mirror of
				https://github.com/jtesta/ssh-audit.git
				synced 2025-11-03 18:52:15 +01:00 
			
		
		
		
	Added warnings to all key exchanges that do not provide protection against quantum attacks.
This commit is contained in:
		@@ -116,6 +116,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 7.4 to 8.9",
 | 
			
		||||
                    "available since OpenSSH 7.4, Dropbear SSH 2018.76"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -125,6 +128,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 6.5 to 7.3",
 | 
			
		||||
                    "available since OpenSSH 6.4, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -136,6 +142,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -147,6 +156,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -158,6 +170,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -168,7 +183,8 @@
 | 
			
		||||
                    "available since OpenSSH 7.3, Dropbear SSH 2016.73"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -182,7 +198,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -191,6 +208,9 @@
 | 
			
		||||
            "notes": {
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since Dropbear SSH 2013.57"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
@@ -349,12 +369,6 @@
 | 
			
		||||
                        "name": "twofish256-ctr",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group16-sha512",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    }
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -371,9 +385,21 @@
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "curve25519-sha256",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "curve25519-sha256@libssh.org",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group14-sha256",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "kexguess2@matt.ucc.asn.au",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "mac": [
 | 
			
		||||
 
 | 
			
		||||
@@ -5,22 +5,30 @@
 | 
			
		||||
[0;32m(gen) compression: enabled (zlib@openssh.com)[0m
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256              -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m
 | 
			
		||||
[0;32m                                     `- [info] default key exchange from OpenSSH 7.4 to 8.9[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256@libssh.org   -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m
 | 
			
		||||
[0;32m                                     `- [info] default key exchange from OpenSSH 6.5 to 7.3[0m
 | 
			
		||||
[0;33m(kex) curve25519-sha256              -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                     `- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76
 | 
			
		||||
                                     `- [info] default key exchange from OpenSSH 7.4 to 8.9
 | 
			
		||||
[0;33m(kex) curve25519-sha256@libssh.org   -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                     `- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62
 | 
			
		||||
                                     `- [info] default key exchange from OpenSSH 6.5 to 7.3
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp521             -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                     `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                     `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp384             -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                     `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                     `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp256             -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                     `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                     `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;33m(kex) diffie-hellman-group14-sha256  -- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                     `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                     `- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1    -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                     `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                     `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                     `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
[0;32m(kex) kexguess2@matt.ucc.asn.au      -- [info] available since Dropbear SSH 2013.57[0m
 | 
			
		||||
[0;33m(kex) kexguess2@matt.ucc.asn.au      -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                     `- [info] available since Dropbear SSH 2013.57
 | 
			
		||||
 | 
			
		||||
[0;36m# host-key algorithms[0m
 | 
			
		||||
[0;31m(key) ecdsa-sha2-nistp256            -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
@@ -74,13 +82,15 @@
 | 
			
		||||
[0;31m(rec) -hmac-sha1-96                  -- mac algorithm to remove [0m
 | 
			
		||||
[0;31m(rec) -ssh-dss                       -- key algorithm to remove [0m
 | 
			
		||||
[0;31m(rec) -ssh-rsa                       -- key algorithm to remove [0m
 | 
			
		||||
[0;32m(rec) +diffie-hellman-group16-sha512 -- kex algorithm to append [0m
 | 
			
		||||
[0;32m(rec) +twofish128-ctr                -- enc algorithm to append [0m
 | 
			
		||||
[0;32m(rec) +twofish256-ctr                -- enc algorithm to append [0m
 | 
			
		||||
[0;33m(rec) -aes128-cbc                    -- enc algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -aes256-cbc                    -- enc algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -curve25519-sha256             -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -curve25519-sha256@libssh.org  -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -diffie-hellman-group14-sha256 -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -hmac-sha2-256                 -- mac algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -kexguess2@matt.ucc.asn.au     -- kex algorithm to remove [0m
 | 
			
		||||
 | 
			
		||||
[0;36m# additional info[0m
 | 
			
		||||
[0;33m(nfo) For hardening guides on common OSes, please see: <https://www.ssh-audit.com/hardening_guides.html>[0m
 | 
			
		||||
 
 | 
			
		||||
@@ -173,6 +173,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 2.3.0"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -186,7 +189,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -201,6 +205,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9",
 | 
			
