Repository: sdnewhop/sdwannewhope Branch: master Commit: 8e36c348b7ff Files: 6 Total size: 81.5 KB Directory structure: gitextract_4gck7wen/ ├── README.md ├── checklists/ │ └── sd-wan-security-assessment-the-first-hours.md ├── data/ │ ├── tcp2156.json │ └── viptela_banners.json └── docs/ ├── census.md └── leakage.md ================================================ FILE CONTENTS ================================================ ================================================ FILE: README.md ================================================  # SD-WAN New Hope Software-defined networking in a wide area network (SD-WAN) quickly becomes very popular in Enterprises. Vendors promise "on-the-fly agility, simplicity, security and automation" and many other benefits. What do you know about SD-WAN? What "security" means from a hands-on perspective? Are present SD-WAN products really secure? The goal of this project is to give answers to these questions by exploring implementation security of real SD-WAN solutions from a practical point of view. ## Papers * [SD-WAN Internet Census (preprint)](https://arxiv.org/abs/1808.09027) * [SD-WAN Threat Landscape (preprint)](https://arxiv.org/abs/1811.04583) * [Practical Security Assessment of SD-WAN Implementations](https://medium.com/hackingodyssey/practical-security-assessment-of-sd-wan-implementations-c8aa51441c68) * [SD-WAN Security: A Product Liability Insurance Law Would Certainly Help](https://blog.ipspace.net/2020/06/sdwan-silver-peak-security.html) * [SD-WAN TLS Scanning (draft)](https://docs.google.com/document/d/1TCCGWkFKp07Bg7hEeKeqkwogi5UaArbJ_OpEJsyiuy8/) ## Knowledge Base * [SD-WAN Census Queries List](docs/census.md) * [SD-WAN Version Leakage List](docs/leakage.md) * [Silver Peak VXOA 8.1 Vulnerabilities](docs/silverpeak-vxoa-8.1.pdf) ## Public Reports ### SilvePeak * [Malicious Portal Can Access REST API on EdgeConnect](reports/SDWAN-New-Hop-2020-31-01.pdf) * [Malicious or Untrusted Orchestrator Can Access REST API on EdgeConnect](reports/SDWAN-New-Hop-2020-30-01.pdf) * [SilverPeak’s IPsec UDP protocol implementation fails to provide forward secrecy](reports/SDWAN-New-Hop-2020-17-01.pdf) * [Silverpeak EdgeConnect Multiple Vulnerabilities](reports/Silverpeak%20EdgeConnect%20Multiple%20Vulnerabilities%20-%20032018.pdf) ### Citrix * [Citrix SD-WAN Center Security Findings](reports/Citrix%20SD-WAN%20Security%20Findings.pdf) * [Citrix NetScaler SD-WAN Security Findings](reports/Citrix%20NetScaler%20SD-WAN%20Security%20Findings%20-%2011082018.pdf) ### Riverbed * [Riverbed SteelConnect Vulnerabilities](reports/Riverbed%20SteelConnect%20Vulnerabilities.pdf) ### Viprinet * [Viprinet Virtual VPN Hub Stored XSS](reports/Viprinet%20Stored%20XSS.pdf) ### Versa * [Versa Analytics Security Assessment](reports/Versa%20Analytics%20Security%20Assessment%20-%2009112019.pdf) ## Checklists * [SD-WAN Security Assessment: The First Hours](checklists/sd-wan-security-assessment-the-first-hours.md) ## Tools * [Grinder Framework](https://github.com/sdnewhop/grinder) * [SD-WAN Harvester](https://github.com/sdnewhop/sdwan-harvester) * [SD-WAN Infiltrator](https://github.com/sdnewhop/sdwan-infiltrator) ## Slides * [SD-WAN Secure Communication Designs and Vulnerabilities. DeepSec 2019](slides/DeepSec-2019.pdf) * [One Framework to Rule Them All: A framework for Internet-connected Device Census. OFFZONE 2019](/slides/offzone-grinder-2019.pdf) * [A dive in to SD-WAN Insecure Designs and Vulnerabilities. SecurityFest 2019](slides/securityfest-2019.pdf) * [SD-WAN New Hope. PHDays 2019](slides/phdays-2019.pdf) * [SD-WAN Secure Communications. Yandex OSN Meetup 2019](slides/yandex-osn-2019.pdf) * [SD-WAN: Yet Another Way to Unsafe Internet. InsomniHack 2019](slides/insomnihack-2019.pdf) * [SD-WAN Internet Census. Zero Nights 2018](slides/zn-2018.pdf) * ["WebGoat.SDWAN.Net" in Depth. Power of Community 2018](slides/poc-2018.pdf) * [Practical Threat Modeling for SD-WAN. Area 41 2018](slides/area41-2018.pdf) * [Too Soft[ware Defined] Networks: SD-WAN Vulnerability Assessment. Black Hat USA 2018](slides/blackhat-2018.pdf) ## Talks * [SD-WAN Secure Communications Design and Vulnerabilities. DeepSec 2019](https://vimeo.com/390850895) * [SD-WAN Secure Communications. Yandex OSN Meetup 2019 (Russian)](https://www.youtube.com/watch?v=gHRustiUdKY) * [SD-WAN a New Hop. How to hack software defined network and keep your sanity? CCC 2018](https://media.ccc.de/v/35c3-9446-sd-wan_a_new_hop) * [How To Hack SD-WAN And Keep Your Sanity? Ekoparty 2018](https://www.youtube.com/watch?v=8jY0yPlW7xg) ## Contributors - [Sergey Gordeychik](https://twitter.com/scadasl) - [Alex Timorin](https://twitter.com/atimorin) - [Denis Kolegov](https://twitter.com/dnkolegov) - Maxim Gorbunov - [Christoph Jaggi](https://uebermeister.com/about.html) - [Nikolay Tkachenko](https://twitter.com/afr1ka_) - [Nikita Oleksov](https://twitter.com/neoleksov) - [Oleg Broslavsky](https://twitter.com/yalegko) - [Anton Nikolaev](https://github.com/manmolecular) - [Maria Nedyak](https://twitter.com/msh_smlv) ================================================ FILE: checklists/sd-wan-security-assessment-the-first-hours.md ================================================ # SD-WAN Security Assessment: The First Hours ## Introduction Suppose you need to perform a security assessment of an SD-WAN solution. There are several reasons for this and one of them is selecting an SD-WAN provider or product. A traditional SD-WAN system involves many planes, technologies, mechanisms, services, protocols and features. It has distributed and multilayered architecture. So where should you start? This document follows JP Aumasson's approach described in a series of auditing crypto articles ([[1](https://research.kudelskisecurity.com/2019/02/07/auditing-rust-crypto-the-first-hours/)], [[2](https://research.kudelskisecurity.com/2017/04/24/auditing-code-for-crypto-flaws-the-first-30-minutes/)]). The main goal of this document is to list basic sanity checks that can be used when investigating SD-WAN. We will consider general checks that can be applied to any SD-WAN system. ## SD-WAN Security Assessment Checklist ### Common 1. What third-party components and libraries are used? How secure are these? Are the components using their latest versions? 