mirror of
				https://github.com/jtesta/ssh-audit.git
				synced 2025-11-03 18:52:15 +01:00 
			
		
		
		
	Improve PyPI packaging (#71)
* Move files for better setup.py packaging * Update setup.py and configs for src layout * Run tests on setup.py build In effect, this tests that the setup.py configuration is correct. coverage combine and coverage:paths are added to keep the displayed coverage paths as src/ssh_audit/*.py instead of .tox/$envname/**/site-packages/ssh_audit/*.py * Remove unnecessary encoding declarations Python 3 defaults to UTF-8 encoding. https://docs.python.org/3/reference/lexical_analysis.html#encoding-declarations * Remove shebang from colorama type stubs Shouldn't need to be an executable. Related: git has this file tracked as chmod -x.
This commit is contained in:
		
							
								
								
									
										0
									
								
								src/ssh_audit/__init__.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								src/ssh_audit/__init__.py
									
									
									
									
									
										Normal file
									
								
							
							
								
								
									
										2
									
								
								src/ssh_audit/__main__.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2
									
								
								src/ssh_audit/__main__.py
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,2 @@
 | 
			
		||||
from ssh_audit.ssh_audit import main
 | 
			
		||||
main()
 | 
			
		||||
							
								
								
									
										24
									
								
								src/ssh_audit/policies/openssh_7_7.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								src/ssh_audit/policies/openssh_7_7.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,24 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH v7.7.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened OpenSSH v7.7"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										24
									
								
								src/ssh_audit/policies/openssh_7_8.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								src/ssh_audit/policies/openssh_7_8.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,24 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH v7.8.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened OpenSSH v7.8"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										24
									
								
								src/ssh_audit/policies/openssh_7_9.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								src/ssh_audit/policies/openssh_7_9.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,24 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH v7.9.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened OpenSSH v7.9"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										24
									
								
								src/ssh_audit/policies/openssh_8_0.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								src/ssh_audit/policies/openssh_8_0.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,24 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH v8.0.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened OpenSSH v8.0"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										24
									
								
								src/ssh_audit/policies/openssh_8_1.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								src/ssh_audit/policies/openssh_8_1.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,24 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH v8.1.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened OpenSSH v8.1"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = sk-ssh-ed25519@openssh.com, ssh-ed25519-cert-v01@openssh.com, sk-ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										28
									
								
								src/ssh_audit/policies/openssh_8_2.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								src/ssh_audit/policies/openssh_8_2.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,28 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH v8.2.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened OpenSSH v8.2"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# RSA host key sizes.
 | 
			
		||||
hostkey_size_rsa-sha2-256 = 4096
 | 
			
		||||
hostkey_size_rsa-sha2-512 = 4096
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = rsa-sha2-512, rsa-sha2-256, ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = sk-ssh-ed25519@openssh.com, ssh-ed25519-cert-v01@openssh.com, sk-ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										28
									
								
								src/ssh_audit/policies/openssh_8_3.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								src/ssh_audit/policies/openssh_8_3.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,28 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH v8.3.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened OpenSSH v8.3"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# RSA host key sizes.
 | 
			
		||||
hostkey_size_rsa-sha2-256 = 4096
 | 
			
		||||
hostkey_size_rsa-sha2-512 = 4096
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = rsa-sha2-512, rsa-sha2-256, ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = sk-ssh-ed25519@openssh.com, ssh-ed25519-cert-v01@openssh.com, sk-ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										28
									
								
								src/ssh_audit/policies/openssh_8_4.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								src/ssh_audit/policies/openssh_8_4.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,28 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH v8.4.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened OpenSSH v8.4"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# RSA host key sizes.
 | 
			
		||||
hostkey_size_rsa-sha2-256 = 4096
 | 
			
		||||
hostkey_size_rsa-sha2-512 = 4096
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = rsa-sha2-512, rsa-sha2-256, ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = sk-ssh-ed25519@openssh.com, ssh-ed25519-cert-v01@openssh.com, sk-ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										19
									
								
								src/ssh_audit/policies/ubuntu_client_16_04.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								src/ssh_audit/policies/ubuntu_client_16_04.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,19 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH on Ubuntu 16.04 LTS.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
client policy = true
 | 
			
