
2020-10-28 17:03:37 +01:00
### v2.3.1 (2020-10-28)
2020-10-19 23:42:12 +02:00
- Now parses public key sizes for `rsa-sha2-256-cert-v01@openssh.com` and `rsa-sha2-512-cert-v01@openssh.com` host key types.
2020-10-28 17:03:37 +01:00
- Flag `ssh-rsa-cert-v01@openssh.com` as a failure due to SHA-1 hash.
- Fixed bug in recommendation output which suppressed some algorithms inappropriately.
2020-10-19 23:42:12 +02:00
- Built-in policies now include CA key requirements (if certificates are in use).
2020-10-28 17:03:37 +01:00
- Lookup function (`--lookup`) now performs case-insensitive lookups of similar algorithms; credit [Adam Russell ](https://github.com/thecliguy ).
2020-10-19 23:27:37 +02:00
- Migrated pre-made policies from external files to internal database.
2020-10-16 02:36:08 +02:00
- Split single 3,500 line script into many files (by class).
2020-10-19 23:27:37 +02:00
- Added setup.py support; credit [Ganden Schaffner ](https://github.com/gschaffner ).
2020-09-29 21:03:41 +02:00
- Added 1 new cipher: `des-cbc@ssh.com` .
2020-09-27 23:12:10 +02:00
### v2.3.0 (2020-09-27)
- Added new policy auditing functionality to test adherence to a hardening guide/standard configuration (see `-L` /`--list-policies`, `-M` /`--make-policy` and `-P` /`--policy`). For an in-depth tutorial, see < https: // www . positronsecurity . com / blog / 2020-09-27-ssh-policy-configuration-checks-with-ssh-audit /> .
2020-09-27 01:32:19 +02:00
- Created new man page (see `ssh-audit.1` file).
2020-07-01 04:51:13 +02:00
- 1024-bit moduli upgraded from warnings to failures.
2020-08-12 01:28:53 +02:00
- Many Python 2 code clean-ups, testing framework improvements, pylint & flake8 fixes, and mypy type comments; credit [Jürgen Gmach ](https://github.com/jugmac00 ).
- Added feature to look up algorithms in internal database (see `--lookup` ); credit [Adam Russell ](https://github.com/thecliguy ).
2020-05-31 17:42:06 +02:00
- Suppress recommendation of token host key types.
2020-07-03 21:07:34 +02:00
- Added check for use-after-free vulnerability in PuTTY v0.73.
2020-09-27 01:32:19 +02:00
- Added 11 new host key types: `ssh-rsa1` , `ssh-dss-sha256@ssh.com` , `ssh-gost2001` , `ssh-gost2012-256` , `ssh-gost2012-512` , `spki-sign-rsa` , `ssh-ed448` , `x509v3-ecdsa-sha2-nistp256` , `x509v3-ecdsa-sha2-nistp384` , `x509v3-ecdsa-sha2-nistp521` , `x509v3-rsa2048-sha256` .
- Added 8 new key exchanges: `diffie-hellman-group1-sha256` , `kexAlgoCurve25519SHA256` , `Curve25519SHA256` , `gss-group14-sha256-` , `gss-group15-sha512-` , `gss-group16-sha512-` , `gss-nistp256-sha256-` , `gss-curve25519-sha256-` .
2020-07-01 20:32:55 +02:00
- Added 5 new ciphers: `blowfish` , `AEAD_AES_128_GCM` , `AEAD_AES_256_GCM` , `crypticore128@ssh.com` , `seed-cbc@ssh.com` .
- Added 3 new MACs: `chacha20-poly1305@openssh.com` , `hmac-sha3-224` , `crypticore-mac@ssh.com` .
2020-03-24 19:12:15 +01:00
2020-03-11 16:55:14 +01:00
### v2.2.0 (2020-03-11)
2020-03-11 00:22:15 +01:00
- Marked host key type `ssh-rsa` as weak due to [practical SHA-1 collisions ](https://eprint.iacr.org/2020/014.pdf ).
2019-11-30 23:15:54 +01:00
- Added Windows builds.
2020-02-09 01:05:36 +01:00
- Added 10 new host key types: `ecdsa-sha2-1.3.132.0.10` , `x509v3-sign-dss` , `x509v3-sign-rsa` , `x509v3-sign-rsa-sha256@ssh.com` , `x509v3-ssh-dss` , `x509v3-ssh-rsa` , `sk-ecdsa-sha2-nistp256-cert-v01@openssh.com` , `sk-ecdsa-sha2-nistp256@openssh.com` , `sk-ssh-ed25519-cert-v01@openssh.com` , and `sk-ssh-ed25519@openssh.com` .
2020-02-09 00:44:42 +01:00
- Added 18 new key exchanges: `diffie-hellman-group14-sha256@ssh.com` , `diffie-hellman-group15-sha256@ssh.com` , `diffie-hellman-group15-sha384@ssh.com` , `diffie-hellman-group16-sha384@ssh.com` , `diffie-hellman-group16-sha512@ssh.com` , `diffie-hellman-group18-sha512@ssh.com` , `ecdh-sha2-curve25519` , `ecdh-sha2-nistb233` , `ecdh-sha2-nistb409` , `ecdh-sha2-nistk163` , `ecdh-sha2-nistk233` , `ecdh-sha2-nistk283` , `ecdh-sha2-nistk409` , `ecdh-sha2-nistp192` , `ecdh-sha2-nistp224` , `ecdh-sha2-nistt571` , `gss-gex-sha1-` , and `gss-group1-sha1-` .
2020-03-11 00:22:15 +01:00
- Added 9 new ciphers: `camellia128-cbc` , `camellia128-ctr` , `camellia192-cbc` , `camellia192-ctr` , `camellia256-cbc` , `camellia256-ctr` , `aes128-gcm` , `aes256-gcm` , and `chacha20-poly1305` .
2020-02-09 00:44:42 +01:00
- Added 2 new MACs: `aes128-gcm` and `aes256-gcm` .
2019-11-30 23:15:54 +01:00
2019-11-26 17:47:35 +01:00
### v2.1.1 (2019-11-26)
2019-11-19 02:22:12 +01:00
- Added 2 new host key types: `rsa-sha2-256-cert-v01@openssh.com` , `rsa-sha2-512-cert-v01@openssh.com` .
- Added 2 new ciphers: `des` , `3des` .
2019-11-26 17:47:35 +01:00
- Added 3 new PuTTY vulnerabilities.
- During client testing, client IP address is now listed in output.
2019-11-14 17:07:16 +01:00
2019-11-14 14:56:14 +01:00
### v2.1.0 (2019-11-14)
2019-10-07 16:59:52 +02:00
- Added client software auditing functionality (see `-c` / `--client-audit` option).
2019-11-14 14:56:14 +01:00
- Added JSON output option (see `-j` / `--json` option; credit [Andreas Jaggi ](https://github.com/x-way )).
2019-09-20 02:10:37 +02:00
- Fixed crash while scanning Solaris Sun_SSH.
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
- Added 9 new key exchanges: `gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==` , `gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==` , `gss-group14-sha1-` , `gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==` , `gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==` , `gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==` , `diffie-hellman-group15-sha256` , `ecdh-sha2-1.3.132.0.10` , `curve448-sha512` .
2019-09-20 04:19:26 +02:00
- Added 1 new host key type: `ecdsa-sha2-1.3.132.0.10` .
Added five kex algorithms: gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha1-, gss-group14-sha1-toWM5Slw5Ew8Mqkay+al2g==, gss-group14-sha256-toWM5Slw5Ew8Mqkay+al2g==, gss-group15-sha512-toWM5Slw5Ew8Mqkay+al2g==; added four ciphers: idea-cbc, serpent128-cbc, serpent192-cbc, serpent256-cbc; added four MACs: hmac-ripemd, hmac-sha256-96@ssh.com, umac-32@openssh.com, umac-96@openssh.com.
2019-10-25 17:27:22 +02:00
- Added 4 new ciphers: `idea-cbc` , `serpent128-cbc` , `serpent192-cbc` , `serpent256-cbc` .
- Added 6 new MACs: `hmac-sha2-256-96-etm@openssh.com` , `hmac-sha2-512-96-etm@openssh.com` , `hmac-ripemd` , `hmac-sha256-96@ssh.com` , `umac-32@openssh.com` , `umac-96@openssh.com` .
2019-08-29 22:52:38 +02:00
2019-08-29 21:34:19 +02:00
### v2.0.0 (2019-08-29)
2019-08-22 21:49:10 +02:00
- Forked from https://github.com/arthepsy/ssh-audit (development was stalled, and developer went MIA).
- Added RSA host key length test.
- Added RSA certificate key length test.
- Added Diffie-Hellman modulus size test.
- Now outputs host key fingerprints for RSA and ED25519.
2019-08-26 21:28:37 +02:00
- Added 5 new key exchanges: `sntrup4591761x25519-sha512@tinyssh.org` , `diffie-hellman-group-exchange-sha256@ssh.com` , `diffie-hellman-group-exchange-sha512@ssh.com` , `diffie-hellman-group16-sha256` , `diffie-hellman-group17-sha512` .
2019-08-22 21:54:14 +02:00
- Added 3 new encryption algorithms: `des-cbc-ssh1` , `blowfish-ctr` , `twofish-ctr` .
2019-08-26 21:19:49 +02:00
- Added 10 new MACs: `hmac-sha2-56` , `hmac-sha2-224` , `hmac-sha2-384` , `hmac-sha3-256` , `hmac-sha3-384` , `hmac-sha3-512` , `hmac-sha256` , `hmac-sha256@ssh.com` , `hmac-sha512` , `hmac-512@ssh.com` .
2019-11-14 14:56:14 +01:00
- Added command line argument (`-t` / `--timeout` ) for connection & reading timeouts.
2019-08-22 21:49:10 +02:00
- Updated CVEs for libssh & Dropbear.
2016-10-26 18:02:13 +02:00
### v1.7.0 (2016-10-26)
2016-10-26 17:56:38 +02:00
- implement options to allow specify IPv4/IPv6 usage and order of precedence
- implement option to specify remote port (old behavior kept for compatibility)
- add colors support for Microsoft Windows via optional colorama dependency
- fix encoding and decoding issues, add tests, do not crash on encoding errors
- use mypy-lang for static type checking and verify all code
2016-10-14 07:55:29 +02:00
### v1.6.0 (2016-10-14)
2016-10-10 13:03:45 +02:00
- implement algorithm recommendations section (based on recognized software)
- implement full libssh support (version history, algorithms, security, etc)
- fix SSH-1.99 banner recognition and version comparison functionality
- do not output empty algorithms (happens for misconfigured servers)
- make consistent output for Python 3.x versions
- add a lot more tests (conf, banner, software, SSH1/SSH2, output, etc)
- use Travis CI to test for multiple Python versions (2.6-3.5, pypy, pypy3)
2016-09-20 11:26:14 +02:00
### v1.5.0 (2016-09-20)
- create security section for related security information
- match and output assigned CVE list and security issues for Dropbear SSH
- implement full SSH1 support with fingerprint information
- automatically fallback to SSH1 on protocol mismatch
- add new options to force SSH1 or SSH2 (both allowed by default)
2016-10-25 20:52:58 +02:00
- parse banner information and convert it to specific software and OS version
2016-09-20 11:26:14 +02:00
- do not use padding in batch mode
- several fixes (Cisco sshd, rare hangs, error handling, etc)
2016-09-02 17:10:16 +02:00
### v1.0.20160902
- implement batch output option
- implement minimum output level option
- fix compatibility with Python 2.6
2016-08-12 15:29:51 +02:00
### v1.0.20160812
2016-08-12 15:33:34 +02:00
- implement SSH version compatibility feature
2016-08-12 15:29:51 +02:00
- fix wrong mac algorithm warning
- fix Dropbear SSH version typo
- parse pre-banner header
- better errors handling
2016-08-03 16:32:46 +02:00
### v1.0.20160803
- use OpenSSH 7.3 banner
- add new key-exchange algorithms
2016-03-07 12:01:57 +01:00
### v1.0.20160207
- use OpenSSH 7.2 banner
2021-08-27 17:19:18 +02:00
- additional warnings for OpenSSH 7.2
2016-03-07 12:01:57 +01:00
- fix OpenSSH 7.0 failure messages
- add rijndael-cbc failure message from OpenSSH 6.7
2016-01-05 13:14:50 +01:00
### v1.0.20160105
2016-01-05 17:04:49 +01:00
- multiple additional warnings
- support for none algorithm
2021-08-27 17:19:18 +02:00
- better compression handling
- ensure reading enough data (fixes few Linux SSH)
2016-01-05 13:14:50 +01:00
2015-12-30 12:17:58 +01:00
### v1.0.20151230
2021-08-27 17:19:18 +02:00
- Dropbear SSH support
2015-12-30 12:17:58 +01:00
2015-12-23 04:52:21 +01:00
### v1.0.20151223
2021-08-27 17:19:18 +02:00
- initial version