2. Run [lynis](https://github.com/CISOfy/lynis) tool on each node and assess hardening level. 3. Run a host-based vulnerability scanner ([vulners](https://github.com/videns/vulners-scanner), [LibScanner](https://github.com/DanBeard/LibScanner), etc.) and assess patch management level. 4. Run a web vulnerability scanner (e.g., `Burp Suite`, `Acunetix`, etc.) against a web management interface. ### Architecture 1. Is a vendor-controlled cloud management interface used within the architecture? ### Zero Touch Provisioning 1. How does a network device get its initial configuration? 2. How does a network device discover a controller, orchestrator and other entities? 3. How do network devices, the controller and the orchestrator authenticate each other? 4. How trust is provisioned and what mechanisms are used? One-time tokens, X.509 certificates, login and password, pre-shared keys? 5. How do re-discovering or re-joining mechanisms work? ### Cryptography 1. Which cryptographic protocols and implementations are used on the dataplane? 2. Which cryptographic protocols and implementations are used on the controlplane? 3. Are AEAD ciphers supported? 4. How key management is implemented? 5. How consistent are the security levels of the various protocols and primitives? 6. Look for legacy primitives like DES, TripleDES, RC4, MD5, SHA1 or custom primitives. 7. Is it possible to control cryptographic mechanisms (e.g., enable TLS 1.3 only, disable unwanted ciphers, etc.)? 8. Run a TLS scanner (e.g., `testssl.sh`, SSL Labs server scanner, `sslyze`, etc.) against TLS-enabled interfaces and assess the results. 9. Run an SSH scanner (e.g., `ssh_scan`) against SSH-enabled interfaces. 10. Which type of PKI is used? Public or private? ### Secure Communications 1. Which protocols are used between orchestrator, controller, and edge devices? Are they secured? 2. How SD-WAN entities do authenticate each other? 3. Run WireShark on each node (orchestrator, controller, edge router), review traffic and check whether unencrypted sensitive packets are sent. 4. Do the chosen protocols and primitives provide the security required by your threat model? 5. Is RSA key exchange used? 6. Where and how secrets (e.g., private keys, pre-shared keys, tokens) are stored? 7. Check whether the same hardcoded certificate is used on different deployments. 8. Is a key renewal mechanism supported on control channels? ### Web Management Interface 1. Check protection mechanisms against CSRF attacks. 2. Check HTTPS supporting and web hardening mechanisms: secure headers, content-security policy, CORS headers. 3. Test all HTTP services against Slow HTTP DoS attacks. 4. Are cryptography secrets accessible via the Web interface? ================================================ FILE: data/tcp2156.json ================================================ [ { "ip": "13.71.84.216", "timestamp": "1540077658", "ports": [ {"port": 2156, "proto": "tcp", "service": {"name": "X509", "banner": "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"} } ] } ] ================================================ FILE: data/viptela_banners.json ================================================ {"ip":"151.181.50.132","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.2","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"a67It00vj1enPRhKb88dZA==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"KuElKRglEc1h6DCz/PZyDfzHowUUMxFThLjgjV2y7DM=","length":256},"y":{"value":"+9ynLEfhTH8ehj8K2b70ix1/ozMjYrS3FbVI6iAAt0A=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQDD9fVpQWYqD9GfCEW747VbWcJwwHQRwmqHa2erAhPs5AAAACAgxyb7Oz88ioCl5HJ5PN4EHBJsMTC61kZLxzCCMObRiA=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIQDD9fVpQWYqD9GfCEW747VbWcJwwHQRwmqHa2erAhPs5AAAACAgxyb7Oz88ioCl5HJ5PN4EHBJsMTC61kZLxzCCMObRiA==","h":"QTRoO8vK0s5/o8A9iGma3rfbfEZXiNtBsa8e/QN4hY8="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"u7X9FPqw8AsFTehwDbhD5m8PRNcK1U3Nt+YO7/kpSPA=","y":"IF4mt32b1Zzdc0TDzStS7e4g9MzQJryp8HWWdPAgMHg="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLu1/RT6sPALBU3ocA24Q+ZvD0TXCtVNzbfmDu/5KUjwIF4mt32b1Zzdc0TDzStS7e4g9MzQJryp8HWWdPAgMHg=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"7025c0989ac73a90a25fd666ea05736585980060b09af81ba13f750559df7e63"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T17:46:00+03:00"}}} {"ip":"155.239.244.214","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 