Checking the security of SSH servers
If we need to verify our SSH server configuration, we have two choices:
- By reviewing the SSH configurations file and comparing the files against a benchmark such as the CIS
- By using
ssh-audit
, which is a script developed in Python that will allow us to extract a large amount of information about our protocol configuration
In this section, we will be looking at ssh-audit, https://pypi.org/project/ssh-audit, an open source tool written in Python that scans the SSH server configurations and will indicate whether the different configurations that we have applied are secure. The main feature of this tool is that it can audit every part of the SSH server. For example, it will be able to detect the login banner and if we are using an insecure protocol such as SSH1.
At the communications encryption level, it has the capacity to verify the key exchange algorithms, the public key of the host, the symmetric encryption when the...