there is a weakness in SSH with can be used to exploid connections.
Code: Select all
https://forum.netgate.com/topic/184941/terrapin-ssh-attackCode: Select all
https://cloud.google.com/knowledge/kb/disable-weak-ssh-ciphers-for-compute-engine-linux-vms-000004592How to check :
Code: Select all
nmap --script ssh2-enum-algos -sV -p 22 <IP>add the following line to your /etc/ssh/sshd_config
Code: Select all
ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbcCode: Select all
service sshd restartI know the etm based MAC are also weak but not as easy as the cipher itself.