16.2.10","server_id":{"raw":"SSH-2.0-OpenSSH_7.1","version":"2.0","software":"OpenSSH_7.1"},"server_key_exchange":{"cookie":"xYQtwkXRbncQKCQNiJ70ug==","kex_algorithms":["curve25519-sha256@libssh.org","ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","ecdsa-sha2-nistp256","ssh-ed25519"],"client_to_server_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"curve25519-sha256@libssh.org","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"curve25519_sha256_params":{"server_public":"5X+PxLT7JZXGeugvRsZxXFbgYHA0ZsjPZ5/s5vOHwj8="},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQCxWiaqNUbqdV3Kl14HNZ/X+m+z3bO2kPFsNtflismvwAAAACEA4BA1kvjP3Ej8ZNkIn9maJp8Kmdq9OCPPujzQ8M6AcA4="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQCxWiaqNUbqdV3Kl14HNZ/X+m+z3bO2kPFsNtflismvwAAAACEA4BA1kvjP3Ej8ZNkIn9maJp8Kmdq9OCPPujzQ8M6AcA4=","h":"00+hB2m+dukHfBNpieaaoZrKgXESVj01YOMJzB2uwVc="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"uoujkFS5ENOVyBcx0r659DIcfHjWeUaBMF05UW6CRBo=","y":"B5mWoKuzaL7JVs86w8TWBgc2m4stQbBxJ08MgvCocwE="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLqLo5BUuRDTlcgXMdK+ufQyHHx41nlGgTBdOVFugkQaB5mWoKuzaL7JVs86w8TWBgc2m4stQbBxJ08MgvCocwE=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"bd816a592658061292ef0154cd6bab872fdead05b0f4ee24bebb627a3bdb297c"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T18:26:14+03:00"}}} {"ip":"104.42.62.206","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 99.99.999-1206","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"zof61sK5YZw/YW6yqpz7Vg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"freQZGd/2e6Uj45ZzFVz3NT2B1OUN8XKW+EdkD7kspI=","length":256},"y":{"value":"kzsYCYaxd+LinS8GLRsgNGJUs8k1n9lOURt/jd/YJTc=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQDlkfpv1+ZdMh/1Bnmtsxr1J1kCaII7ryarXuPt2U0MSQAAACEAqz3KNGK31Tv2Bpz5iKW5ao10VXmzT2PMxj/kQIl5s/M="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQDlkfpv1+ZdMh/1Bnmtsxr1J1kCaII7ryarXuPt2U0MSQAAACEAqz3KNGK31Tv2Bpz5iKW5ao10VXmzT2PMxj/kQIl5s/M=","h":"QKLgVx0rHnEcRaz85pIE17yzNvP0s89yZjbhIgbAWRk="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"ThK5y69DY5AC/yKsmrDbdBv1qSjI15sswVDUHuleYjY=","y":"nFb3sRXQfI5Sv7/eml3/e7WjEx9f4cfNvia/4Jcll2A="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBE4SucuvQ2OQAv8irJqw23Qb9akoyNebLMFQ1B7pXmI2nFb3sRXQfI5Sv7/eml3/e7WjEx9f4cfNvia/4Jcll2A=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"a2c9f8956e51348f03c6534cb88a1109a660b4ae871783d447984f74ae6f91bd"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T18:43:04+03:00"}}} {"ip":"70.34.62.17","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.7","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"EMpDdtY3LV885MPlzWD3kQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"EtMbppc8bQMnQzVYM/KNrYiKoYU30Ib+1x70HsUPnjE=","length":256},"y":{"value":"s4U8ydeXCUMU2Ugc0V/heW33UAhaLFgsKOu7TZAnc1o=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIFA9ce1EBJyfc+/C+uJVLGEGLp669+5NblQSvrGtL3T0AAAAIHfdlPwUxxX06UwdFkxDvgEz3if3dHBjFTy24rQe33Rm"},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABIAAAAIFA9ce1EBJyfc+/C+uJVLGEGLp669+5NblQSvrGtL3T0AAAAIHfdlPwUxxX06UwdFkxDvgEz3if3dHBjFTy24rQe33Rm","h":"Sob56eoCCwGm+wOXBWmXkW7ECbaFaH8o2RNKW7YiuIA="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"PA/6vWrUYmA+8LRpNPQsCgM65qij1dJhqgF8HZipE58=","y":"P7zmdwdj4jtBQW8YAY+3o3+luTIe75CqXm/d9I9K0yQ="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBDwP+r1q1GJgPvC0aTT0LAoDOuaoo9XSYaoBfB2YqROfP7zmdwdj4jtBQW8YAY+3o3+luTIe75CqXm/d9I9K0yQ=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"4b4bb75fe46b42331d9dee45ab0ae78efb6814ce0cc7953fc5416b469c808990"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T19:36:47+03:00"}}} {"ip":"174.64.55.162","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.8","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"8gK9UtASmFpOG1QuZuAUfQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"O36nPaw+Xl2n/itJ3J1/ddznIVErvRJ4eyKsNNYHmo8=","length":256},"y":{"value":"HR4UeB4fXemo/AkNV9byBtgPJhSPznqdFqtWbtEYZQE=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIGeAMJgOK9V4oHCcYJ62Xeo084tjDSh+gatbdilpmUS/AAAAIH1O/oQKQf6yHHKEpO7nRh5vXIog+eFZx9+Aqe56qOUO"},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABIAAAAIGeAMJgOK9V4oHCcYJ62Xeo084tjDSh+gatbdilpmUS/AAAAIH1O/oQKQf6yHHKEpO7nRh5vXIog+eFZx9+Aqe56qOUO","h":"mtnBBAJhnm6xgOQGuqpNgHYzp2+q3WlI+X9RXkN3AgQ="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"5tUzzskfAH+d5OaFrHzyfv2hnPlmgL0BNIjOdrqMdvg=","y":"2ljd2FGWDQn2rPYHYyYa19HK3L75uQXqQWV48MR/0Jw="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBObVM87JHwB/neTmhax88n79oZz5ZoC9ATSIzna6jHb42ljd2FGWDQn2rPYHYyYa19HK3L75uQXqQWV48MR/0Jw=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"ee05d5a0fc4950d7184fa955ca47973e5e57fe6b29726852e5a8bdf8ce7a6bef"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T19:47:51+03:00"}}} {"ip":"75.96.163.163","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.4","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"3qZKRekX47yKv8Ojy5FA4w==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"bH0W7Qg0YhXvq5vqGYTJKBY+NNRson2QkB1MOqLjC3w=","length":256},"y":{"value":"f+h+pCtqPYx0P2x01zI3zNz2+jzIflAnw3kjVwJ7BvU=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIHtiFXJW0v1SCP6apy/a3Zro1XW7nxeiADmUX8IxL9wjAAAAIFGv/rK8/kDUEXBEQ2Wruajy7mCP2JFf239HZ26Z5nJ2"},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABIAAAAIHtiFXJW0v1SCP6apy/a3Zro1XW7nxeiADmUX8IxL9wjAAAAIFGv/rK8/kDUEXBEQ2Wruajy7mCP2JFf239HZ26Z5nJ2","h":"j+HMKjutO/Jv2Hx3kZNVgk+0lmpH4D4tWXbPLV+quCs="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"i7e3Xjp4aVPCUPMdlDf93Q4f58IuvZIKdTyRMCwGHog=","y":"8efwMfisr1wpzy3Ml7iacXwMPmsc1NV4mz02PhiGM9A="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBIu3t146eGlTwlDzHZQ3/d0OH+fCLr2SCnU8kTAsBh6I8efwMfisr1wpzy3Ml7iacXwMPmsc1NV4mz02PhiGM9A=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"a963b5bd10fe0e619a6b7a531f0f5a17f28c20a9ddfbe2eaf19672e8ea3b36c5"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T22:46:24+03:00"}}} {"ip":"112.87.40.254","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.4","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"wWVR8uMJXNNYKijOyk7ikQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