Some checks failed
🛡️ Retrieve DNSSEC status of coresecret.dev. / 🛡️ Retrieve DNSSEC status of coresecret.dev. (push) Successful in 1m13s
🛡️ Shell Script Linting / 🛡️ Shell Script Linting (push) Successful in 56s
🔐 Generating a Private Live ISO TRIXIE. / 🔐 Generating a Private Live ISO TRIXIE. (push) Successful in 51m3s
💙 Generating a PUBLIC Live ISO. / 💙 Generating a PUBLIC Live ISO. (push) Failing after 1m33s
Signed-off-by: Marc S. Weidner <msw@coresecret.dev>
55 lines
2.8 KiB
Markdown
55 lines
2.8 KiB
Markdown
---
|
|
gitea: none
|
|
include_toc: true
|
|
---
|
|
|
|
# 1. CISS.debian.live.builder
|
|
|
|
**Centurion Intelligence Consulting Agency Information Security Standard**<br>
|
|
*Debian Live Build Generator for hardened live environment and CISS Debian Installer*<br>
|
|
**Master Version**: 8.13<br>
|
|
**Build**: V8.13.768.2025.12.06<br>
|
|
|
|
# 2. SSH Audit by ssh-audit.com
|
|
|
|

|
|
|
|
# 3. SSH Audit by https://github.com/jtesta/ssh-audit
|
|
|
|
````text
|
|
# general
|
|
(gen) banner: SSH-2.0-OpenSSH_10.0p2
|
|
(gen) software: OpenSSH 10.0p2
|
|
(gen) compatibility: OpenSSH 9.9+, Dropbear SSH 2020.79+
|
|
(gen) compression: disabled
|
|
|
|
# key exchange algorithms
|
|
(kex) mlkem768x25519-sha256 -- [info] available since OpenSSH 9.9
|
|
`- [info] hybrid key exchange based on post-quantum resistant algorithm and proven conventional X25519 algorithm
|
|
(kex) sntrup761x25519-sha512@openssh.com -- [info] available since OpenSSH 8.5
|
|
`- [info] default key exchange from OpenSSH 9.0 to 9.8
|
|
`- [info] hybrid key exchange based on post-quantum resistant algorithm and proven conventional X25519 algorithm
|
|
(kex) sntrup761x25519-sha512 -- [info] available since OpenSSH 9.9
|
|
`- [info] default key exchange since OpenSSH 9.9
|
|
`- [info] hybrid key exchange based on post-quantum resistant algorithm and proven conventional X25519 algorithm
|
|
(kex) ext-info-s -- [info] available since OpenSSH 9.6
|
|
`- [info] pseudo-algorithm that denotes the peer supports RFC8308 extensions
|
|
(kex) kex-strict-s-v00@openssh.com -- [info] pseudo-algorithm that denotes the peer supports a stricter key exchange method as a counter-measure to the Terrapin attack (CVE-2023-48795)
|
|
|
|
# host-key algorithms
|
|
(key) ssh-ed25519 -- [info] available since OpenSSH 6.5, Dropbear SSH 2020.79
|
|
(key) rsa-sha2-512 -- [info] available since OpenSSH 7.2
|
|
(key) rsa-sha2-256 -- [info] available since OpenSSH 7.2, Dropbear SSH 2020.79
|
|
|
|
# encryption algorithms (ciphers)
|
|
(enc) aes256-gcm@openssh.com -- [info] available since OpenSSH 6.2
|
|
|
|
# message authentication code algorithms
|
|
(mac) hmac-sha2-512-etm@openssh.com -- [info] available since OpenSSH 6.2
|
|
(mac) hmac-sha2-256-etm@openssh.com -- [info] available since OpenSSH 6.2
|
|
````
|
|
|
|
---
|
|
**[no tracking | no logging | no advertising | no profiling | no bullshit](https://coresecret.eu/)**
|
|
<!-- vim: set number et ts=2 sw=2 sts=2 ai tw=128 ft=markdown -->
|