-
-
Notifications
You must be signed in to change notification settings - Fork 102
fix: ssh-audit hardenings #897
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Brings current ssh-audit output green again, and adds an additional moduli hardening per their recommendations.
WalkthroughThe changes update the SSH Dockerfile to filter the moduli file for stronger cryptographic parameters and expand the list of disabled key exchange algorithms in the SSH daemon configuration to further restrict weaker or less preferred algorithms. Changes
Suggested labels
Suggested reviewers
Poem
Note ⚡️ AI Code Reviews for VS Code, Cursor, WindsurfCodeRabbit now has a plugin for VS Code, Cursor and Windsurf. This brings AI code reviews directly in the code editor. Each commit is reviewed immediately, finding bugs before the PR is raised. Seamless context handoff to your AI code agent ensures that you can easily incorporate review feedback. 📜 Recent review detailsConfiguration used: CodeRabbit UI 📒 Files selected for processing (2)
🔇 Additional comments (2)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
SupportNeed help? Create a ticket on our support page for assistance with any issues or questions. Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
@@ -23,7 +23,7 @@ HostKey /data/ssh_host_ed25519_key | |||
# =================== | |||
Ciphers [email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr | |||
MACs -hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-512,[email protected],[email protected],[email protected] | |||
KexAlgorithms -ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha256 | |||
KexAlgorithms -curve25519-sha256,[email protected],diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Re removing diffie-hellman-group-exchange-sha256
-- I'm not sure what their "increase modulus size to 3072 bits or larger" recommendation for this algorithm exactly means, but at least leaving it in and making the moduli
changes did not result the warning going away.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Filed jtesta/ssh-audit#334 asking for clarification
Proposed Changes
Brings current ssh-audit output green again, and adds an additional moduli hardening per their recommendations.
Summary by CodeRabbit