Path to this page:
./
security/ssh-audit,
Tool for SSH server & client configuration auditing
Branch: CURRENT,
Version: 3.3.0,
Package name: ssh-audit-3.3.0,
Maintainer: pkgsrc-usersssh-audit is a tool for ssh server & client configuration auditing.
Features:
* SSH1 and SSH2 protocol server support
* analyze SSH client configuration
* grab banner, recognize device or software and OS, detect compression
* gather key-exchange, host-key, encryption and MAC algorithms
* output algorithm information
(available since, removed/disabled, unsafe/weak/legacy, etc)
* output algorithm recommendations
(append or remove based on recognized software version)
* output security information (related issues, assigned CVE list, etc)
* analyze SSH version compatibility based on algorithm information
* historical information from OpenSSH, Dropbear SSH and libssh
* policy scans to ensure adherence to a hardened/standard configuration
Master sites:
Filesize: 168.758 KB
Version history: (Expand)
- (2025-01-07) Updated to version: ssh-audit-3.3.0
- (2023-12-26) Updated to version: ssh-audit-3.1.0nb1
- (2023-10-19) Updated to version: ssh-audit-3.0.0
- (2023-08-14) Updated to version: ssh-audit-2.9.0nb1
- (2023-05-09) Updated to version: ssh-audit-2.9.0
- (2022-11-15) Updated to version: ssh-audit-2.5.0nb1
CVS history: (Expand)
2025-01-07 17:36:43 by Havard Eidnes | Files touched by this commit (4) | |
Log message:
security/ssh-audit: Update to version 3.3.0.
Pkgsrc changes:
* Remove upstream patch which is now integrated
* Checksum updates
Upstream changes:
### v3.3.0 (2024-10-15)
- Added Python 3.13 support.
- Added built-in policies for Ubuntu 24.04 LTS server & client,
OpenSSH 9.8, and OpenSSH 9.9.
- Added IPv6 support for DHEat and connection rate tests.
- Added TCP port information to JSON policy scan results; credit
[Fabian Malte Kopp](https://github.com/dreizehnutters).
- Added LANcom LCOS server recognition and Ed448 key extraction;
credit [Daniel Lenski](https://github.com/dlenskiSB).
- Now reports ECDSA and DSS fingerprints when in verbose mode;
partial credit [Daniel Lenski](https://github.com/dlenskiSB).
- Removed CVE information based on server/client version numbers,
as this was wildly inaccurate (see [this thread]
(https://github.com/jtesta/ssh-audit/issues/240) for the full
discussion, as well as the results of the community vote on this
matter).
- Fixed crash when running with `-P` and `-T` options simultaneously.
- Fixed host key tests from only reporting a key type at most once
despite multiple hosts supporting it; credit [Daniel
Lenski](https://github.com/dlenskiSB).
- Fixed DHEat connection rate testing on MacOS X and BSD platforms;
credit [Drew Noel](https://github.com/drewmnoel) and [Michael
Osipov](https://github.com/michael-o).
- Fixed invalid JSON output when a socket error occurs while
performing a client audit.
- Fixed `--conn-rate-test` feature on Windows.
- When scanning multiple targets (using `-T`/`--targets`), the
`-p`/`--port` option will now be used as the default port (set to
22 if `-p`/`--port` is not given). Hosts specified in the file
can override this default with an explicit port number (i.e.:
"host1:1234"). For example, when using `-T targets.txt -p 222`,
all hosts in `targets.txt` that do not explicitly include a port
number will default to 222; when using `-T targets.txt` (without
`-p`), all hosts will use a default of 22.
- Updated built-in server & client policies for Amazon Linux 2023,
Debian 12, Rocky Linux 9, and Ubuntu 22.04 to improve host key
efficiency and cipher resistance to quantum attacks.
- Added 1 new cipher: `grasshopper-ctr128`.
- Added 2 new key exchanges: `mlkem768x25519-sha256`, `sntrup761x25519-sha512`.
### v3.2.0 (2024-04-22)
- Added implementation of the DHEat denial-of-service attack (see
`--dheat` option; [CVE-2002-20001]
(https://nvd.nist.gov/vuln/detail/CVE-2002-20001)).
- Expanded filter of CBC ciphers to flag for the Terrapin
vulnerability. It now includes more rarely found ciphers.
- Fixed parsing of `ecdsa-sha2-nistp*` CA signatures on host keys.