		||||
name = "Hardened Ubuntu Client 16.04 LTS"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519, ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256, rsa-sha2-512, ssh-rsa-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256@libssh.org, diffie-hellman-group-exchange-sha256, ext-info-c
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										19
									
								
								src/ssh_audit/policies/ubuntu_client_18_04.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								src/ssh_audit/policies/ubuntu_client_18_04.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,19 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH on Ubuntu 18.04 LTS.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
client policy = true
 | 
			
		||||
name = "Hardened Ubuntu Client 18.04 LTS"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519, ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256, rsa-sha2-512, ssh-rsa-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256, ext-info-c
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										19
									
								
								src/ssh_audit/policies/ubuntu_client_20_04.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								src/ssh_audit/policies/ubuntu_client_20_04.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,19 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH on Ubuntu 20.04 LTS.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
client policy = true
 | 
			
		||||
name = "Hardened Ubuntu Client 20.04 LTS"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519, ssh-ed25519-cert-v01@openssh.com, sk-ssh-ed25519@openssh.com, sk-ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512, rsa-sha2-512-cert-v01@openssh.com, ssh-rsa-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256, ext-info-c
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										24
									
								
								src/ssh_audit/policies/ubuntu_server_16_04.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								src/ssh_audit/policies/ubuntu_server_16_04.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,24 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH on Ubuntu Server 16.04 LTS.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened Ubuntu Server 16.04 LTS"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256@libssh.org, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										24
									
								
								src/ssh_audit/policies/ubuntu_server_18_04.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								src/ssh_audit/policies/ubuntu_server_18_04.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,24 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH on Ubuntu Server 18.04 LTS.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened Ubuntu Server 18.04 LTS"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										28
									
								
								src/ssh_audit/policies/ubuntu_server_20_04.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								src/ssh_audit/policies/ubuntu_server_20_04.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,28 @@
 | 
			
		||||
#
 | 
			
		||||
# Official policy for hardened OpenSSH on Ubuntu Server 20.04 LTS.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
name = "Hardened Ubuntu Server 20.04 LTS"
 | 
			
		||||
version = 1
 | 
			
		||||
 | 
			
		||||
# RSA host key sizes.
 | 
			
		||||
hostkey_size_rsa-sha2-256 = 4096
 | 
			
		||||
hostkey_size_rsa-sha2-512 = 4096
 | 
			
		||||
 | 
			
		||||
# Group exchange DH modulus sizes.
 | 
			
		||||
dh_modulus_size_diffie-hellman-group-exchange-sha256 = 2048
 | 
			
		||||
 | 
			
		||||
# The host key types that must match exactly (order matters).
 | 
			
		||||
host keys = rsa-sha2-512, rsa-sha2-256, ssh-ed25519
 | 
			
		||||
 | 
			
		||||
# Host key types that may optionally appear.
 | 
			
		||||
optional host keys = sk-ssh-ed25519@openssh.com, ssh-ed25519-cert-v01@openssh.com, sk-ssh-ed25519-cert-v01@openssh.com, rsa-sha2-256-cert-v01@openssh.com, rsa-sha2-512-cert-v01@openssh.com
 | 
			
		||||
 | 
			
		||||
# The key exchange algorithms that must match exactly (order matters).
 | 
			
		||||
key exchanges = curve25519-sha256, curve25519-sha256@libssh.org, diffie-hellman-group16-sha512, diffie-hellman-group18-sha512, diffie-hellman-group-exchange-sha256
 | 
			
		||||
 | 
			
		||||
# The ciphers that must match exactly (order matters).
 | 
			
		||||
ciphers = chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr
 | 
			
		||||
 | 
			
		||||
# The MACs that must match exactly (order matters).
 | 
			
		||||
macs = hmac-sha2-256-etm@openssh.com, hmac-sha2-512-etm@openssh.com, umac-128-etm@openssh.com
 | 
			
		||||
							
								
								
									
										3912
									
								
								src/ssh_audit/ssh_audit.py
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										3912
									
								
								src/ssh_audit/ssh_audit.py
									
									
									
									
									
										Executable file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
		Reference in New Issue
	
	Block a user