Skip to content

Commit

Permalink
Expanded filter of CBC ciphers to flag for the Terrapin vulnerability.
Browse files Browse the repository at this point in the history
  • Loading branch information
jtesta committed Dec 21, 2023
1 parent 164356e commit 44393c5
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 2 deletions.
3 changes: 3 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -178,6 +178,9 @@ For convenience, a web front-end on top of the command-line tool is available at

## ChangeLog

### v3.2.0 (???)
- Expanded filter of CBC ciphers to flag for the Terrapin vulnerability. It now includes more rarely found ciphers.

### v3.1.0 (2023-12-20)
- Added test for the Terrapin message prefix truncation vulnerability ([CVE-2023-48795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795)).
- Dropped support for Python 3.7 (EOL was reached in June 2023).
Expand Down
4 changes: 2 additions & 2 deletions src/ssh_audit/ssh_audit.py
Original file line number Diff line number Diff line change
Expand Up @@ -491,7 +491,7 @@ def _get_cbc_ciphers_enabled(algs: Algorithms) -> List[str]:
if algs.ssh2kex is not None:
ciphers_supported = algs.ssh2kex.client.encryption if client_audit else algs.ssh2kex.server.encryption
for cipher in ciphers_supported:
if cipher.endswith("-cbc"):
if cipher.endswith("-cbc") or cipher.endswith("[email protected]") or cipher.endswith("[email protected]") or cipher == "[email protected]":
ret.append(cipher)

return ret
Expand All @@ -501,7 +501,7 @@ def _get_cbc_ciphers_not_enabled(db: Dict[str, Dict[str, List[List[Optional[str]
ret = []

for cipher in db["enc"]:
if cipher.endswith("-cbc") and cipher not in _get_cbc_ciphers_enabled(algs):
if (cipher.endswith("-cbc") or cipher.endswith("[email protected]") or cipher.endswith("[email protected]") or cipher == "[email protected]") and cipher not in _get_cbc_ciphers_enabled(algs):
ret.append(cipher)

return ret
Expand Down

0 comments on commit 44393c5

Please sign in to comment.