-
Notifications
You must be signed in to change notification settings - Fork 217
Description
Summary
After a pentest has been executed an issue with ssh-proxy was found. The service obviously accepts password authentication. Due to the limitations of the test, no automated tools were used to test for valid username/password‐combinations. Two key exchange algorithms, namely diffie-hellman-group14-sha1 and ecdh-sha2-nistp384, are considered weak by the tool sslcan.
Expected Result
According to the penetration testers:
It is assumed that this is for administrative use. In that case the support of password logins poses an additional risk. The “weak” key exchange ciphers currently do not add a noticeable risk here. However, it remains unclear, why an SSH service is exposed to the internet. While an unnecessary service without further findings would usually result in a finding of a low severity, the severity was raised to medium in this case, due to risk that is related to password logins. It should be analysed, if the SSH service needs to be exposed to the internet and if so, if access can be restricted to known source IP addresses. It should also be assessed, if password login can be switched off.
Questions:
- Is it possible ssh-proxy feature to be enabled only for specific applications by the app developers?
- Is it possible that the key exchange algorithms be enhanced with "stronger" ones?
- Is it possible that the access be restricted to known source IP addresses?
Context
Diego version 2.49.0
Infrastructure - Azure
Steps to Reproduce
Run penetration test with sslcan.