"ZqKChq9rY26TQJp3tOy0lpEEULW0L2jX2Q9HUj/wj6c=","length":256},"y":{"value":"PxHLMo7IYRNjv5gk00G1Fwc4sSfltoXnNSx0TsTkonA=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIBuVJgjBZp4wKYM2HTT0M5+xrA9kn40sLJhGhf30EJr1AAAAIQDFMKHboTExDxJg8dl279DOG2TSQutvQTIy+IZT3D7PYA=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIBuVJgjBZp4wKYM2HTT0M5+xrA9kn40sLJhGhf30EJr1AAAAIQDFMKHboTExDxJg8dl279DOG2TSQutvQTIy+IZT3D7PYA==","h":"SNHBiteYTjA+ZvYQZzpUGJOWUG4Euxe1hU57oFpI0/4="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"JfInZ5o2XLf2VTCPyQomQb8Rv3AXIJXGyWGSxW5YAkc=","y":"c4aJ8D9REm9iMNAqDlSCWMY7z9xluGUO4nTbpNX1ak4="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCXyJ2eaNly39lUwj8kKJkG/Eb9wFyCVxslhksVuWAJHc4aJ8D9REm9iMNAqDlSCWMY7z9xluGUO4nTbpNX1ak4=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"06382d922ab980e0027cdfdaaef9157b95303cbc5f9a9e13aea3167eec25e794"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T23:18:06+03:00"}}} {"ip":"124.7.227.123","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.1","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"6CrcFeNzl7rNSvxDAUi6PQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"ppxekjdKbbRp9mW+LL4cz1fl84CKrw5Nlf8zwZnP/10=","length":256},"y":{"value":"JU0Q6ukEWKYOejJFkbamcCtwceE1Achq1K8wn7KAvBc=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQCig3Lo7lsxScnDP4UWAv5Sgwip8szeslgqLG2vFClyBAAAACEAsrxINWk1y1GRcY5RigBehHjHjPJoF1b+31XBVNzDIEQ="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQCig3Lo7lsxScnDP4UWAv5Sgwip8szeslgqLG2vFClyBAAAACEAsrxINWk1y1GRcY5RigBehHjHjPJoF1b+31XBVNzDIEQ=","h":"uJZuWwPcqExgfyk1pN1NCkCErLej6QTxJWVrm8YIO6o="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"fTuEainJhEU95o3oGmjf4nyOZAhqaZVVPZZeRWsVeos=","y":"BBsGuOGRfEZ4XiECzL86W2FOVb90jmNZEgUjp1j18gs="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBH07hGopyYRFPeaN6Bpo3+J8jmQIammVVT2WXkVrFXqLBBsGuOGRfEZ4XiECzL86W2FOVb90jmNZEgUjp1j18gs=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"6926a33e7780eaf38597f58b50571942ff1340e6940f0e3d1ee48edad0140faa"}},"userauth":["publickey","password"]},"timestamp":"2018-10-21T23:49:23+03:00"}}} {"ip":"54.241.63.230","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"MWMje8aVfH4f06kzm4KuUg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"1CwEKZ86EKEp+gsiWHSsdhkGtPjrZjWYGRRmd5r0zYs=","length":256},"y":{"value":"IHGsztGby8A2+h50H6xUMn1B9CZQxHvIGd9pdXYJGas=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIB79DXAXh4K9b99XE44tIiTlTyggyX3eHxgrrqtEyh3XAAAAIQDq2iTOoKwEcgwk88+RZ93oiSoy6fix7pu+Hq5D+DAn0w=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIB79DXAXh4K9b99XE44tIiTlTyggyX3eHxgrrqtEyh3XAAAAIQDq2iTOoKwEcgwk88+RZ93oiSoy6fix7pu+Hq5D+DAn0w==","h":"aGJ3jcT70DDYelaYfYPt1S0wd0WIzIjqPbFYUJOtlPU="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"5QvakK7q0iLstcYkeuBBjzWCu1jSoQlgOAgCV1ohP3w=","y":"rWK3tjbwYtUPKWgYTLZmBhNeFwRrbIYM/4w35100pmA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBOUL2pCu6tIi7LXGJHrgQY81grtY0qEJYDgIAldaIT98rWK3tjbwYtUPKWgYTLZmBhNeFwRrbIYM/4w35100pmA=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"49f2515834ec214ef66c24a1a1ba3a5d4898f002477b212776c0e5b647991b02"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T00:02:35+03:00"}}} {"ip":"51.140.7.18","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.1.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"61o3dv2qTCura0jrVvj0PQ==","kex_algorithms":["curve25519-sha256@libssh.org","ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256","ssh-ed25519"],"client_to_server_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"curve25519-sha256@libssh.org","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"curve25519_sha256_params":{"server_public":"ZzKeBWnKGC5OHLzP4TmgKWlt3zkA6YsIQ5rAtif+zmU="},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQC1q5C8IZ0Go+U/ppBvMYnc2VeiU1xSoVgDH4vc6aXwkQAAACBR8r1/R40VwwEldoBBXgsfN5hanhBcqdGiA8JMgVz35g=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIQC1q5C8IZ0Go+U/ppBvMYnc2VeiU1xSoVgDH4vc6aXwkQAAACBR8r1/R40VwwEldoBBXgsfN5hanhBcqdGiA8JMgVz35g==","h":"hh8XxYwqCX3ZUqd3/K7fGDyGRtXN9E9PgzP+2aJtb0I="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"bePZSXLsTuXsx6lqtsxFjX/hChj4/1/E6frRS20+aOo=","y":"T9K/a5NTIAmIPZggJ7x1KchLxVBqUi94jOMGEkBDJtw="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBG3j2Uly7E7l7MeparbMRY1/4QoY+P9fxOn60UttPmjqT9K/a5NTIAmIPZggJ7x1KchLxVBqUi94jOMGEkBDJtw=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"ce49ce829a9ff41680b264b75a50c24fa415b8204089d885dc4ae83c4ce9e2ad"}},"userauth":["publickey","password","keyboard-interactive"]},"timestamp":"2018-10-22T00:42:02+03:00"}}} {"ip":"54.226.246.213","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"91fkogJkmfd/IdzpeNcBdw==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"4fqa+GmhU/wpO77yq8p7k/kWeqvhB7BY0qYVTz2Smlw=","length":256},"y":{"value":"XAsLOrRHVoufbElEj0ftOPuT2AGvEJMQO5adq+IIKXA=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQD2xLW2jUHifrlxFpfdliQIlA15qM5lFEf1BllY0NgbqAAAACASkXFXTQC1CEl/Osz3MVWxYx78/6iam5WG6fZD7Gxp5A=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIQD2xLW2jUHifrlxFpfdliQIlA15qM5lFEf1BllY0NgbqAAAACASkXFXTQC1CEl/Osz3MVWxYx78/6iam5WG6fZD7Gxp5A==","h":"EHIoRJeNJDDpXrOy8unTmyAIHqanHtu6A/nIfb0nY3Q="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"HoeqXvZNYYtTujXItOk3H1sxmSPl2Autuzduvlnl5RI=","y":"YmUNIubUrs9ZuYU6EDtjx/rUT2NdH/FIOgfjC6Wz7uA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBB6Hql72TWGLU7o1yLTpNx9bMZkj5dgLrbs3br5Z5eUSYmUNIubUrs9ZuYU6EDtjx/rUT2NdH/FIOgfjC6Wz7uA=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"8a83ecf7c09372d6aa6a1108b98491a58577dbede0796