Replies: 1 comment 2 replies
-
UPDATE : I think there is a bug in transparent mode, since in classic server mode with the --remote-host argument and the IP of an SSH server, it works. However, I would like to intercept all SSH connections initiated within my lab, regardless of the server and the client. Thanks in advance! |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello, I am trying to set up a transparent SSH-MITM with ARP spoofing on a lab. The MITM receives requests from the client to the server but seems to create a large number of sessions, eventually crashing, which prevents me from completing my SSH connection with the server. The return message is "Permission denied (publickey)", even though I'm using password authentication.
Here are some of the messages on the proxy console :
ERROR Authentication timeout.
INFO ℹ client information:
- client version: ssh-2.0-paramiko_3.4.0
- product name: Paramiko
- vendor url: https://www.paramiko.org/
- client address: ip=::ffff:192.168.1.20 port=45528
⚠ detected vulnerabilities by active tests:
CVE-2020-14145 - Fingerprint information leak
* client uses same server_host_key_algorithms list for unknown and known hosts
* Preferred server host key algorithm: ssh-ed25519
CVE-2023-48795 - Terrapin-Attack
* ChaCha20-Poly1305 support: False
* CBC-EtM support: True
* Strict key exchange support: True
* Mitigation status: mitigated
INFO ℹ session 44f1f5c7-59ea-464e-9c7c-ef5a9915833c created
ERROR Authentication timeout.
INFO ℹ client information:
- client version: ssh-2.0-paramiko_3.4.0
- product name: Paramiko
- vendor url: https://www.paramiko.org/
- client address: ip=::ffff:192.168.1.20 port=45542
⚠ detected vulnerabilities by active tests:
CVE-2020-14145 - Fingerprint information leak
* client uses same server_host_key_algorithms list for unknown and known hosts
* Preferred server host key algorithm: ssh-ed25519
CVE-2023-48795 - Terrapin-Attack
* ChaCha20-Poly1305 support: False
* CBC-EtM support: True
* Strict key exchange support: True
* Mitigation status: mitigated
INFO ℹ session a9fd184f-4034-4b2d-9c29-312b682eceb9 created
ERROR Authentication timeout.
INFO ℹ client information:
- client version: ssh-2.0-paramiko_3.4.0
- product name: Paramiko
- vendor url: https://www.paramiko.org/
- client address: ip=::ffff:192.168.1.20 port=45548
⚠ detected vulnerabilities by active tests:
CVE-2020-14145 - Fingerprint information leak
* client uses same server_host_key_algorithms list for unknown and known hosts
* Preferred server host key algorithm: ssh-ed25519
CVE-2023-48795 - Terrapin-Attack
* ChaCha20-Poly1305 support: False
* CBC-EtM support: True
* Strict key exchange support: True
* Mitigation status: mitigated
ERROR Authentication timeout.
INFO ℹ session 04c0cd04-c21a-430e-830e-708778422438 created
INFO ℹ client information:
- client version: ssh-2.0-paramiko_3.4.0
- product name: Paramiko
- vendor url: https://www.paramiko.org/
- client address: ip=::ffff:192.168.1.20 port=45560
⚠ detected vulnerabilities by active tests:
CVE-2020-14145 - Fingerprint information leak
* client uses same server_host_key_algorithms list for unknown and known hosts
* Preferred server host key algorithm: ssh-ed25519
CVE-2023-48795 - Terrapin-Attack
* ChaCha20-Poly1305 support: False
* CBC-EtM support: True
* Strict key exchange support: True
* Mitigation status: mitigated
INFO ℹ session eb7f679a-48d5-4376-b4b1-0a87dfd03ad7 created
ERROR Authentication timeout.
INFO ℹ client information:
- client version: ssh-2.0-paramiko_3.4.0
- product name: Paramiko
- vendor url: https://www.paramiko.org/
- client address: ip=::ffff:192.168.1.20 port=45562
⚠ detected vulnerabilities by active tests:
CVE-2020-14145 - Fingerprint information leak
* client uses same server_host_key_algorithms list for unknown and known hosts
* Preferred server host key algorithm: ssh-ed25519
CVE-2023-48795 - Terrapin-Attack
* ChaCha20-Poly1305 support: False
* CBC-EtM support: True
* Strict key exchange support: True
* Mitigation status: mitigated
ERROR Authentication timeout.
ERROR Error creating socket!
╭──────────────────────────────── Traceback (most recent call last) ────────────────────────────────╮
│ /tmp/.mount_ssh-miaWhXug/python/lib/python3.11/site-packages/sshmitm/server/init.py:317 in │
│ start │
│ │
│ /tmp/.mount_ssh-miaWhXug/python/lib/python3.11/socket.py:294 in accept │
╰───────────────────────────────────────────────────────────────────────────────────────────────────╯
OSError: [Errno 24] Too many open files
INFO ❗ Shutting down server ...
Thanks by advance !
Beta Was this translation helpful? Give feedback.
All reactions