2023-03-24 23:48:36 +01:00
{
2023-12-20 00:03:07 +01:00
"additional_notes" : [
""
] ,
2023-03-24 23:48:36 +01:00
"banner" : {
"comments" : null ,
2023-09-05 22:36:54 +02:00
"protocol" : "2.0" ,
2023-03-24 23:48:36 +01:00
"raw" : "SSH-2.0-OpenSSH_8.0" ,
"software" : "OpenSSH_8.0"
} ,
"compression" : [
"none" ,
"zlib@openssh.com"
] ,
"cves" : [
{
"cvssv2" : 7.0 ,
"description" : "privilege escalation via supplemental groups" ,
"name" : "CVE-2021-41617"
} ,
{
"cvssv2" : 7.8 ,
"description" : "command injection via anomalous argument transfers" ,
"name" : "CVE-2020-15778"
} ,
{
"cvssv2" : 7.8 ,
"description" : "memory corruption and local code execution via pre-authentication integer overflow" ,
"name" : "CVE-2019-16905"
} ,
{
"cvssv2" : 5.3 ,
"description" : "enumerate usernames via challenge response" ,
"name" : "CVE-2016-20012"
}
] ,
"enc" : [
2023-09-05 22:36:54 +02:00
{
"algorithm" : "chacha20-poly1305@openssh.com" ,
"notes" : {
"info" : [
"default cipher since OpenSSH 6.9" ,
2024-03-19 20:47:09 +01:00
"available since OpenSSH 6.5, Dropbear SSH 2020.79"
2023-12-19 20:03:28 +01:00
] ,
"warn" : [
"vulnerable to the Terrapin attack (CVE-2023-48795), allowing message prefix truncation"
2023-09-05 22:36:54 +02:00
]
}
} ,
{
"algorithm" : "aes128-ctr" ,
"notes" : {
"info" : [
"available since OpenSSH 3.7, Dropbear SSH 0.52"
]
}
} ,
{
"algorithm" : "aes192-ctr" ,
"notes" : {
"info" : [
"available since OpenSSH 3.7"
]
}
} ,
{
"algorithm" : "aes256-ctr" ,
"notes" : {
"info" : [
"available since OpenSSH 3.7, Dropbear SSH 0.52"
]
}
} ,
{
"algorithm" : "aes128-gcm@openssh.com" ,
"notes" : {
"info" : [
"available since OpenSSH 6.2"
]
}
} ,
{
"algorithm" : "aes256-gcm@openssh.com" ,
"notes" : {
"info" : [
"available since OpenSSH 6.2"
]
}
}
2023-03-24 23:48:36 +01:00
] ,
"fingerprints" : [
{
"hash" : "UrnXIVH+7dlw8UqYocl48yUEcKrthGDQG2CPCgp7MxU" ,
"hash_alg" : "SHA256" ,
"hostkey" : "ssh-ed25519"
} ,
{
"hash" : "1e:0c:7b:34:73:bf:52:41:b0:f9:d1:a9:ab:98:c7:c9" ,
"hash_alg" : "MD5" ,
"hostkey" : "ssh-ed25519"
} ,
{
"hash" : "nsWtdJ9Z67Vrf7OsUzQov7esXhsWAfVppArGh25u244" ,
"hash_alg" : "SHA256" ,
"hostkey" : "ssh-rsa"
} ,
{
"hash" : "18:e2:51:fe:21:6c:78:d0:b8:cf:32:d4:bd:56:42:e1" ,
"hash_alg" : "MD5" ,
"hostkey" : "ssh-rsa"
}
] ,
"kex" : [
{
2023-09-05 22:36:54 +02:00
"algorithm" : "curve25519-sha256" ,
"notes" : {
"info" : [
2024-03-15 22:24:21 +01:00
"default key exchange from OpenSSH 6.4 to 8.9" ,
2023-09-05 22:36:54 +02:00
"available since OpenSSH 7.4, Dropbear SSH 2018.76"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "curve25519-sha256@libssh.org" ,
"notes" : {
"info" : [
2024-03-15 22:24:21 +01:00
"default key exchange from OpenSSH 6.4 to 8.9" ,
2023-09-05 22:36:54 +02:00
"available since OpenSSH 6.4, Dropbear SSH 2013.62"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "ecdh-sha2-nistp256" ,
"notes" : {
"fail" : [
"using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency"
] ,
"info" : [
"available since OpenSSH 5.7, Dropbear SSH 2013.62"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "ecdh-sha2-nistp384" ,
"notes" : {
"fail" : [
"using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency"
] ,
"info" : [
"available since OpenSSH 5.7, Dropbear SSH 2013.62"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "ecdh-sha2-nistp521" ,
"notes" : {
"fail" : [
"using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency"
] ,
"info" : [
"available since OpenSSH 5.7, Dropbear SSH 2013.62"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
"algorithm" : "diffie-hellman-group-exchange-sha256" ,
2023-09-05 22:36:54 +02:00
"keysize" : 4096 ,
"notes" : {
"info" : [
"OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477)." ,
"available since OpenSSH 4.4"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "diffie-hellman-group16-sha512" ,
"notes" : {
"info" : [
"available since OpenSSH 7.3, Dropbear SSH 2016.73"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "diffie-hellman-group18-sha512" ,
"notes" : {
"info" : [
"available since OpenSSH 7.3"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "diffie-hellman-group14-sha256" ,
"notes" : {
"info" : [
"available since OpenSSH 7.3, Dropbear SSH 2016.73"
] ,
"warn" : [
"2048-bit modulus only provides 112-bits of symmetric strength"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "diffie-hellman-group14-sha1" ,
"notes" : {
"fail" : [
"using broken SHA-1 hash algorithm"
] ,
"info" : [
"available since OpenSSH 3.9, Dropbear SSH 0.53"
] ,
"warn" : [
"2048-bit modulus only provides 112-bits of symmetric strength"
]
}
2023-03-24 23:48:36 +01:00
}
] ,
"key" : [
{
"algorithm" : "rsa-sha2-512" ,
2023-09-05 22:36:54 +02:00
"keysize" : 3072 ,
"notes" : {
"info" : [
"available since OpenSSH 7.2"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
"algorithm" : "rsa-sha2-256" ,
2023-09-05 22:36:54 +02:00
"keysize" : 3072 ,
"notes" : {
"info" : [
2024-03-19 20:47:09 +01:00
"available since OpenSSH 7.2, Dropbear SSH 2020.79"
2023-09-05 22:36:54 +02:00
]
}
2023-03-24 23:48:36 +01:00
} ,
{
"algorithm" : "ssh-rsa" ,
2023-09-05 22:36:54 +02:00
"keysize" : 3072 ,
"notes" : {
"fail" : [
"using broken SHA-1 hash algorithm"
] ,
"info" : [
"deprecated in OpenSSH 8.8: https://www.openssh.com/txt/release-8.8" ,
"available since OpenSSH 2.5.0, Dropbear SSH 0.28"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "ecdsa-sha2-nistp256" ,
"notes" : {
"fail" : [
"using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency"
] ,
"info" : [
"available since OpenSSH 5.7, Dropbear SSH 2013.62"
] ,
"warn" : [
"using weak random number generator could reveal the key"
]
}
2023-03-24 23:48:36 +01:00
} ,
{
2023-09-05 22:36:54 +02:00
"algorithm" : "ssh-ed25519" ,
"notes" : {
"info" : [
2024-03-19 20:47:09 +01:00
"available since OpenSSH 6.5, Dropbear SSH 2020.79"
2023-09-05 22:36:54 +02:00
]
}
2023-03-24 23:48:36 +01:00
}
] ,
"mac" : [
2023-09-05 22:36:54 +02:00
{
"algorithm" : "umac-64-etm@openssh.com" ,
"notes" : {
"info" : [
"available since OpenSSH 6.2"
] ,
"warn" : [
"using small 64-bit tag size"
]
}
} ,
{
"algorithm" : "umac-128-etm@openssh.com" ,
"notes" : {
"info" : [
"available since OpenSSH 6.2"
]
}
} ,
{
"algorithm" : "hmac-sha2-256-etm@openssh.com" ,
"notes" : {
"info" : [
"available since OpenSSH 6.2"
]
}
} ,
{
"algorithm" : "hmac-sha2-512-etm@openssh.com" ,
"notes" : {
"info" : [
"available since OpenSSH 6.2"
]
}
} ,
{
"algorithm" : "hmac-sha1-etm@openssh.com" ,
"notes" : {
"fail" : [
"using broken SHA-1 hash algorithm"
] ,
"info" : [
"available since OpenSSH 6.2"
]
}
} ,
{
"algorithm" : "umac-64@openssh.com" ,
"notes" : {
"info" : [
"available since OpenSSH 4.7"
] ,
"warn" : [
"using encrypt-and-MAC mode" ,
"using small 64-bit tag size"
]
}
} ,
{
"algorithm" : "umac-128@openssh.com" ,
"notes" : {
"info" : [
"available since OpenSSH 6.2"
] ,
"warn" : [
"using encrypt-and-MAC mode"
]
}
} ,
{
"algorithm" : "hmac-sha2-256" ,
"notes" : {
"info" : [
"available since OpenSSH 5.9, Dropbear SSH 2013.56"
] ,
"warn" : [
"using encrypt-and-MAC mode"
]
}
} ,
{
"algorithm" : "hmac-sha2-512" ,
"notes" : {
"info" : [
"available since OpenSSH 5.9, Dropbear SSH 2013.56"
] ,
"warn" : [
"using encrypt-and-MAC mode"
]
}
} ,
{
"algorithm" : "hmac-sha1" ,
"notes" : {
"fail" : [
"using broken SHA-1 hash algorithm"
] ,
"info" : [
"available since OpenSSH 2.1.0, Dropbear SSH 0.28"
] ,
"warn" : [
"using encrypt-and-MAC mode"
]
}
}
2023-03-24 23:48:36 +01:00
] ,
"recommendations" : {
"critical" : {
"del" : {
"kex" : [
{
"name" : "diffie-hellman-group14-sha1" ,
"notes" : ""
} ,
{
"name" : "ecdh-sha2-nistp256" ,
"notes" : ""
} ,
{
"name" : "ecdh-sha2-nistp384" ,
"notes" : ""
} ,
{
"name" : "ecdh-sha2-nistp521" ,
"notes" : ""
}
] ,
"key" : [
{
2023-03-28 18:09:25 +02:00
"name" : "ecdsa-sha2-nistp256" ,
2023-03-24 23:48:36 +01:00
"notes" : ""
} ,
{
2023-03-28 18:09:25 +02:00
"name" : "ssh-rsa" ,
2023-03-24 23:48:36 +01:00
"notes" : ""
}
] ,
"mac" : [
{
"name" : "hmac-sha1" ,
"notes" : ""
} ,
{
"name" : "hmac-sha1-etm@openssh.com" ,
"notes" : ""
}
]
}
} ,
"warning" : {
"del" : {
2023-12-19 20:03:28 +01:00
"enc" : [
{
"name" : "chacha20-poly1305@openssh.com" ,
"notes" : ""
}
] ,
2023-03-24 23:48:36 +01:00
"kex" : [
{
"name" : "diffie-hellman-group14-sha256" ,
"notes" : ""
}
] ,
"mac" : [
{
"name" : "hmac-sha2-256" ,
"notes" : ""
} ,
{
"name" : "hmac-sha2-512" ,
"notes" : ""
} ,
{
2023-03-28 18:09:25 +02:00
"name" : "umac-128@openssh.com" ,
2023-03-24 23:48:36 +01:00
"notes" : ""
} ,
{
2023-03-28 18:09:25 +02:00
"name" : "umac-64-etm@openssh.com" ,
2023-03-24 23:48:36 +01:00
"notes" : ""
} ,
{
2023-03-28 18:09:25 +02:00
"name" : "umac-64@openssh.com" ,
2023-03-24 23:48:36 +01:00
"notes" : ""
}
]
}
}
} ,
"target" : "localhost:2222"
}