d476ce164754feeaa48"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T01:19:41+03:00"}}} {"ip":"85.245.105.159","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"2iI6hTvvSFO3o8TtmLGogg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"IqpiV+ZiLz26htioWSqhBZAeeWxrFCHFBMj8vDDX1qw=","length":256},"y":{"value":"cwgSugSNSFH+21rk6+pPtpN3E92MNegYIxqQgVFgXJA=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQCNq+2y6NaIcCkBy/wdSReFFd09bQx+6RSOFI5uNsYwNQAAACEAjbVM5XNJQmnPX8+48fOXu9voXgwhEZ5kKxfcyfpWPmY="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQCNq+2y6NaIcCkBy/wdSReFFd09bQx+6RSOFI5uNsYwNQAAACEAjbVM5XNJQmnPX8+48fOXu9voXgwhEZ5kKxfcyfpWPmY=","h":"FbCb69KNcNnwleP/+HLKwEsDMOyjw/wxWYu88ElhGJw="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"DyareNS6uDhmXQbxl8neht7L3Jey+m9I712hmeJcbcw=","y":"B7l0UaYM4UvmqOfL/3s38HrOFx6WNgP74uN/YFrx9HA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBA8mq3jUurg4Zl0G8ZfJ3obey9yXsvpvSO9doZniXG3MB7l0UaYM4UvmqOfL/3s38HrOFx6WNgP74uN/YFrx9HA=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"a851b6ae60adf5b3450cd2bbe10a44586ea71ceef0676e32ee38b5a6b0335395"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T02:20:29+03:00"}}} {"ip":"205.252.8.66","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.3","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"l0qHro1fYizQjSHRRpmu2A==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"NkZwMsBuUgGlORXdBJnx9OgKDoOpXLFEpS1019nZd/U=","length":256},"y":{"value":"3cpjNB0vjFl+HM9a/e1Qey7v0opG8fI4GRrZpyI4yrQ=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIFhJa+RaYpA/1AK5TBX9YjK5W1f2Hdd6Wc0J0RMb5KNhAAAAIQCKn25cDLpgGG1/b+PUxvsoapfiED+qoclKQKJ4SHaDjw=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIFhJa+RaYpA/1AK5TBX9YjK5W1f2Hdd6Wc0J0RMb5KNhAAAAIQCKn25cDLpgGG1/b+PUxvsoapfiED+qoclKQKJ4SHaDjw==","h":"gjxIR18yKlI8PC/7OzBGCzNfoSnq2fnDbdv3V0cuF20="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"zB4QAMLbFEUWxOWmC3jRb8p/YZu4bo6q4BW800rR67w=","y":"P20tTyZW8P35h2VtcUfBh/ymsuTAn1NGWda31p56JsA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMweEADC2xRFFsTlpgt40W/Kf2GbuG6OquAVvNNK0eu8P20tTyZW8P35h2VtcUfBh/ymsuTAn1NGWda31p56JsA=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"c894301b68163f3a44fc4cc8ce4aadc866d80f8b0fd44ec09d13acfae23cfe57"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T02:22:12+03:00"}}} {"ip":"185.11.3.15","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 16.3.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"EsZEcUfoms88aC236oedLQ==","kex_algorithms":["curve25519-sha256@libssh.org","ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256","ssh-ed25519"],"client_to_server_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["chacha20-poly1305@openssh.com","aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-ripemd160-etm@openssh.com","umac-128@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-ripemd160","hmac-md5"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"curve25519-sha256@libssh.org","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"curve25519_sha256_params":{"server_public":"2SksfDyheWAZOrKpd0XPx1+C0PtNG5y+SUYlenZ1UHs="},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQDapb28C31O/5Z3VLzgW3hBCKEzAUKdo94ZN0OcN53NDQAAACEA1kpn0m8foKGk9zM7XD4h8dfoacB4Ho6RqfqR2EIp5lA="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQDapb28C31O/5Z3VLzgW3hBCKEzAUKdo94ZN0OcN53NDQAAACEA1kpn0m8foKGk9zM7XD4h8dfoacB4Ho6RqfqR2EIp5lA=","h":"4oWbVNGQidl8GKq8KV+TxR+2CsCjhFi+O7yXkq+sEL4="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"paBNxFujwrMCiE0fX4H40rZSIrvamU/DzBo3a+DJXp4=","y":"+0UWgdSO+mfWvK6qFo6tNMsRrfYMymZzbDjwlw8Isfs="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBKWgTcRbo8KzAohNH1+B+NK2UiK72plPw8waN2vgyV6e+0UWgdSO+mfWvK6qFo6tNMsRrfYMymZzbDjwlw8Isfs=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"026f5dce123021b53b98c85c0a56297f1af0e3d36ce20a9ce4880f8d76c16570"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T03:46:30+03:00"}}} {"ip":"205.252.8.72","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.2","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"55KKkaAZRbT5cjmAVU5H3g==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"wGLmnUTdDkW/slruS/EqdmdqZJpcW5nv/1AlQKE8YZM=","length":256},"y":{"value":"XmT16+WjTftfXankU3nXigSenQaKnl9QaqtipIkOFFg=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIF2gHT+Fnkp20Q8OAdn5H7T9zGDWaKXsAIZelzbM6DCDAAAAIDkjXAAbqdhYsTEdPJ1z2s0Gz/kLOjIOl1C0ioUkzUeX"},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABIAAAAIF2gHT+Fnkp20Q8OAdn5H7T9zGDWaKXsAIZelzbM6DCDAAAAIDkjXAAbqdhYsTEdPJ1z2s0Gz/kLOjIOl1C0ioUkzUeX","h":"vrw9qzDrwq0QZcroSthWQM4TPUQiCiqD8ztoj+jnrUU="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"BMAQ7pv+DlqbcBmZfs2JKi2iFCdI13apVK2RUMvpeAw=","y":"giwS6FHwlCofm6MVeC+35gZdd4u72ObydYGAzVqATaI="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBATAEO6b/g5am3AZmX7NiSotohQnSNd2qVStkVDL6XgMgiwS6FHwlCofm6MVeC+35gZdd4u72ObydYGAzVqATaI=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"519f5285490550d113fa8849ffee603738140f71e65d9f18362eb84d2e71d4bd"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T04:37:06+03:00"}}} {"ip":"195.166.122.130","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.4","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"m0gfNL6VnswWM1tX/mebLg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"LzmrJZOSkz/fRSht0xDyrDyyhaazJpMWEfDOoCZkrj0=","length":256},"y":{"value":"mBVWuuTXd0Wex9DP6spp1d/Z4U5tVLj0+QSM74LANDg=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQDmVxkfOVEvxDgrr+1lpowAaP/oLEwhgHOpvmDHzx/eXgAAACEAi/HZ9nW5tMzt7CYNcGnPcrr4l9WP4S3Pdy0zhhwGxPE="