
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Hide OpenSSH Version Banner	</title>
	<atom:link href="https://kram.nz/2018/01/hide-openssh-version-banner/feed/" rel="self" type="application/rss+xml" />
	<link>https://kram.nz/2018/01/hide-openssh-version-banner/</link>
	<description>Solution Architect - Healthcare IT</description>
	<lastBuildDate>Fri, 13 Dec 2019 03:19:29 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.3</generator>
	<item>
		<title>
		By: M		</title>
		<link>https://kram.nz/2018/01/hide-openssh-version-banner/comment-page-1/#comment-9958</link>

		<dc:creator><![CDATA[M]]></dc:creator>
		<pubDate>Sat, 15 Sep 2018 05:54:05 +0000</pubDate>
		<guid isPermaLink="false">https://kram.nz/?p=368#comment-9958</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://kram.nz/2018/01/hide-openssh-version-banner/comment-page-1/#comment-9957&quot;&gt;müzso&lt;/a&gt;.

Hi Müzso,

Absolutely agree! This is just an interesting and quick way to change the banner and not in of itself a way to secure an SSH service.

1. Compiling a different banner from source, and especially tying to automate this for updates would be a lot more difficult.

2. In the example from the article, I have left the protocol version untouched (i.e. still has &#039;SSH-2.0-) which should allow most clients to connect without issue. I should have noted above that this part is required. Changes after this will just confuse the client/world about what software version is running - which is part of the point. I am the only consumer of my server and the banner is for my own amusement. In a serious commercial setting, the banner may actually be important for things like inventory management and looking for servers that need to be patched.

3. This article isn&#039;t about how to secure an SSH server. There are many things which I would recommend for that (on my server I have locked down root access, require an SSH key and whitelist inbound IPs amongst others). Just as would come from changing the port you run SSH on, the added obscurity reduces exposure and the likelihood of being on a database of targets when the next vulnerability is discovered. One should always expect and behave as though you are at the top of the list however.

I appreciate the feedback and agree with your points. To be clear, this is not a way to make a SSH server secure from threat; its a &#039;quick and dirty&#039; way to change the banner (that I have done for my own amusement - I use IP whitelisting to prevent my banner being seen outside my trusted networks). There are many services on the internet that obscure the software they are running (not uncommon on web servers) precisely to reduce the likelihood of being targeted, ever if they are no more secure than an equivalent service broadcasting its version information.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://kram.nz/2018/01/hide-openssh-version-banner/comment-page-1/#comment-9957">müzso</a>.</p>
<p>Hi Müzso,</p>
<p>Absolutely agree! This is just an interesting and quick way to change the banner and not in of itself a way to secure an SSH service.</p>
<p>1. Compiling a different banner from source, and especially tying to automate this for updates would be a lot more difficult.</p>
<p>2. In the example from the article, I have left the protocol version untouched (i.e. still has &#8216;SSH-2.0-) which should allow most clients to connect without issue. I should have noted above that this part is required. Changes after this will just confuse the client/world about what software version is running &#8211; which is part of the point. I am the only consumer of my server and the banner is for my own amusement. In a serious commercial setting, the banner may actually be important for things like inventory management and looking for servers that need to be patched.</p>
<p>3. This article isn&#8217;t about how to secure an SSH server. There are many things which I would recommend for that (on my server I have locked down root access, require an SSH key and whitelist inbound IPs amongst others). Just as would come from changing the port you run SSH on, the added obscurity reduces exposure and the likelihood of being on a database of targets when the next vulnerability is discovered. One should always expect and behave as though you are at the top of the list however.</p>
<p>I appreciate the feedback and agree with your points. To be clear, this is not a way to make a SSH server secure from threat; its a &#8216;quick and dirty&#8217; way to change the banner (that I have done for my own amusement &#8211; I use IP whitelisting to prevent my banner being seen outside my trusted networks). There are many services on the internet that obscure the software they are running (not uncommon on web servers) precisely to reduce the likelihood of being targeted, ever if they are no more secure than an equivalent service broadcasting its version information.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: müzso		</title>
		<link>https://kram.nz/2018/01/hide-openssh-version-banner/comment-page-1/#comment-9957</link>

		<dc:creator><![CDATA[müzso]]></dc:creator>
		<pubDate>Thu, 13 Sep 2018 13:06:12 +0000</pubDate>
		<guid isPermaLink="false">https://kram.nz/?p=368#comment-9957</guid>

					<description><![CDATA[I see at least three problems with this approach:

1. As you already mentioned: &quot;This change will only be temporary as any time you update OpenSSH, the binary will be replaced.&quot; So unless you want to mess with the sshd binary after every single update of the openssh-server package (either with hex editing or recompiling the latter seems to be easier to automate in a robust manner), you don&#039;t want to go down this road.

2. The SSH specification (RFC) prohibits any comliant implementation from messing with the software version part of the identification string.
https://tools.ietf.org/html/rfc4253#section-4.2

3. Lying about the software version or hiding it is &quot;security through obscurity&quot; which is a possible, although a widely questioned practise. Reference: https://en.wikipedia.org/wiki/Security_through_obscurity
If you know you have an old and vulnerable ssh daemon (i.e. with publicly known vulnerabilities) and for some reason you cannot deploy fixes, you&#039;re in trouble anyway. Hiding software version numbers merely makes it a bit more difficult to identify your service/server as a target. Most vulnerabilities get a proof-of-concept code and a large number of these are integrated into vulnerability scanners, which do not rely on the version string that the service tells about itself.

To summarize: I think you&#039;re better off spending your time on actual security (eg. deploying updates) instead of hiding potential vulnerabilities.]]></description>
			<content:encoded><![CDATA[<p>I see at least three problems with this approach:</p>
<p>1. As you already mentioned: &#8220;This change will only be temporary as any time you update OpenSSH, the binary will be replaced.&#8221; So unless you want to mess with the sshd binary after every single update of the openssh-server package (either with hex editing or recompiling the latter seems to be easier to automate in a robust manner), you don&#8217;t want to go down this road.</p>
<p>2. The SSH specification (RFC) prohibits any comliant implementation from messing with the software version part of the identification string.<br />
<a href="https://tools.ietf.org/html/rfc4253#section-4.2" rel="nofollow ugc">https://tools.ietf.org/html/rfc4253#section-4.2</a></p>
<p>3. Lying about the software version or hiding it is &#8220;security through obscurity&#8221; which is a possible, although a widely questioned practise. Reference: <a href="https://en.wikipedia.org/wiki/Security_through_obscurity" rel="nofollow ugc">https://en.wikipedia.org/wiki/Security_through_obscurity</a><br />
If you know you have an old and vulnerable ssh daemon (i.e. with publicly known vulnerabilities) and for some reason you cannot deploy fixes, you&#8217;re in trouble anyway. Hiding software version numbers merely makes it a bit more difficult to identify your service/server as a target. Most vulnerabilities get a proof-of-concept code and a large number of these are integrated into vulnerability scanners, which do not rely on the version string that the service tells about itself.</p>
<p>To summarize: I think you&#8217;re better off spending your time on actual security (eg. deploying updates) instead of hiding potential vulnerabilities.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
