116
SSH Hardening with ssh-audit (thoughts.greyh.at)
submitted 1 year ago by zquestz@lemm.ee to c/linux@lemmy.ml
you are viewing a single comment's thread
view the rest of the comments
[-] RegalPotoo@lemmy.world 7 points 1 year ago

Cool,.but from the post it seems like all it does is:

  • Recommend disabling old algorithms, which you would have already done if you followed a modern hardening guide like https://infosec.mozilla.org/guidelines/openssh
  • Detect if you are running a known-vulnerable version of OpenSSH, which wouldn't be an issue if you keep good patch hygiene and install your SSH server through you operating systems' package manager

So what's the point? Who is this for?

[-] jwhardcastle@dmv.social 14 points 1 year ago

Scripting, to confirm that a large fleet of boxes are all running according to your policy. Verification that the config you want is actually the config you have.

[-] lemann@lemmy.one 3 points 1 year ago

This is exactly what I use it for 👌 very handy for this

this post was submitted on 16 Oct 2023
116 points (99.2% liked)

Linux

47946 readers
1679 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS