ssh-baseline
ssh-baseline copied to clipboard
DevSec SSH Baseline - InSpec Profile
This PR contains an implementation for find_ssh_version and guess_ssh_version. These provide the same behaviors as the methods in devsec_ssh.rb in the chef ssh hardening cookbook. This PR is the first...
**Describe the bug** Protocol sftp is disabled by default. This enforces using scp. Described in [README](https://github.com/dev-sec/ansible-ssh-hardening/blob/master/README.md): > This role by default deactivates SFTP. **Expected behavior** Today I have read [release...
To fix #125
This is a WIP refactoring of the ssh baseline to match the chef-ssh-hardening implementation.
Currently we distinguish different target parameters within library based on the distro information. It would be much better to have this logic based on the openssh version instead (and maybe...
Currently if there are Match blocks containing an option, inspec will return an array for example ``` [0;32m "\u001b[38;5;9m × sshd-39: Server: Disable TCP forwarding", [0m [0;32m "\u001b[38;5;9m × SSHD...
Although you can specify a path for the ssh config it seems to assume that the host keys are always assumed to be in /etc/ssh here's the bit of code...
Hi, I've recently built openssh and learned the following: sshd privilege separation feature requires specific "privsep" directory (sshd chroot) ownership & permissions to be applied. - path to privsep dir...
Amazon Linux set the parameter HostKey on the file “/etc/ssh/sshd_config” with the value "/etc/ssh/ssh_host_rsa_key", causing the control sshd-14 to fail. To get it fixed I added a condition on the...