		||||
                    "available since OpenSSH 2.3.0, Dropbear SSH 0.28"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
@@ -10,13 +10,16 @@
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha1 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                    `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                    `- [info] available since OpenSSH 2.3.0
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1         -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                          `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                          `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                          `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
[0;31m(kex) diffie-hellman-group1-sha1          -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;31m                                          `- [fail] vulnerable to the Logjam attack: https://en.wikipedia.org/wiki/Logjam_(computer_security)[0m
 | 
			
		||||
[0;31m                                          `- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                          `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                          `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
 | 
			
		||||
                                          `- [info] removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -195,6 +195,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 4.4"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -207,6 +210,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 2.3.0"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -220,7 +226,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -235,6 +242,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9",
 | 
			
		||||
                    "available since OpenSSH 2.3.0, Dropbear SSH 0.28"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
@@ -6,15 +6,19 @@
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha256 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                      `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                      `- [info] available since OpenSSH 4.4
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha1 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                    `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                    `- [info] available since OpenSSH 2.3.0
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1           -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
[0;31m(kex) diffie-hellman-group1-sha1            -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;31m                                            `- [fail] vulnerable to the Logjam attack: https://en.wikipedia.org/wiki/Logjam_(computer_security)[0m
 | 
			
		||||
[0;31m                                            `- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
 | 
			
		||||
                                            `- [info] removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -185,6 +185,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 4.4"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -197,6 +200,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 2.3.0"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -210,7 +216,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -225,6 +232,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9",
 | 
			
		||||
                    "available since OpenSSH 2.3.0, Dropbear SSH 0.28"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
@@ -6,15 +6,19 @@
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha256 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                      `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                      `- [info] available since OpenSSH 4.4
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha1 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                    `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                    `- [info] available since OpenSSH 2.3.0
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1           -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
[0;31m(kex) diffie-hellman-group1-sha1            -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;31m                                            `- [fail] vulnerable to the Logjam attack: https://en.wikipedia.org/wiki/Logjam_(computer_security)[0m
 | 
			
		||||
[0;31m                                            `- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
 | 
			
		||||
                                            `- [info] removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -185,6 +185,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 4.4"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -197,6 +200,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 2.3.0"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -210,7 +216,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -225,6 +232,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9",
 | 
			
		||||
                    "available since OpenSSH 2.3.0, Dropbear SSH 0.28"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
@@ -6,15 +6,19 @@
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha256 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                      `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                      `- [info] available since OpenSSH 4.4
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha1 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                    `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                    `- [info] available since OpenSSH 2.3.0
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1           -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
[0;31m(kex) diffie-hellman-group1-sha1            -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;31m                                            `- [fail] vulnerable to the Logjam attack: https://en.wikipedia.org/wiki/Logjam_(computer_security)[0m
 | 
			
		||||
[0;31m                                            `- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
 | 
			
		||||
                                            `- [info] removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -185,6 +185,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 4.4"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -197,6 +200,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 2.3.0"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -210,7 +216,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -225,6 +232,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9",
 | 
			
		||||
                    "available since OpenSSH 2.3.0, Dropbear SSH 0.28"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
@@ -6,15 +6,19 @@
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha256 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                      `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                      `- [info] available since OpenSSH 4.4
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha1 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                    `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                    `- [info] available since OpenSSH 2.3.0
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1           -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
[0;31m(kex) diffie-hellman-group1-sha1            -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;31m                                            `- [fail] vulnerable to the Logjam attack: https://en.wikipedia.org/wiki/Logjam_(computer_security)[0m
 | 
			
		||||
[0;31m                                            `- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
 | 
			
		||||
                                            `- [info] removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -185,6 +185,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 4.4"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -197,6 +200,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 2.3.0"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -210,7 +216,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -225,6 +232,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9",
 | 
			
		||||
                    "available since OpenSSH 2.3.0, Dropbear SSH 0.28"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
@@ -6,15 +6,19 @@
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha256 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                      `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                      `- [info] available since OpenSSH 4.4
 | 
			
