Page 1 of 1

Nagios is using deprecated SSH cryptographic settings

Posted: Fri Sep 11, 2020 6:29 am
by Nuggel1234
Hello,

we have a vulnerability:

Vulnerability ID: q038739

The SSH protocol (Secure Shell) is a method for secure remote login from one computer to another.

The target is using deprecated SSH cryptographic settings to communicate.

Consequences:
A man-in-the-middle attacker may be able to exploit this vulnerability to record the communication to decrypt the session key and even the messages.

...............
Is there a posibility to:
a) deactivate ssh from the nagios server
b) allow only few ips access to ssh (without firewall...)
c) make it safe?

Thank you

Re: Nagios is using deprecated SSH cryptographic settings

Posted: Fri Sep 11, 2020 4:11 pm
by cdienger
You can deactive sshd on a cent/rhel 7/deb/ubuntu machine with:

Code: Select all

systemctl disable sshd
systemctl stop sshd
You can also increase the security by specifying strong ciphers and macs:

https://www.golinuxhub.com/2018/03/best ... y-ciphers/

Limiting access to specific IPs is also possible:

https://unix.stackexchange.com/question ... ip-address

Re: Nagios is using deprecated SSH cryptographic settings

Posted: Mon Sep 14, 2020 2:19 am
by Nuggel1234
ok thank you :) problem solved

Re: Nagios is using deprecated SSH cryptographic settings

Posted: Mon Sep 14, 2020 6:56 am
by scottwilkerson
Nuggel1234 wrote:ok thank you :) problem solved
Great!

Closing thread