How to Install and Uninstall ssh-audit Package on openSuSE Tumbleweed
Last updated: November 23,2024
1. Install "ssh-audit" package
In this section, we are going to explain the necessary steps to install ssh-audit on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
ssh-audit
Copied
2. Uninstall "ssh-audit" package
This guide covers the steps necessary to uninstall ssh-audit on openSuSE Tumbleweed:
$
sudo zypper remove
ssh-audit
Copied
3. Information about the ssh-audit package on openSuSE Tumbleweed
Information for package ssh-audit:
----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : ssh-audit
Version : 3.1.0-1.2
Arch : noarch
Vendor : openSUSE
Installed Size : 743.8 KiB
Installed : No
Status : not installed
Source package : ssh-audit-3.1.0-1.2.src
Upstream URL : https://github.com/jtesta/ssh-audit
Summary : SSH server auditing
Description :
ssh-audit is a tool for ssh server auditing.
Features:
* SSH1 and SSH2 protocol server support;
* grab banner, recognize device or software and operating system, detect compression;
* gather key-exchange, host-key, encryption and message authentication code algorithms;
* output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc);
* output algorithm recommendations (append or remove based on recognized software version);
* output security information (related issues, assigned CVE list, etc);
* analyze SSH version compatibility based on algorithm information;
* historical information from OpenSSH, Dropbear SSH and libssh;
----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : ssh-audit
Version : 3.1.0-1.2
Arch : noarch
Vendor : openSUSE
Installed Size : 743.8 KiB
Installed : No
Status : not installed
Source package : ssh-audit-3.1.0-1.2.src
Upstream URL : https://github.com/jtesta/ssh-audit
Summary : SSH server auditing
Description :
ssh-audit is a tool for ssh server auditing.
Features:
* SSH1 and SSH2 protocol server support;
* grab banner, recognize device or software and operating system, detect compression;
* gather key-exchange, host-key, encryption and message authentication code algorithms;
* output algorithm information (available since, removed/disabled, unsafe/weak/legacy, etc);
* output algorithm recommendations (append or remove based on recognized software version);
* output security information (related issues, assigned CVE list, etc);
* analyze SSH version compatibility based on algorithm information;
* historical information from OpenSSH, Dropbear SSH and libssh;