Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(mac) unknown algorithm(s) found!: [email protected],[email protected] #321

Open
rein123 opened this issue Jan 23, 2025 · 2 comments
Open

Comments

@rein123
Copy link

rein123 commented Jan 23, 2025

Hi!
Using https://github.com/jtesta/ssh-audit/releases/tag/v3.3.0 I want to report the following:

Starting audit of 192.168.0.10:22...
# general
(gen) banner: SSH-2.0-Mocana SSH
(gen) compatibility: OpenSSH 7.4+, Dropbear SSH 2020.79+
(gen) compression: disabled
# key exchange algorithms
(kex) curve25519-sha256              -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76
(kex) curve25519-sha256              -- [info] default key exchange from OpenSSH 7.4 to 8.9
(kex) [email protected]   -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62
(kex) [email protected]   -- [info] default key exchange from OpenSSH 6.5 to 7.3
[0;31m(kex) ecdh-sha2-nistp521             -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency
(kex) ecdh-sha2-nistp521             -- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
[0;31m(kex) ecdh-sha2-nistp384             -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency
(kex) ecdh-sha2-nistp384             -- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
[0;31m(kex) ecdh-sha2-nistp256             -- [fail] using elliptic curves that are suspected as being backdoored by the U.S. National Security Agency
(kex) ecdh-sha2-nistp256             -- [info] available since OpenSSH 5.7, Dropbear SSH 2013.62
(kex) diffie-hellman-group15-sha512
(kex) diffie-hellman-group16-sha512  -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73
(kex) diffie-hellman-group17-sha512
(kex) diffie-hellman-group18-sha512  -- [info] available since OpenSSH 7.3
# host-key algorithms
(key) ssh-ed25519                    -- [info] available since OpenSSH 6.5, Dropbear SSH 2020.79
# encryption algorithms (ciphers)
(enc) AEAD_AES_128_GCM
(enc) [email protected]         -- [info] available since OpenSSH 6.2
(enc) AEAD_AES_256_GCM
(enc) [email protected]         -- [info] available since OpenSSH 6.2
(enc) aes128-ctr                     -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
(enc) aes256-ctr                     -- [info] available since OpenSSH 3.7, Dropbear SSH 0.52
(enc) aes192-ctr                     -- [info] available since OpenSSH 3.7
# message authentication code algorithms
(mac) AEAD_AES_128_GCM
(mac) [email protected]         -- [warn] unknown algorithm
(mac) AEAD_AES_256_GCM
(mac) [email protected]         -- [warn] unknown algorithm
(mac) hmac-sha2-512                  -- [warn] using encrypt-and-MAC mode
(mac) hmac-sha2-512                  -- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56
# fingerprints
(fin) ssh-ed25519: SHA256:OXv9gviji0wo4O4jr4NVZsFYKT1CKkQuZ4fTlcK0E0U
(fin) ssh-ed25519: MD5:35:e8:82:81:53:ea:0f:4a:95:a2:5d:88:ba:a4:0d:14 -- [info] do not rely on MD5 fingerprints for server identification; it is insecure for this use case

!!! WARNING: unknown algorithm(s) found!: [email protected],[email protected].  If this is the latest version of ssh-audit (see <https://github.com/jtesta/ssh-audit/releases>), please create a new Github issue at <https://github.com/jtesta/ssh-audit/issues> with the full output above.
@jtesta
Copy link
Owner

jtesta commented Jan 23, 2025 via email

@rein123
Copy link
Author

rein123 commented Jan 28, 2025

Unfortunately, I cannot provide an interface for you to test it directly, since the device is currently in development.
The used stack is from https://dev.digicert.com/en/trustcore-sdk/nanossh.html

Seems like "aes128-gcm" is maybe not an issue but the "@openssh.com" variant of it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants