Hello,
we have a vulnerability:
Vulnerability ID: q038739
The SSH protocol (Secure Shell) is a method for secure remote login from one computer to another.
The target is using deprecated SSH cryptographic settings to communicate.
Consequences:
A man-in-the-middle attacker may be able to exploit this vulnerability to record the communication to decrypt the session key and even the messages.
...............
Is there a posibility to:
a) deactivate ssh from the nagios server
b) allow only few ips access to ssh (without firewall...)
c) make it safe?
Thank you
Nagios is using deprecated SSH cryptographic settings
-
Nuggel1234
- Posts: 23
- Joined: Mon May 28, 2018 2:39 am
Re: Nagios is using deprecated SSH cryptographic settings
You can deactive sshd on a cent/rhel 7/deb/ubuntu machine with:
You can also increase the security by specifying strong ciphers and macs:
https://www.golinuxhub.com/2018/03/best ... y-ciphers/
Limiting access to specific IPs is also possible:
https://unix.stackexchange.com/question ... ip-address
Code: Select all
systemctl disable sshd
systemctl stop sshd
https://www.golinuxhub.com/2018/03/best ... y-ciphers/
Limiting access to specific IPs is also possible:
https://unix.stackexchange.com/question ... ip-address
As of May 25th, 2018, all communications with Nagios Enterprises and its employees are covered under our new Privacy Policy.
-
Nuggel1234
- Posts: 23
- Joined: Mon May 28, 2018 2:39 am
Re: Nagios is using deprecated SSH cryptographic settings
ok thank you
problem solved
-
scottwilkerson
- DevOps Engineer
- Posts: 19396
- Joined: Tue Nov 15, 2011 3:11 pm
- Location: Nagios Enterprises
- Contact:
Re: Nagios is using deprecated SSH cryptographic settings
Great!Nuggel1234 wrote:ok thank youproblem solved
Closing thread