Additionally, they are now flagged as potentially back-doored,
just as standard host keys are.
- Gracefully handle rare exceptions (i.e.: crashes) while performing
GEX tests.
- The built-in man page (`-m`, `--manual`) is now available on
Docker, PyPI, and Snap builds, in addition to the Windows build.
- Snap builds are now architecture-independent.
- Changed Docker base image from `python:3-slim` to `python:3-alpine`,
resulting in a 59% reduction in image size; credit [Daniel
Thamdrup](https://github.com/dallemon).
- Added built-in policies for Amazon Linux 2023, Debian 12, OpenSSH
9.7, and Rocky Linux 9.
- Built-in policies now include a change log (use `-L -v` to view them).
- Custom policies now support the `allow_algorithm_subset_and_reordering`
directive to allow targets to pass with a subset and/or re-ordered
list of host keys, kex, ciphers, and MACs. This allows for the
creation of a baseline policy where targets can optionally implement
stricter controls; partial credit [yannik1015]
(https://github.com/yannik1015).
- Custom policies now support the `allow_larger_keys` directive
to allow targets to pass with larger host keys, CA keys, and
Diffie-Hellman keys. This allows for the creation of a baseline
policy where targets can optionally implement stricter controls;
partial credit [Damian Szuberski](https://github.com/szubersk).
- Color output is disabled if the `NO_COLOR` environment variable
is set (see https://no-color.org/).
- Added 1 new key exchange algorithm: `gss-nistp384-sha384-*`.
- Added 1 new cipher: `aes128-ocb@libassh.org`.
|
2023-12-26 18:54:02 by Thomas Klausner | Files touched by this commit (2) |
Log message:
ssh-audit: add RCS Id
|
2023-12-26 18:32:09 by Dr. Thomas Orgis | Files touched by this commit (1) |
Log message:
security/ssh-audit: fix previous commit from wrong directory, addding patch
|
2023-12-26 18:30:56 by Dr. Thomas Orgis | Files touched by this commit (2) | |
Log message:
security/ssh-audit: update to 3.1.0 with patch for terrapin
upstream changes since 3.0.0:
v3.2.0-dev (???)
Expanded filter of CBC ciphers to flag for the Terrapin vulnerability. \
It now includes
more rarely found ciphers.
v3.1.0 (2023-12-20)
Added test for the Terrapin message prefix truncation vulnerability \
(CVE-2023-48795).
Dropped support for Python 3.7 (EOL was reached in June 2023).
Added Python 3.12 support.
In server policies, reduced expected DH modulus sizes from 4096 to 3072 \
to match
the online hardening guides (note that 3072-bit moduli provide the \
equivalent of
128-bit symmetric security).
In Ubuntu 22.04 client policy, moved host key types \
sk-ssh-ed25519@openssh.com and
ssh-ed25519 to the end of all certificate types.
Updated Ubuntu Server & Client policies for 20.04 and 22.04 to \
account for key exchange
list changes due to Terrapin vulnerability patches.
Re-organized option host key types for OpenSSH 9.2 server policy to \
correspond with
updated Debian 12 hardening guide.
Added built-in policies for OpenSSH 9.5 and 9.6.
Added an additional_notes field to the JSON output.
|
2023-10-19 14:58:34 by Thomas Klausner | Files touched by this commit (2) | |
Log message:
ssh-audit: update to 3.0.0.
This release includes important fixes for multiple-host scans,
improved Diffie-Hellman group exchange auditing, and the inclusion
of algorithm notes into the JSON output (note that this changes
the schema of the banner protocol, "enc", and "mac" fields). \
Support
for 49 new algorithms were also added!
|
2023-08-14 07:25:36 by Thomas Klausner | Files touched by this commit (1247) |
Log message:
*: recursive bump for Python 3.11 as new default
|
2023-05-09 01:00:21 by Thomas Klausner | Files touched by this commit (2) | |
Log message:
ssh-audit: update to 2.9.0.
2.9.0
This release includes many new features, including granular GEX
modulus tests (credit Adam Russell), support for mixed host key/CA
key certificates (i.e.: RSA host keys signed by ED25519 CAs),
warnings for 2048-bit moduli, and more descriptive algorithm notes.
Support for 112 new algorithms were also added!
|
2022-11-15 16:08:22 by Frederic Cambus | Files touched by this commit (2) |
Log message:
ssh-audit: add a post-install directive to install the manual page.
|