Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ssh allows weak "null" algorithm (HMAC) #171

Closed
andreasbrett opened this issue Aug 8, 2023 · 0 comments
Closed

ssh allows weak "null" algorithm (HMAC) #171

andreasbrett opened this issue Aug 8, 2023 · 0 comments

Comments

@andreasbrett
Copy link

In a vulnerability scan using gvm/openvas warpgate's ssh server on port 2222 was found to allow the weak "null" algorithm for message authentication (MAC).

image001

Is this algorithm allowed for a reason?

const HMAC_ORDER: &[mac::Name] = &[
mac::HMAC_SHA512_ETM,
mac::HMAC_SHA256_ETM,
mac::HMAC_SHA512,
mac::HMAC_SHA256,
mac::HMAC_SHA1_ETM,
mac::HMAC_SHA1,
mac::NONE,
];

@Eugeny Eugeny closed this as completed in ae95df8 Aug 8, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant