/
snapcraft.yaml
45 lines (40 loc) · 1.56 KB
/
snapcraft.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
name: ssh-mitm # you probably want to 'snapcraft register <name>'
base: core20 # the base snap is the execution environment for this snap
version: '4.1.1' # just for humans, typically '1.2+git' or '1.3.2'
license: GPL-3.0
website: https://docs.ssh-mitm.at
source-code: https://github.com/ssh-mitm/ssh-mitm
issues: https://github.com/ssh-mitm/ssh-mitm/issues
contact: support@ssh-mitm.at
title: SSH-MITM - ssh audits made simple
summary: man in the middle SSH Server for security audits and malware analysis # 79 char long summary
description: |
Password and publickey authentication are supported and SSH-MITM is able to detect,
if a user is able to login with publickey authentication on the remote server.
This allows SSH-MITM to accept the same key as the destination server.
If publickey authentication is not possible, the authentication will fall back to
password-authentication.
When publickey authentication is possible, a forwarded agent is needed to login
to the remote server. In cases, when no agent was forwarded, SSH-MITM can rediredt
the session to a honeypot.
icon: snap/gui/ssh-mitm.png
grade: stable # must be 'stable' to release into candidate/stable channels
confinement: strict # use 'strict' once you have the right plugs and slots
architectures:
- build-on: [amd64, arm64, armhf]
parts:
ssh-mitm:
# See 'snapcraft plugins'
plugin: python
source: .
apps:
ssh-mitm:
command: bin/ssh-mitm
environment:
PYTHONIOENCODING: utf-8
PYTHONOPTIMIZE: 1
plugs:
- home
- network
- network-bind
- ssh-keys