		||||
[0;31m(kex) diffie-hellman-group-exchange-sha1 (1024-bit) -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;33m                                                    `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                    `- [info] available since OpenSSH 2.3.0
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1           -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
[0;31m(kex) diffie-hellman-group1-sha1            -- [fail] using small 1024-bit modulus[0m
 | 
			
		||||
[0;31m                                            `- [fail] vulnerable to the Logjam attack: https://en.wikipedia.org/wiki/Logjam_(computer_security)[0m
 | 
			
		||||
[0;31m                                            `- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 2.3.0, Dropbear SSH 0.28
 | 
			
		||||
                                            `- [info] removed in OpenSSH 6.9: https://www.openssh.com/txt/release-6.9
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -104,6 +104,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 7.4 to 8.9",
 | 
			
		||||
                    "available since OpenSSH 7.4, Dropbear SSH 2018.76"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -113,6 +116,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 6.5 to 7.3",
 | 
			
		||||
                    "available since OpenSSH 6.4, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -124,6 +130,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -135,6 +144,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -146,6 +158,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -156,6 +171,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).",
 | 
			
		||||
                    "available since OpenSSH 4.4"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -164,6 +182,9 @@
 | 
			
		||||
            "notes": {
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 7.3, Dropbear SSH 2016.73"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -172,6 +193,9 @@
 | 
			
		||||
            "notes": {
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 7.3"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -182,7 +206,8 @@
 | 
			
		||||
                    "available since OpenSSH 7.3, Dropbear SSH 2016.73"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -196,7 +221,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
@@ -407,6 +433,14 @@
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
        "warning": {
 | 
			
		||||
            "chg": {
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group-exchange-sha256",
 | 
			
		||||
                        "notes": "increase modulus size to 3072 bits or larger"
 | 
			
		||||
                    }
 | 
			
		||||
                ]
 | 
			
		||||
            },
 | 
			
		||||
            "del": {
 | 
			
		||||
                "enc": [
 | 
			
		||||
                    {
 | 
			
		||||
@@ -415,9 +449,25 @@
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "curve25519-sha256",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "curve25519-sha256@libssh.org",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group14-sha256",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group16-sha512",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group18-sha512",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "mac": [
 | 
			
		||||
 
 | 
			
		||||
@@ -5,24 +5,34 @@
 | 
			
		||||
[0;32m(gen) compression: enabled (zlib@openssh.com)[0m
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256                     -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m
 | 
			
		||||
[0;32m                                            `- [info] default key exchange from OpenSSH 7.4 to 8.9[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256@libssh.org          -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m
 | 
			
		||||
[0;32m                                            `- [info] default key exchange from OpenSSH 6.5 to 7.3[0m
 | 
			
		||||
[0;33m(kex) curve25519-sha256                     -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76
 | 
			
		||||
                                            `- [info] default key exchange from OpenSSH 7.4 to 8.9
 | 
			
		||||
[0;33m(kex) curve25519-sha256@libssh.org          -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62
 | 
			
		||||
                                            `- [info] default key exchange from OpenSSH 6.5 to 7.3
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp256                    -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp384                    -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp521                    -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;32m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [info] available since OpenSSH 4.4[0m
 | 
			
		||||
[0;32m                                                      `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).[0m
 | 
			
		||||
[0;32m(kex) diffie-hellman-group16-sha512         -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73[0m
 | 
			
		||||
[0;32m(kex) diffie-hellman-group18-sha512         -- [info] available since OpenSSH 7.3[0m
 | 
			
		||||
[0;33m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                      `- [info] available since OpenSSH 4.4
 | 
			
		||||
                                                      `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).
 | 
			
		||||
[0;33m(kex) diffie-hellman-group16-sha512         -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
 | 
			
		||||
[0;33m(kex) diffie-hellman-group18-sha512         -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.3
 | 
			
		||||
[0;33m(kex) diffie-hellman-group14-sha256         -- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1           -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
 | 
			
		||||
[0;36m# host-key algorithms[0m
 | 
			
		||||
@@ -80,8 +90,13 @@
 | 
			
		||||
[0;31m(rec) -hmac-sha1                            -- mac algorithm to remove [0m
 | 
			
		||||
[0;31m(rec) -hmac-sha1-etm@openssh.com            -- mac algorithm to remove [0m
 | 
			
		||||
[0;31m(rec) -ssh-rsa                              -- key algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) !diffie-hellman-group-exchange-sha256 -- kex algorithm to change (increase modulus size to 3072 bits or larger) [0m
 | 
			
		||||
[0;33m(rec) -chacha20-poly1305@openssh.com        -- enc algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -curve25519-sha256                    -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -curve25519-sha256@libssh.org         -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -diffie-hellman-group14-sha256        -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -diffie-hellman-group16-sha512        -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -diffie-hellman-group18-sha512        -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -hmac-sha2-256                        -- mac algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -hmac-sha2-512                        -- mac algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -umac-128@openssh.com                 -- mac algorithm to remove [0m
 | 
			
		||||
 
 | 
			
		||||
@@ -84,6 +84,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 7.4 to 8.9",
 | 
			
		||||
                    "available since OpenSSH 7.4, Dropbear SSH 2018.76"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -93,6 +96,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 6.5 to 7.3",
 | 
			
		||||
                    "available since OpenSSH 6.4, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -104,6 +110,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -115,6 +124,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -126,6 +138,9 @@
 | 
			
		||||
                ],
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 5.7, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -136,6 +151,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).",
 | 
			
		||||
                    "available since OpenSSH 4.4"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -144,6 +162,9 @@
 | 
			
		||||
            "notes": {
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 7.3, Dropbear SSH 2016.73"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -152,6 +173,9 @@
 | 
			
		||||
            "notes": {
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "available since OpenSSH 7.3"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -162,7 +186,8 @@
 | 
			
		||||
                    "available since OpenSSH 7.3, Dropbear SSH 2016.73"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -176,7 +201,8 @@
 | 
			
		||||
                    "available since OpenSSH 3.9, Dropbear SSH 0.53"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength"
 | 
			
		||||
                    "2048-bit modulus only provides 112-bits of symmetric strength",
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
@@ -356,6 +382,14 @@
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
        "warning": {
 | 
			
		||||
            "chg": {
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group-exchange-sha256",
 | 
			
		||||
                        "notes": "increase modulus size to 3072 bits or larger"
 | 
			
		||||
                    }
 | 
			
		||||
                ]
 | 
			
		||||
            },
 | 
			
		||||
            "del": {
 | 
			
		||||
                "enc": [
 | 
			
		||||
                    {
 | 
			
		||||
@@ -364,9 +398,25 @@
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "curve25519-sha256",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "curve25519-sha256@libssh.org",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group14-sha256",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group16-sha512",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group18-sha512",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "mac": [
 | 
			
		||||
 
 | 
			
		||||
@@ -5,24 +5,34 @@
 | 
			
		||||
[0;32m(gen) compression: enabled (zlib@openssh.com)[0m
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256                     -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m
 | 
			
		||||
[0;32m                                            `- [info] default key exchange from OpenSSH 7.4 to 8.9[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256@libssh.org          -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m
 | 
			
		||||
[0;32m                                            `- [info] default key exchange from OpenSSH 6.5 to 7.3[0m
 | 
			
		||||
[0;33m(kex) curve25519-sha256                     -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76
 | 
			
		||||
                                            `- [info] default key exchange from OpenSSH 7.4 to 8.9
 | 
			
		||||
[0;33m(kex) curve25519-sha256@libssh.org          -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62
 | 
			
		||||
                                            `- [info] default key exchange from OpenSSH 6.5 to 7.3
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp256                    -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp384                    -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;31m(kex) ecdh-sha2-nistp521                    -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
 | 
			
		||||
[0;32m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [info] available since OpenSSH 4.4[0m
 | 
			
		||||
[0;32m                                                      `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).[0m
 | 
			
		||||
[0;32m(kex) diffie-hellman-group16-sha512         -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73[0m
 | 
			
		||||
[0;32m(kex) diffie-hellman-group18-sha512         -- [info] available since OpenSSH 7.3[0m
 | 
			
		||||
[0;33m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                      `- [info] available since OpenSSH 4.4
 | 
			
		||||
                                                      `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).
 | 
			
		||||
[0;33m(kex) diffie-hellman-group16-sha512         -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
 | 
			
		||||
[0;33m(kex) diffie-hellman-group18-sha512         -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.3
 | 
			
		||||
[0;33m(kex) diffie-hellman-group14-sha256         -- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
 | 
			
