Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mattbostock/sshkeycheck
A small SSH server written in Go that checks for weak SSH keys
https://github.com/mattbostock/sshkeycheck
Last synced: about 5 hours ago
JSON representation
A small SSH server written in Go that checks for weak SSH keys
- Host: GitHub
- URL: https://github.com/mattbostock/sshkeycheck
- Owner: mattbostock
- License: mit
- Created: 2015-08-08T20:50:27.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2016-02-26T20:05:23.000Z (over 8 years ago)
- Last Synced: 2024-06-19T16:32:40.333Z (5 months ago)
- Language: Go
- Homepage:
- Size: 57.7 MB
- Stars: 12
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# SSH key checker
A small SSH server written in Go that checks any public keys
presented to it for:- [known weak keys][] vulnerable to the [Debian PRNG bug][]
- potentially weak key lengths, e.g. 1024-bit RSA keys
- DSA (ssh-dss) keys, which [OpenSSH no longer supports by default][]The results are output back to the user over the SSH session.
## Example output
```
$ ssh keycheck.mattbostock.com
This server checks your SSH public keys for known or potential
security weaknesses.For more information, please see:
https://github.com/mattbostock/sshkeycheckThe public keys presented by your SSH client are:
Bits Type Fingerprint Issues
4096 ssh-rsa ed:9a:d2:5d:7b:c0:e5:cf:b9:bc:5c:6b:ce:3a:db:20 No known issues
1024 ssh-dss 4a:0d:9b:b7:92:ba:0a:93:2a:2f:27:d7:58:73:74:91 DSA KEY
384 ecdsa-sha2-nistp384 d8:99:74:7a:0b:d0:e0:be:d0:b1:93:ee:ee:0f:b5:a4 No known issuesWARNING: You are using DSA (ssh-dss) key(s), which are no longer supported by
default in OpenSSH 7.0 and above.
Consider replacing them with a new RSA or ECDSA key.Connection to keycheck.mattbostock.com closed.
```## Inspiration
This toy project is heavily inspired by [Filippo Valsorda][]'s [whosthere][] server,
which infers your name from the SSH public keys associated with your GitHub account.I wanted to provide an easy way for anyone to check if the SSH key they are using
is reasonably secure, in so far as we can define 'secure' from the key length
and from lists of known weak keys.Kudos to [Ben Cox][] for raising awareness of [weak SSH keys on GitHub][].
## Disclaimer
I'm not a cryptographer, nor am I an expert in SSH. Use at your own risk and discretion.
If you spot any problems, please raise an issue. Pull requests are also welcome.
[known weak keys]: https://github.com/g0tmi1k/debian-ssh
[Debian PRNG bug]: https://www.debian.org/security/2008/dsa-1571
[Filippo Valsorda]: https://twitter.com/FiloSottile
[whosthere]: https://github.com/FiloSottile/whosthere
[Ben Cox]: https://twitter.com/Benjojo12
[weak SSH keys on GitHub]: https://blog.benjojo.co.uk/post/auditing-github-users-keys
[OpenSSH no longer supports by default]: http://www.openssh.com/txt/release-7.0