This repository was archived by the owner on Feb 26, 2021. It is now read-only.
Expand SSH Finding Model into multiple Categories#10
Merged
Conversation
Member
Author
|
I refuse to accept the last codacity issue, (that the |
rfelber
approved these changes
Oct 18, 2019
Member
rfelber
left a comment
There was a problem hiding this comment.
Im not sure about the port change but beside that it seems to be good.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
General Changes
hostnameandserver_bannerto null valueslocationof the findings will now be equal to the hostname (if existing), falling back to theip_addressif not set.hostnameandip_addressfields in theirattributesmap.SSH Service. This category will be kept for the general purpose informational finding. The other "policy violation" type findings will be moved into their own category. The changes to these two categories are grouped belowChanges to
SSH ServiceCategory Findingsauth_methods,key_algorithms,encryption_algorithms,mac_algorithms&compression_algorithmsto easily see all relevant informations about the ssh serverChanges to
Policy ViolationType FindingsSSH ServiceCategory but will now be moved into theSSH Policy ViolationCategoryDiscouraged SSH Authentication MethodInsecure SSH Key AlgorithmsInsecure SSH Encryption CiphersInsecure SSH MAC AlgorithmsInsecure SSH Compression AlgorithmsMissing SSH Authentication MethodMissing SSH Key AlgorithmsMissing SSH Encryption CiphersMissing SSH MAC AlgorithmsMissing SSH Compression AlgorithmsOutdated SSH Protocol Versionpayloadfield in theirattributesmap which indicates which kind of key algorithms, encryption ciphers or other are in violation of the policy.ssh_scanrecommendation text.