Skip to content

Commit

Permalink
Revised connection rate warning during standard audits.
Browse files Browse the repository at this point in the history
  • Loading branch information
jtesta committed Apr 22, 2024
1 parent 46b89ff commit 3c459f1
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion src/ssh_audit/dheat.py
Original file line number Diff line number Diff line change
Expand Up @@ -51,7 +51,7 @@ class DHEat:
MAX_SAFE_RATE = 20.0

# The warning added to DH algorithms in the UI when dh_rate_test determines that no throttling is being done.
DHEAT_WARNING = "Potentially insufficient connection throttling detected, resulting in possible vulnerability to the DHEat DoS attack (CVE-2002-20001). Suppress this test and message with the --skip-rate-test option. Additional info: {connections:d} connections were created in {time_elapsed:.3f} seconds, or {rate:.1f} conns/sec; server must respond with a rate less than {max_safe_rate:.1f} conns/sec to be considered safe."
DHEAT_WARNING = "Potentially insufficient connection throttling detected, resulting in possible vulnerability to the DHEat DoS attack (CVE-2002-20001). {connections:d} connections were created in {time_elapsed:.3f} seconds, or {rate:.1f} conns/sec; server must respond with a rate less than {max_safe_rate:.1f} conns/sec per IPv4/IPv6 source address to be considered safe. For rate-throttling options, please see <https://www.ssh-audit.com/hardening_guides.html>. Suppress this test and message with the --skip-rate-test option."

# List of the Diffie-Hellman group exchange algorithms this test supports.
gex_algs = [
Expand Down

0 comments on commit 3c459f1

Please sign in to comment.