		||||
[0;31m(kex) diffie-hellman-group14-sha1           -- [fail] using broken SHA-1 hash algorithm[0m
 | 
			
		||||
[0;33m                                            `- [warn] 2048-bit modulus only provides 112-bits of symmetric strength[0m
 | 
			
		||||
[0;33m                                            `- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 3.9, Dropbear SSH 0.53
 | 
			
		||||
 | 
			
		||||
[0;36m# host-key algorithms[0m
 | 
			
		||||
@@ -72,8 +82,13 @@
 | 
			
		||||
[0;31m(rec) -hmac-sha1-etm@openssh.com            -- mac algorithm to remove [0m
 | 
			
		||||
[0;32m(rec) +rsa-sha2-256                         -- key algorithm to append [0m
 | 
			
		||||
[0;32m(rec) +rsa-sha2-512                         -- key algorithm to append [0m
 | 
			
		||||
[0;33m(rec) !diffie-hellman-group-exchange-sha256 -- kex algorithm to change (increase modulus size to 3072 bits or larger) [0m
 | 
			
		||||
[0;33m(rec) -chacha20-poly1305@openssh.com        -- enc algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -curve25519-sha256                    -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -curve25519-sha256@libssh.org         -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -diffie-hellman-group14-sha256        -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -diffie-hellman-group16-sha512        -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -diffie-hellman-group18-sha512        -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -hmac-sha2-256                        -- mac algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -hmac-sha2-512                        -- mac algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -umac-128@openssh.com                 -- mac algorithm to remove [0m
 | 
			
		||||
 
 | 
			
		||||
@@ -84,6 +84,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 7.4 to 8.9",
 | 
			
		||||
                    "available since OpenSSH 7.4, Dropbear SSH 2018.76"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -93,6 +96,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 6.5 to 7.3",
 | 
			
		||||
                    "available since OpenSSH 6.4, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -103,6 +109,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).",
 | 
			
		||||
                    "available since OpenSSH 4.4"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
@@ -146,16 +155,6 @@
 | 
			
		||||
    "recommendations": {
 | 
			
		||||
        "informational": {
 | 
			
		||||
            "add": {
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group16-sha512",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group18-sha512",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "key": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "rsa-sha2-256",
 | 
			
		||||
@@ -169,12 +168,30 @@
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
        "warning": {
 | 
			
		||||
            "chg": {
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "diffie-hellman-group-exchange-sha256",
 | 
			
		||||
                        "notes": "increase modulus size to 3072 bits or larger"
 | 
			
		||||
                    }
 | 
			
		||||
                ]
 | 
			
		||||
            },
 | 
			
		||||
            "del": {
 | 
			
		||||
                "enc": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "chacha20-poly1305@openssh.com",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    }
 | 
			
		||||
                ],
 | 
			
		||||
                "kex": [
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "curve25519-sha256",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    },
 | 
			
		||||
                    {
 | 
			
		||||
                        "name": "curve25519-sha256@libssh.org",
 | 
			
		||||
                        "notes": ""
 | 
			
		||||
                    }
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 
 | 
			
		||||
@@ -5,12 +5,15 @@
 | 
			
		||||
[0;32m(gen) compression: enabled (zlib@openssh.com)[0m
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256                     -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m
 | 
			
		||||
[0;32m                                            `- [info] default key exchange from OpenSSH 7.4 to 8.9[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256@libssh.org          -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m
 | 
			
		||||
[0;32m                                            `- [info] default key exchange from OpenSSH 6.5 to 7.3[0m
 | 
			
		||||
[0;32m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [info] available since OpenSSH 4.4[0m
 | 
			
		||||
[0;32m                                                      `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).[0m
 | 
			
		||||
[0;33m(kex) curve25519-sha256                     -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76
 | 
			
		||||
                                            `- [info] default key exchange from OpenSSH 7.4 to 8.9
 | 
			
		||||
[0;33m(kex) curve25519-sha256@libssh.org          -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                            `- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62
 | 
			
		||||
                                            `- [info] default key exchange from OpenSSH 6.5 to 7.3
 | 
			
		||||
[0;33m(kex) diffie-hellman-group-exchange-sha256 (4096-bit) -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                                      `- [info] available since OpenSSH 4.4
 | 
			
