ssh vulnerable
Posted: 25 Dec 2023 08:41
Hi
there is a weakness in SSH with can be used to exploid connections.
How to check :
Workaround (on Centos 7 !! for other releases use sshd -T | grep -i 'cipher' to check available ciphers and remove the chacha20-poly1305@openssh.com from the list before adding to sshd_config ):
add the following line to your /etc/ssh/sshd_config
and restart the service.
I know the etm based MAC are also weak but not as easy as the cipher itself.
there is a weakness in SSH with can be used to exploid connections.
Code: Select all
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
Code: Select all
https://cloud.google.com/knowledge/kb/disable-weak-ssh-ciphers-for-compute-engine-linux-vms-000004592
How to check :
Code: Select all
nmap --script ssh2-enum-algos -sV -p 22 <IP>
add the following line to your /etc/ssh/sshd_config
Code: Select all
ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
Code: Select all
service sshd restart
I know the etm based MAC are also weak but not as easy as the cipher itself.