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQDmVxkfOVEvxDgrr+1lpowAaP/oLEwhgHOpvmDHzx/eXgAAACEAi/HZ9nW5tMzt7CYNcGnPcrr4l9WP4S3Pdy0zhhwGxPE=","h":"amm2UbppXcvX9wUoiEBNz6XJlzofklw8vTPZl+ImiWo="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"POLjnVdNiahpgafHksUGhB7VX1vrjEaPN/FKc2Iddoo=","y":"6wsC4h5sk+nqh6chgsznL0ZXBsKwsYcVl77Uc3tEoQM="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBDzi451XTYmoaYGnx5LFBoQe1V9b64xGjzfxSnNiHXaK6wsC4h5sk+nqh6chgsznL0ZXBsKwsYcVl77Uc3tEoQM=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"4d883498466f34c562b0e3e617cf4abbae74e88bf2df504f80f4f50b4987bfbe"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T04:39:01+03:00"}}} {"ip":"195.151.17.35","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.3.1","server_id":{"raw":"SSH-2.0-OpenSSH_7.6","version":"2.0","software":"OpenSSH_7.6"},"server_key_exchange":{"cookie":"yBExcNvFhSfWhAi1wXS2vA==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com"],"server_to_client_compression":["none","zlib@openssh.com"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"V2WDSHnv6U781Zta23+Ab/Q0X76O9OfUZ2pMyMeahaA=","length":256},"y":{"value":"bDcseWOteOzIfHWvwPfv1mNe2Q/gbK3d3fNIoGvDG0c=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQD/wrCjC1wcJPN6G7smARFFoN3b1ugCAfuaXWB8dLIdBgAAACBIeQoQUVP1rf0j0CQdL/jsKAdDtIKQD4qJh+KPOJn9hw=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAIQD/wrCjC1wcJPN6G7smARFFoN3b1ugCAfuaXWB8dLIdBgAAACBIeQoQUVP1rf0j0CQdL/jsKAdDtIKQD4qJh+KPOJn9hw==","h":"ftRJ9Zy1sDXzEfVoIc4Am7BWtR8gmeuM2ezeMvMPWtA="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"vTg1891rUwfuDfdfllmO+0HHPCuLiBYLBHep92z2RJ4=","y":"VuBXHqztkdp9hESyhOn36XDdnRDYvaFypSoUIvz0HAg="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBL04NfPda1MH7g33X5ZZjvtBxzwri4gWCwR3qfds9kSeVuBXHqztkdp9hESyhOn36XDdnRDYvaFypSoUIvz0HAg=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"b969e5401bddeabe80633791a2f1bdc5b869e8500b311f4b0de5780af5eb16dd"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T05:39:24+03:00"}}} {"ip":"185.102.148.177","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 17.2.4","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"pk82gwMIP/SflYiTyfpaFg==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"7vnzJNY4HvzRfsSM1UaKD4fPx+uchffNB4J3D6L57Sk=","length":256},"y":{"value":"WzAkqvoX8zU1lQotxPRhF1pRcvYjm8uFdwjTGU9cQb0=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAICRBq5OFiZDEGp1u/JFoyt14mnOx9lrkt8SerUiwBk9WAAAAIQCS7Jrop57WDP8kkHe6XB9Pp6xwUq7GhFkNS9AWr7C96A=="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABJAAAAICRBq5OFiZDEGp1u/JFoyt14mnOx9lrkt8SerUiwBk9WAAAAIQCS7Jrop57WDP8kkHe6XB9Pp6xwUq7GhFkNS9AWr7C96A==","h":"Eh25ZNYmbpBZ8/CDfvN6hM8VyGmp2tvc3nbfWuuTMRY="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"VO1S6PCm2YtlvN5khFB254qy/y+BC7yKWGLdgDcnguU=","y":"DKjJkEJg/k+1G3gWUoXkPYAcJdk3ySRvFIpJoVuKlW8="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFTtUujwptmLZbzeZIRQdueKsv8vgQu8ilhi3YA3J4LlDKjJkEJg/k+1G3gWUoXkPYAcJdk3ySRvFIpJoVuKlW8=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"1444453e75cf09c3daaa3a644e82c9c394aa698d4d40fc9ccc77de015d22f8c2"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T05:42:12+03:00"}}} {"ip":"193.213.208.104","data":{"ssh":{"status":"success","protocol":"ssh","result":{"banner":"viptela 18.2.0","server_id":{"raw":"SSH-2.0-OpenSSH_7.3","version":"2.0","software":"OpenSSH_7.3"},"server_key_exchange":{"cookie":"k/lhzrznKUl7qYxxwofyNQ==","kex_algorithms":["ecdh-sha2-nistp256","ecdh-sha2-nistp384","ecdh-sha2-nistp521","diffie-hellman-group-exchange-sha256","diffie-hellman-group14-sha1","diffie-hellman-group-exchange-sha1"],"host_key_algorithms":["ssh-rsa","rsa-sha2-512","rsa-sha2-256","ecdsa-sha2-nistp256"],"client_to_server_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"server_to_client_ciphers":["aes128-ctr","aes192-ctr","aes256-ctr","aes128-gcm@openssh.com","aes256-gcm@openssh.com"],"client_to_server_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"server_to_client_macs":["hmac-sha2-256-etm@openssh.com","hmac-sha2-512-etm@openssh.com","hmac-sha2-256","hmac-sha2-512","hmac-sha1-96","hmac-sha1"],"client_to_server_compression":["none","zlib@openssh.com","zlib"],"server_to_client_compression":["none","zlib@openssh.com","zlib"],"first_kex_follows":false,"reserved":0},"algorithm_selection":{"dh_kex_algorithm":"ecdh-sha2-nistp256","host_key_algorithm":"ecdsa-sha2-nistp256","client_to_server_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"},"server_to_client_alg_group":{"cipher":"aes128-ctr","mac":"hmac-sha2-256","compression":"none"}},"key_exchange":{"ecdh_params":{"server_public":{"x":{"value":"4zTMKvIYnkUa8rpxL0m4rRIWzaznFMxff+de6pPMKWM=","length":256},"y":{"value":"dgEKzVf7W+geXpYqtbgcHikd0QRLGlLMaT61Ipbgthc=","length":256}}},"server_signature":{"parsed":{"algorithm":"ecdsa-sha2-nistp256","value":"AAAAIQCO31vESW4cLLQ2B+M4LkrcTvpVCMFpWd7InPsA7YjeKwAAACEAxGdyRmUyu+GQtqkSJS++myANqGzBA4JGM3rVw9NMsHM="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAABKAAAAIQCO31vESW4cLLQ2B+M4LkrcTvpVCMFpWd7InPsA7YjeKwAAACEAxGdyRmUyu+GQtqkSJS++myANqGzBA4JGM3rVw9NMsHM=","h":"ztazrQeKI0ykk7930ISftWNkKkzk5igPcMrLkan34cM="},"server_host_key":{"ecdsa_public_key":{"b":"WsY12Ko6k+ez671VdpiGvGUdBrDMU7D2O848PifSYEs=","curve":"P-256","gx":"axfR8uEsQkf4vOblY6RA8ncDfYEt6zOg9KE5RdiYwpY=","gy":"T+NC4v4af5uO5+tKfA+eFivOM1drMV7Oy7ZAaDe/UfU=","length":256,"n":"/////wAAAAD//////////7zm+q2nF56E87nKwvxjJVE=","p":"/////wAAAAEAAAAAAAAAAAAAAAD///////////////8=","x":"I2NMY+lf3191uK28AQuLkZ6ytU0Ssa+AK0lVRgIOxoU=","y":"p/yW9Sh6RWQl36pkw+OeUAKgfHE7a8ycr5Mr3+MGOXs="},"raw":"AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCNjTGPpX99fdbitvAELi5GesrVNErGvgCtJVUYCDsaFp/yW9Sh6RWQl36pkw+OeUAKgfHE7a8ycr5Mr3+MGOXs=","algorithm":"ecdsa-sha2-nistp256","fingerprint_sha256":"b55ba0b401059b5e83b9d2ca132e5a6f115351306f48098cd505ea124afe01c9"}},"userauth":["publickey","password"]},"timestamp":"2018-10-22T06:00:22+03:00"}}} ================================================ FILE: docs/census.md ================================================ # SD-WAN Internet Census ## Overview The most popular and known SD-WAN solutions are enumerated using search engines. ## Vendors - [VMWare NSX SD-WAN](#vmware-nsx-sd-wan) - [TELoIP VINO SD-WAN](#teloip-vino-sd-wan) - [Fatpipe SYMPHONY SD-WAN](#fatpipe-symphony-sd-wan) - [Cisco SD-WAN](#cisco-sd-wan) - [Versa Networks](#versa-networks) - [Riverbed SD-WAN](#riverbed-steelconnect) - [Citrix NetScaler SD-WAN](#citrix-netscaler-sd-wan) - [Silver Peak SD-WAN](#silver-peak) - [CloudGenix SD-WAN](#cloudgenix-sd-wan) - [Ecessa WANworX SD-WAN](#ecessa-wanworx-sd-wan) - [Nuage Networks SD-WAN (VNS)](#nuage-networks-sd-wan-vns) - [Juniper Networks Contrail SD-WAN](#juniper-networks-contrail-sd-wan) - [Talari SD-WAN](#talari-sd-wan) - [Aryaka SD-WAN](#aryaka-sd-wan) - [InfoVista SD-WAN](#infovista-sd-wan) - [Huawei SD-WAN](#huawei-sd-wan) - [Sonus SD-WAN](#sonus-sd-wan) - [Arista Networks EOS](#arista-networks-eos) - [128 Technology](#128-technology) - [Glue Networks](#glue-networks) - [Barracuda Networks](#barracuda-networks) - [Viprinet](#viprinet) - [Cradlepoint](#cradlepoint) - [Fortinet](#fortinet) - [Brain4Net](#brain4net) - [FlexiWAN](#flexiwan) - [OpenDaylight](#opendaylight) - [Tallac Networks](#tallac-networks) - [Cato Networks](#cato-networks) - [SimpleWAN](#simplewan) - [Brocade Communications Systems](#brocade-communications-systems) - [Ubiquiti Networks](#ubiquiti-networks) - [Masergy](#masergy) ## VMWare NSX SD-WAN Confidence: Certain ### Google * intitle:"Welcome to VeloCloud Page" * "2013-2017 VeloCloud Networks" ### Shodan * title:"VeloCloud" * title:"VeloCloud Orchestrator" * http.html_hash:1218757368 * http.favicon.hash:-2062596654 title:"301 Moved Permanently" ### Censys * 80.http.get.body:"VeloCloud Network Orchestrator" * 80.http.get.body_sha256:ebaa382148c391357fa0976ccb8cf947a035e8be642190a4c9dff2c8a6ce1a0a ## TELoIP VINO SD-WAN Confidence: Certain ### Google * intitle:"Teloip Orchestrator API" * "The following operations are supported. For a formal definition, please review the Service XSD." ### Shodan * title:"Teloip Orchestrator API" ### Censys * 80.http.get.body: "The following operations are supported. For a formal definition, please review the Service XSD." AND "Teloip Orchestrator API" ## Fatpipe SYMPHONY SD-WAN Confidence: Certain ### Google * inurl:/fpui/jsp/login.jsp * intitle:"FatPipe WARP" "Log in" ### Shodan * Linux Fatpipe * title:"Fatpipe WARP" port:443 ### Censys * 80.http.get.title:"FatPipe WARP" * 80.http.get.body_sha256: 81a46930a7041737c0c2b94299c14672e192ae4555fccd88cbc369755e84edc7 ## Cisco SD-WAN Confidence: Certain ### Google * intitle:"Cisco vManage" * intitle:"Viptela vManage" ### Shodan * title:"Viptela vManage" * title:"Cisco vManage" * title:vManage * http.favicon.hash:-904700687 * ssl:"O=Viptela Inc" ### Censys * 80.http.get.title: "Viptela vManage" * 80.http.get.title: "Cisco vManage" * 80.http.get.body_sha256: 63575152efde5bec3ab2a28a502f7a15de7146e2b0fdce47ab0bb699676fb66f * (443.https.tls.certificate.parsed.fingerprint_sha256: "ad4c8962d687837c54a3430e869aadfc359db7fd07d9b0630ec2f355aa7b896a" AND 443.https.tls.certificate.parsed.issuer.common_name: "vmanage") AND protocols.raw: "443/https" ## Versa Networks Confidence: Certain ### Versa Analytics #### Shodan * versa-analytics port:161 * "van_analytics" port:9160 * ssl:"versa-analytics" * "server:Versa-Analytics-Server" #### Censys * 443.https.tls.certificate.parsed.issuer.common_name:"versa-analytics" ### Versa Flex VNF #### Google * intitle:"Flex VNF Web-UI" #### Shodan * title:"Flex VNF Web-UI" #### Censys * 80.http.get.body_sha256: 1d10f43efe5e0da430042178c7c8040d011bd5461279c5006ddabf867aae96cf * 80.http.get.title: "Flex VNF Web-UI" ### Versa Director #### Google * inurl:"versa/app/login" * intitle:"Versa Director Login" * "2016 Versa Networks" "All Rights Reserved" * "2017 Versa Networks" "All Rights Reserved" #### Shodan * "server: Versa Director" * ssl:"VersaDirector" * ssl:"versa-director" #### Censys * 80.http.get.body_sha256:867f6fead63c8809f208c735b87101c85629e404c762631f4ee47f95c07b6184 * 443.https.tls.certificate.parsed.subject_dn:"C=US, ST=California, O=versa-networks, OU=VersaDirector, CN=Director01" ## Riverbed Confidence: Certain ### Riverbed SteelConnect ### Google * intitle:"SteelConnect Manager" ### Shodan * title:"SteelConnect Manager" * title:"Riverbed AWS Appliance" ### Censys * 80.http.get.title:"Riverbed AWS Appliance" ### Riverbed SteelHead ### Google * "Riverbed SteelHead" "Your browser may not be compatible." ### Shodan * ssl:Riverbed Apache * http.favicon.hash:-1338133217 * title:"amnesiac Sign in" ### Censys * 80.http.get.body:"Riverbed SteelHead" * "This SteelHead WAN optimization appliance is centrally managed as part of the AWS automation features within Riverbed SteelConnect." ## Citrix NetScaler SD-WAN Confidence: Certain ### Citrix NetScaler SD-WAN VPX ### Google * intitle:"Citrix NetScaler SD-WAN - Login" ### Shodan * http.favicon.hash:-1272756243 title:"Citrix NetScaler SD-WAN - Login" * title:"DC | Login" and ssl:"Citrix" ### Censys * 443.https.tls.certificate.parsed.fingerprint_sha256:8199d53cf2832a133344559b09987b1d4830e643497f5f01d3178beb379ee7a5 ### Citrix NetScaler SD-WAN Center #### Google * intitle:"SD-WAN