there is a weakness in SSH with can be used to exploid connections.
Code: Select all
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Code: Select all
https://cloud.google.com/knowledge/kb/disable-weak-ssh-ciphers-for-compute-engine-linux-vms-000004592
How to check :
Code: Select all
nmap --script ssh2-enum-algos -sV -p 22 <IP>
add the following line to your /etc/ssh/sshd_config
Code: Select all
ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
Code: Select all
service sshd restart
I know the etm based MAC are also weak but not as easy as the cipher itself.