		||||
                                                      `- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 4096. This can only be disabled by recompiling the code (see https://github.com/openssh/openssh-portable/blob/V_9_4/dh.c#L477).
 | 
			
		||||
 | 
			
		||||
[0;36m# host-key algorithms[0m
 | 
			
		||||
[0;32m(key) ssh-ed25519                           -- [info] available since OpenSSH 6.5, Dropbear SSH 2020.79[0m
 | 
			
		||||
@@ -34,11 +37,12 @@
 | 
			
		||||
[0;32m(fin) ssh-ed25519: SHA256:UrnXIVH+7dlw8UqYocl48yUEcKrthGDQG2CPCgp7MxU[0m
 | 
			
		||||
 | 
			
		||||
[0;36m# algorithm recommendations (for OpenSSH 8.0)[0m
 | 
			
		||||
[0;32m(rec) +diffie-hellman-group16-sha512        -- kex algorithm to append [0m
 | 
			
		||||
[0;32m(rec) +diffie-hellman-group18-sha512        -- kex algorithm to append [0m
 | 
			
		||||
[0;32m(rec) +rsa-sha2-256                         -- key algorithm to append [0m
 | 
			
		||||
[0;32m(rec) +rsa-sha2-512                         -- key algorithm to append [0m
 | 
			
		||||
[0;33m(rec) !diffie-hellman-group-exchange-sha256 -- kex algorithm to change (increase modulus size to 3072 bits or larger) [0m
 | 
			
		||||
[0;33m(rec) -chacha20-poly1305@openssh.com        -- enc algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -curve25519-sha256                    -- kex algorithm to remove [0m
 | 
			
		||||
[0;33m(rec) -curve25519-sha256@libssh.org         -- kex algorithm to remove [0m
 | 
			
		||||
 | 
			
		||||
[0;36m# additional info[0m
 | 
			
		||||
[0;33m(nfo) For hardening guides on common OSes, please see: <https://www.ssh-audit.com/hardening_guides.html>[0m
 | 
			
		||||
 
 | 
			
		||||
@@ -43,6 +43,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 7.4 to 8.9",
 | 
			
		||||
                    "available since OpenSSH 7.4, Dropbear SSH 2018.76"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
@@ -52,6 +55,9 @@
 | 
			
		||||
                "info": [
 | 
			
		||||
                    "default key exchange from OpenSSH 6.5 to 7.3",
 | 
			
		||||
                    "available since OpenSSH 6.4, Dropbear SSH 2013.62"
 | 
			
		||||
                ],
 | 
			
		||||
                "warn": [
 | 
			
		||||
                    "does not provide protection against post-quantum attacks"
 | 
			
		||||
                ]
 | 
			
		||||
            }
 | 
			
		||||
        },
 | 
			
		||||
 
 | 
			
		||||
@@ -4,10 +4,12 @@
 | 
			
		||||
[0;32m(gen) compression: disabled[0m
 | 
			
		||||
 | 
			
		||||
[0;36m# key exchange algorithms[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256                       -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m
 | 
			
		||||
[0;32m                                              `- [info] default key exchange from OpenSSH 7.4 to 8.9[0m
 | 
			
		||||
[0;32m(kex) curve25519-sha256@libssh.org            -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m
 | 
			
		||||
[0;32m                                              `- [info] default key exchange from OpenSSH 6.5 to 7.3[0m
 | 
			
		||||
[0;33m(kex) curve25519-sha256                       -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                              `- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76
 | 
			
		||||
                                              `- [info] default key exchange from OpenSSH 7.4 to 8.9
 | 
			
		||||
[0;33m(kex) curve25519-sha256@libssh.org            -- [warn] does not provide protection against post-quantum attacks[0m
 | 
			
		||||
                                              `- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62
 | 
			
		||||
                                              `- [info] default key exchange from OpenSSH 6.5 to 7.3
 | 
			
		||||
[0;33m(kex) sntrup4591761x25519-sha512@tinyssh.org  -- [warn] using experimental algorithm[0m
 | 
			
		||||
                                              `- [info] available since OpenSSH 8.0
 | 
			
		||||
                                              `- [info] the sntrup4591761 algorithm was withdrawn, as it may not provide strong post-quantum security
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user