Disable Weak Secure Shell Encryption Algorithms on Non-Red Hat Linux Distros
In this Linux administration tutorial, I'll show you how to audit your OpenSSH servers for weak algorithms, and then disable these weak SSH algorithms on non-Red Hat Linux distros. We'll use the ssh-audit tool to perform the audit.
Red Hat now uses a different method for configuring encryption policies, and we'll look at that in the next BeginLinux Guru video.
**************************************
Purchase links for my books:
Mastering Linux Security and Hardening
Packt Publishing link:
https://www.packtpub.com/product/mastering-linux-security-and-hardening-third-edition/9781837630516
Amazon link:
https://amzn.to/3ZdIR7Y
*********************************
The Ultimate Linux Shell Scripting Guide
Packt Publishing Link:
https://www.packtpub.com/en-us/product/the-ultimate-linux-shell-scripting-guide-9781835463154
Amazon link:
https://amzn.to/4j12I44
Linux Service Management Made Easy with systemd
Packt Publishing link:
https://www.packtpub.com/product/linux-service-management-made-easy-with-systemd/9781801811644
Amazon link:
https://amzn.to/344gxO0