Issues
- 7
Remove SSH version 1 support
#298 opened by jtesta - 4
more concise [info] phrasing for all
#253 opened by perkelix - 4
- 5
more concise phrasing for (kex) ext-info-s [info]
#256 opened by perkelix - 1
Fix Snap build warning
#301 opened by jtesta - 12
RFC8308 7.2- Extension Negotiation in the Secure Shell (SSH) Protocol (ext-info-s, ext-info-c)
#291 opened by perkelix - 0
hardening guide: preparing for Debian 13
#292 opened by perkelix - 1
policies suggest different orders
#283 opened by perkelix - 3
JSON mode break JSON parser
#295 opened by LoHub - 1
Fix --conn-rate-test feature on Windows
#261 opened by jtesta - 2
- 2
CVE-2021-41617 detected but ubuntu (20.04) has backported fix according to ubuntu
#296 opened by MalfuncEddie - 5
CVE-2024-6387 Possible RCE in openssh
#279 opened by cmidkiff87 - 6
CVE Detection
#240 opened by cschuber - 3
Specifying port does not work
#294 opened by compass-dexter - 9
if connection trottling is configured, diffie-hellman-group-exchange-sha256 warning about bit numbers disappear
#262 opened by perkelix - 2
- 0
Migrate from getopt module to argparse.
#297 opened by jtesta - 2
- 1
Error while scanning multiple host
#293 opened by floriankuek - 4
- 2
- 4
Missing "keysize" Information in Output
#275 opened by dreizehnutters - 1
Inconsitent JSON Output Format
#280 opened by dreizehnutters - 1
- 8
- 1
Need for an option dedicated to the presentation of evaluations in terminal
#247 opened by Ricky-Tigg - 5
- 4
DHEat check supports only IPv4
#269 opened by yuki0iq - 2
WARNING: unknown algorithm(s) found!
#270 opened by leolanzi - 1
- 0
gextest fallback mechanism
#265 opened by drakkan - 5
- 4
Update Hardening guide (Terrapin)
#235 opened by keteague - 1
suggested new ssh-audit version scheme
#255 opened by perkelix - 2
- 2
update Dropbear SSH support list
#257 opened by perkelix - 0
- 1
- 4
Hardening guides on sshaudit.com include unsupported algorithms and redundancies
#250 opened by JuliusBairaktaris - 2
Gex tests for clients
#238 opened by ecki - 1
Build multi-architecture snaps
#232 opened by jtesta - 4
precedence order in hardening and ssh-audit tool
#243 opened by perkelix - 1
"using small 512-bit CA key modulus" misleading
#239 opened by philfry - 1
[Potential] Improvement for restricting supported key exchange, cipher, and MAC algorithms | ssh-audit/wiki/macOS-13-(Ventura)-&-14-(Sonoma)
#246 opened by A-Metal-Penguin - 1
honour the NO_COLOR environment variable
#234 opened by rgl - 3
- 1
Added Void Linux as new system to the wiki.
#241 opened by fac3plant - 0
client audit
#245 opened by ecki - 3