-
-
Notifications
You must be signed in to change notification settings - Fork 179
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
The color of all notes will be printed in green when the related algo…
…rithm is rated good.
- Loading branch information
Showing
7 changed files
with
25 additions
and
19 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -184,6 +184,7 @@ For convenience, a web front-end on top of the command-line tool is available at | |
- Algorithm recommendations resulting from warnings are now printed in yellow instead of red; credit [Adam Russell](https://github.com/thecliguy). | ||
- Fixed crash during GEX tests. | ||
- Refined GEX testing against OpenSSH servers: when the fallback mechanism is suspected of being triggered, perform an additional test to obtain more accurate results. | ||
- The color of all notes will be printed in green when the related algorithm is rated good. | ||
- Added built-in policy for OpenSSH 9.4. | ||
- Added 1 new key exchange: `[email protected]`. | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,9 +6,9 @@ | |
|
||
[0;36m# key exchange algorithms[0m | ||
[0;32m(kex) curve25519-sha256 -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;32m(kex) [email protected] -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;31m(kex) ecdh-sha2-nistp521 -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m | ||
`- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 | ||
[0;31m(kex) ecdh-sha2-nistp384 -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,17 +12,17 @@ | |
|
||
[0;36m# key exchange algorithms[0m | ||
[0;32m(kex) curve25519-sha256 -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;32m(kex) [email protected] -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;31m(kex) ecdh-sha2-nistp256 -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m | ||
`- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 | ||
[0;31m(kex) ecdh-sha2-nistp384 -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m | ||
`- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 | ||
[0;31m(kex) ecdh-sha2-nistp521 -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m | ||
`- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 | ||
[0;32m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [info] available since OpenSSH 4.4[0m | ||
`- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477). | ||
[0;32m `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).[0m | ||
[0;32m(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73[0m | ||
[0;32m(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3[0m | ||
[0;33m(kex) diffie-hellman-group14-sha256 -- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m | ||
|
@@ -44,7 +44,7 @@ | |
|
||
[0;36m# encryption algorithms (ciphers)[0m | ||
[0;32m(enc) [email protected] -- [info] available since OpenSSH 6.5[0m | ||
`- [info] default cipher since OpenSSH 6.9 | ||
[0;32m `- [info] default cipher since OpenSSH 6.9[0m | ||
[0;32m(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52[0m | ||
[0;32m(enc) aes192-ctr -- [info] available since OpenSSH 3.7[0m | ||
[0;32m(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52[0m | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,17 +12,17 @@ | |
|
||
[0;36m# key exchange algorithms[0m | ||
[0;32m(kex) curve25519-sha256 -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;32m(kex) [email protected] -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;31m(kex) ecdh-sha2-nistp256 -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m | ||
`- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 | ||
[0;31m(kex) ecdh-sha2-nistp384 -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m | ||
`- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 | ||
[0;31m(kex) ecdh-sha2-nistp521 -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m | ||
`- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62 | ||
[0;32m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [info] available since OpenSSH 4.4[0m | ||
`- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477). | ||
[0;32m `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).[0m | ||
[0;32m(kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73[0m | ||
[0;32m(kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3[0m | ||
[0;33m(kex) diffie-hellman-group14-sha256 -- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m | ||
|
@@ -37,7 +37,7 @@ | |
|
||
[0;36m# encryption algorithms (ciphers)[0m | ||
[0;32m(enc) [email protected] -- [info] available since OpenSSH 6.5[0m | ||
`- [info] default cipher since OpenSSH 6.9 | ||
[0;32m `- [info] default cipher since OpenSSH 6.9[0m | ||
[0;32m(enc) aes128-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52[0m | ||
[0;32m(enc) aes192-ctr -- [info] available since OpenSSH 3.7[0m | ||
[0;32m(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52[0m | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -12,18 +12,18 @@ | |
|
||
[0;36m# key exchange algorithms[0m | ||
[0;32m(kex) curve25519-sha256 -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;32m(kex) [email protected] -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;32m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [info] available since OpenSSH 4.4[0m | ||
`- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477). | ||
[0;32m `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).[0m | ||
|
||
[0;36m# host-key algorithms[0m | ||
[0;32m(key) ssh-ed25519 -- [info] available since OpenSSH 6.5[0m | ||
|
||
[0;36m# encryption algorithms (ciphers)[0m | ||
[0;32m(enc) [email protected] -- [info] available since OpenSSH 6.5[0m | ||
`- [info] default cipher since OpenSSH 6.9 | ||
[0;32m `- [info] default cipher since OpenSSH 6.9[0m | ||
[0;32m(enc) [email protected] -- [info] available since OpenSSH 6.2[0m | ||
[0;32m(enc) [email protected] -- [info] available since OpenSSH 6.2[0m | ||
[0;32m(enc) aes256-ctr -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52[0m | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -5,9 +5,9 @@ | |
|
||
[0;36m# key exchange algorithms[0m | ||
[0;32m(kex) curve25519-sha256 -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;32m(kex) [email protected] -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m | ||
`- [info] default key exchange since OpenSSH 6.4 | ||
[0;32m `- [info] default key exchange since OpenSSH 6.4[0m | ||
[0;33m(kex) [email protected] -- [warn] using experimental algorithm[0m | ||
`- [info] available since OpenSSH 8.0 | ||
`- [info] the sntrup4591761 algorithm was withdrawn, as it may not provide strong post-quantum security | ||
|
@@ -17,7 +17,7 @@ | |
|
||
[0;36m# encryption algorithms (ciphers)[0m | ||
[0;32m(enc) [email protected] -- [info] available since OpenSSH 6.5[0m | ||
`- [info] default cipher since OpenSSH 6.9 | ||
[0;32m `- [info] default cipher since OpenSSH 6.9[0m | ||
|
||
[0;36m# message authentication code algorithms[0m | ||
[0;33m(mac) hmac-sha2-256 -- [warn] using encrypt-and-MAC mode[0m | ||
|