mirror of
				https://github.com/jtesta/ssh-audit.git
				synced 2025-11-04 03:02:15 +01:00 
			
		
		
		
	Updated ext-info-c and ext-info-s key exchanges to include versions of OpenSSH they were first included in. (#291)
This commit is contained in:
		@@ -172,8 +172,11 @@ class Algorithms:
 | 
				
			|||||||
                        if fc > 0:
 | 
					                        if fc > 0:
 | 
				
			||||||
                            faults += pow(10, 2 - i) * fc
 | 
					                            faults += pow(10, 2 - i) * fc
 | 
				
			||||||
                    if n not in alg_list:
 | 
					                    if n not in alg_list:
 | 
				
			||||||
                        # Don't recommend certificate or token types; these will only appear in the server's list if they are fully configured & functional on the server.
 | 
					                        # Don't recommend certificate or token types; these will only appear in the server's list if they are fully configured & functional on the server.  Also don't recommend 'ext-info-[cs]' nor 'kex-strict-[cs]-v00@openssh.com' key exchanges.
 | 
				
			||||||
                        if faults > 0 or (alg_type == 'key' and (('-cert-' in n) or (n.startswith('sk-')))) or empty_version:
 | 
					                        if faults > 0 or \
 | 
				
			||||||
 | 
					                           (alg_type == 'key' and (('-cert-' in n) or (n.startswith('sk-')))) or \
 | 
				
			||||||
 | 
					                           (alg_type == 'kex' and (n.startswith('ext-info-') or n.startswith('kex-strict-'))) or \
 | 
				
			||||||
 | 
					                           empty_version:
 | 
				
			||||||
                            continue
 | 
					                            continue
 | 
				
			||||||
                        rec[sshv][alg_type]['add'][n] = 0
 | 
					                        rec[sshv][alg_type]['add'][n] = 0
 | 
				
			||||||
                    else:
 | 
					                    else:
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -160,8 +160,8 @@ class SSH2_KexDB:  # pylint: disable=too-few-public-methods
 | 
				
			|||||||
            'ecdh-sha2-wiRIU8TKjMZ418sMqlqtvQ==': [[], [FAIL_UNPROVEN]],  # sect283k1
 | 
					            'ecdh-sha2-wiRIU8TKjMZ418sMqlqtvQ==': [[], [FAIL_UNPROVEN]],  # sect283k1
 | 
				
			||||||
            'ecdh-sha2-zD/b3hu/71952ArpUG4OjQ==': [[], [FAIL_UNPROVEN, FAIL_SMALL_ECC_MODULUS]],  # sect233k1
 | 
					            'ecdh-sha2-zD/b3hu/71952ArpUG4OjQ==': [[], [FAIL_UNPROVEN, FAIL_SMALL_ECC_MODULUS]],  # sect233k1
 | 
				
			||||||
            'ecmqv-sha2': [[], [FAIL_UNPROVEN]],
 | 
					            'ecmqv-sha2': [[], [FAIL_UNPROVEN]],
 | 
				
			||||||
            'ext-info-c': [[], [], [], [INFO_EXTENSION_NEGOTIATION]],  # Extension negotiation (RFC 8308)
 | 
					            'ext-info-c': [['7.2'], [], [], [INFO_EXTENSION_NEGOTIATION]],  # Extension negotiation (RFC 8308)
 | 
				
			||||||
            'ext-info-s': [[], [], [], [INFO_EXTENSION_NEGOTIATION]],  # Extension negotiation (RFC 8308)
 | 
					            'ext-info-s': [['9.6'], [], [], [INFO_EXTENSION_NEGOTIATION]],  # Extension negotiation (RFC 8308)
 | 
				
			||||||
            'kex-strict-c-v00@openssh.com': [[], [], [], [INFO_STRICT_KEX]],  # Strict KEX marker (countermeasure for CVE-2023-48795).
 | 
					            'kex-strict-c-v00@openssh.com': [[], [], [], [INFO_STRICT_KEX]],  # Strict KEX marker (countermeasure for CVE-2023-48795).
 | 
				
			||||||
            'kex-strict-s-v00@openssh.com': [[], [], [], [INFO_STRICT_KEX]],  # Strict KEX marker (countermeasure for CVE-2023-48795).
 | 
					            'kex-strict-s-v00@openssh.com': [[], [], [], [INFO_STRICT_KEX]],  # Strict KEX marker (countermeasure for CVE-2023-48795).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user