.. |
dropbear_2019.78_test1.json
|
Refined JSON notes output. Fixed Docker & Tox tests.
|
2023-09-05 16:36:54 -04:00 |
dropbear_2019.78_test1.txt
|
The color of all notes will be printed in green when the related algorithm is rated good.
|
2023-09-03 19:14:25 -04:00 |
openssh_4.0p1_test1.json
|
Refined JSON notes output. Fixed Docker & Tox tests.
|
2023-09-05 16:36:54 -04:00 |
openssh_4.0p1_test1.txt
|
Generic failure/warning messages replaced with more specific reasons. SHA-1 algorithms now cause failures. CBC mode ciphers are now warnings instead of failures.
|
2023-03-23 21:36:02 -04:00 |
openssh_5.6p1_custom_policy_test1.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_5.6p1_custom_policy_test1.txt
|
Moved built-in policies from external files to internal database. (#75)
|
2020-10-19 17:27:37 -04:00 |
openssh_5.6p1_custom_policy_test2.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_5.6p1_custom_policy_test2.txt
|
Now reports policy errors in an easier to read format. (#63)
|
2020-10-20 16:25:39 -04:00 |
openssh_5.6p1_custom_policy_test3.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_5.6p1_custom_policy_test3.txt
|
Now reports policy errors in an easier to read format. (#63)
|
2020-10-20 16:25:39 -04:00 |
openssh_5.6p1_custom_policy_test4.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_5.6p1_custom_policy_test4.txt
|
Now reports policy errors in an easier to read format. (#63)
|
2020-10-20 16:25:39 -04:00 |
openssh_5.6p1_custom_policy_test5.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_5.6p1_custom_policy_test5.txt
|
Now reports policy errors in an easier to read format. (#63)
|
2020-10-20 16:25:39 -04:00 |
openssh_5.6p1_custom_policy_test7.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_5.6p1_custom_policy_test7.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_custom_policy_test8.json
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_custom_policy_test8.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_custom_policy_test9.json
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_custom_policy_test9.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_custom_policy_test10.json
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_custom_policy_test10.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_test1.json
|
Refined JSON notes output. Fixed Docker & Tox tests.
|
2023-09-05 16:36:54 -04:00 |
openssh_5.6p1_test1.txt
|
Generic failure/warning messages replaced with more specific reasons. SHA-1 algorithms now cause failures. CBC mode ciphers are now warnings instead of failures.
|
2023-03-23 21:36:02 -04:00 |
openssh_5.6p1_test2.json
|
Refined JSON notes output. Fixed Docker & Tox tests.
|
2023-09-05 16:36:54 -04:00 |
openssh_5.6p1_test2.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_test3.json
|
Refined JSON notes output. Fixed Docker & Tox tests.
|
2023-09-05 16:36:54 -04:00 |
openssh_5.6p1_test3.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_test4.json
|
Refined JSON notes output. Fixed Docker & Tox tests.
|
2023-09-05 16:36:54 -04:00 |
openssh_5.6p1_test4.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_5.6p1_test5.json
|
Refined JSON notes output. Fixed Docker & Tox tests.
|
2023-09-05 16:36:54 -04:00 |
openssh_5.6p1_test5.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_8.0p1_builtin_policy_test1.json
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_builtin_policy_test1.txt
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_builtin_policy_test2.json
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_builtin_policy_test2.txt
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_custom_policy_test6.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_8.0p1_custom_policy_test6.txt
|
Moved built-in policies from external files to internal database. (#75)
|
2020-10-19 17:27:37 -04:00 |
openssh_8.0p1_custom_policy_test11.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_8.0p1_custom_policy_test11.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_8.0p1_custom_policy_test12.json
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_8.0p1_custom_policy_test12.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_8.0p1_custom_policy_test13.json
|
Added recommendations and CVE information to JSON output (#122).
|
2023-03-24 18:48:36 -04:00 |
openssh_8.0p1_custom_policy_test13.txt
|
Added support for mixed host key/CA key types (i.e.: RSA host keys signed by ED25519 CAs) (#120).
|
2023-04-25 09:17:32 -04:00 |
openssh_8.0p1_custom_policy_test14.json
|
Refined GEX testing against OpenSSH servers: when the fallback mechanism is suspected of being triggered, perform an additional test to obtain more accurate results.
|
2023-09-03 16:13:00 -04:00 |
openssh_8.0p1_custom_policy_test14.txt
|
Refined GEX testing against OpenSSH servers: when the fallback mechanism is suspected of being triggered, perform an additional test to obtain more accurate results.
|
2023-09-03 16:13:00 -04:00 |
openssh_8.0p1_test1.json
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_test1.txt
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_test2.json
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_test2.txt
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_test3.json
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
openssh_8.0p1_test3.txt
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
tinyssh_20190101_test1.json
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |
tinyssh_20190101_test1.txt
|
Added note that when a target is properly configured against the Terrapin vulnerability that unpatched peers may still create vulnerable connections. Updated Ubuntu Server & Client 20.04 & 22.04 policies to include new key exchange markers related to Terrapin counter-measures.
|
2023-12-19 14:03:28 -05:00 |