Center | Login" -site:*.citrix.com #### Shodan * http.favicon.hash:-1272756243 title:"SD-WAN Center*Login" * VWCSession ### Censys * 80.http.get.title:"SD-WAN Center" * 443.https.tls.certificate.parsed.names:mycitrixdemo.net AND `"NetScaler"` ## Silver Peak Confidence: Certain ### Silver Peak Unity Orchestrator ### Google * "Welcome to Unity Orchestrator" ### Shodan * gmsSessionID * SSL:"Silverpeak GMS" ### Censys * 443.https.tls.certificate.parsed.subject.common_name: "Silverpeak GMS" ### Silver Peak Unity EdgeConnect ### Google * "Silver Peak Appliance Management Console" ### Shodan * vxoaSessionID * ssl:"silver-peak" ### Censys * 80.http.get.body: "By using this product, you agree to be bound by the terms of Silver Peak Systems Inc. " AND 443.https.tls.certificate.parsed.issuer.common_name: "silver-peak" ## CloudGenix SD-WAN Confidence: Firm ### Shodan * ssl:"O=CloudGenix Inc" ### Censys * 443.https.tls.chain.parsed.issuer.organization:"CloudGenix Inc" ## Ecessa WANworX SD-WAN Confidence: Tentative ### Google * inurl:"/cgi-bin/pl_web.cgi/login1" ### Shodan * http.html_hash:-1848258522 title:"Ecessa" ### Censys * 80.http.get.body_sha256:7b9091bf0d0e65b6bcefa62a81dacc1d30fdf5344aa1d022865822a623aac987 ## Nuage Networks SD-WAN (VNS) Confidence: Certain ### Shodan * title:"SD-WAN*Portal" * http.favicon.hash:1069145589 * http.favicon.hash:1069145589 title:"SD-WAN*Portal" * http.favicon.hash:1069145589 title:"Architect" * http.favicon.hash:1069145589 title:"VNS portal" ### Censys * 80.http.get.title:"SD-WAN Portal" * 80.http.get.body_sha256:c0485f458c574e884168ba9fa07baf16ce86b761ac4dbf81dab9c0f87ed94ed2 ## Juniper Networks Contrail SD-WAN Confidence: Tentative ### Shodan * title:"Log In - Juniper Networks Web Management" * "Juniper Networks, Inc." junos srx ## Talari SD-WAN Confidence: Certain ### Google * inurl: "/cgi-bin/login.cgi" ### Shodan * ssl:"emailAddress=support@talari.com" * http.favicon.hash:269992656 ### Censys * 80.http.get.title:("AWS" AND "Login") * 443.https.tls.certificate.parsed.issuer_dn:"C=US, ST=California, L=San Jose, O=Talari Networks, Inc., OU=Engineering, CN=Talari, emailAddress=support@talari.com" * 443.https.tls.certificate.parsed.subject_key_info.fingerprint_sha256: f52b521dc30c3be76b9458f211eafd89fe63519678ff085f1c5c5cd7279a755d * 80.http.get.body: "© 2017 Talari Networks" ## Aryaka SD-WAN Confidence: Certain ### Aryaka Network Access Point #### Google * intitle:"Aryaka, Welcome" #### Shodan * title:"Aryaka" * "Aryaka Networks" * http.favicon.hash:-1423557501 * title:"Aryaka, Welcome" #### Censys * 443.https.tls.certificate.parsed.subject.organization:"Aryaka Networks, Inc." ## InfoVista SD-WAN Confidence: Certain ### InfoVista SALSA #### Google * inurl:"/salsa/salsa_portal/" #### Shodan * ssl:"SALSA Portal" * "Server: Apache"+title:"SALSA"*"Login" port:443 * title:"SALSA Login" #### Censys * 80.http.get.title: ("SALSA" AND "Login") * 443.https.tls.certificate.parsed.subject.organization: "Ipanema Technologies" * 80.http.get.body_sha256:0cb459544a3772af457d2538c8de21c3e287e1920b4cc3f472fcd7a85d0acb14 ## Huawei SD-WAN Confidence: Certain ### Shodan * title:"Agile Controller" ### Censys * 80.http.get.title:"agile controller" * 80.http.get.body_sha256:07f90f2912ebcf26b4b372a79e7ac91a2ff5f426e9aabc6b81b30298e18f47f6 ## Sonus SD-WAN Confidence: Certain ### Sonus SBC Management Application #### Shodan * title:"SBC Management Application" ### Sonus SBC Edge #### Shodan * title:"Sonus SBC Edge Web Interface" #### Censys * 80.http.get.title: "Sonus SBC Edge Web Interface" ## Arista Networks Confidence: Certain ### Arista Networks EOS #### Shodan * "Arista Networks EOS" ## 128 Technology Confidence: Tentative ### 128 Technology Networking Platform #### Shodan * http.title:"128T Networking Platform" * http.favicon.hash:-1556425248 #### Censys * 80.http.get.title: "128T Networking Platform" ## Glue Networks Confidence: Certain ### Gluware Control #### Shodan * title:"Gluware Control" #### Censys * 80.http.get.title: "Gluware Control" ## Barracuda Networks Confidence: Certain ### Barracuda CloudGen Firewall #### Shodan * ssl:"Barracuda CloudGen Firewall" port:"443" * "Barracuda CloudGen Firewall" #### Censys * "Barracuda Cloudgen Firewall" ## Viprinet Confidence: Certain ### Viprinet Virtual VPN Hub #### Shodan * Server: "Viprinet" * Server: "ViprinetHubReplacement" * title:"Viprinet - AdminDesk - Login" * http.favicon.hash:-1352019987 * ssl: "Viprinet" port:"161" #### Censys * 80.http.get.headers.server:Viprinet * 80.http.get.headers.server:ViprinetHubReplacement * 80.http.get.title:"Viprinet - AdminDesk - Login" * 80.http.get.body_sha256:1755d863bd2fbab47c2476af102bb42e8ae58f49927af6844b57258e5aa8fe8e ### Viprinet Traffic Tools #### Shodan * title:"Viprinet traffic tools" #### Censys * 80.http.get.title:"Viprinet traffic tools" ## Cradlepoint Confidence: Certain ### Cradlepoint SD-WAN #### Shodan * title:"Login :: CR4250" * title:"Login :: AER2200" #### Censys * 80.http.get.title: "Login :: AER2200-600M" * 80.http.get.title: "Login :: CR4250-PoE" ## Fortinet Confidence: Certain ### Fortinet FortiGate #### Shodan * http.favicon.hash:945408572 http.title:"302*" port:8008 * ssl:"OU=FortiGate" ssl:"O=Fortinet" ssl:CN=FGT #### Censys * (443.https.tls.certificate.parsed.subject.organization: Fortinet) AND (443.https.tls.certificate.parsed.subject.common_name: FGT-*) ## Brain4Net Confidence: Certain ### Brain4Net #### Shodan * title:"B4N ORC" #### Censys * 80.http.get.title: "B4N ORC" ## FlexiWAN Confidence: Certain ### FlexiWAN Management #### Shodan * http.html:"flexiwan" * http.title:"FlexiWAN Management" #### Censys * 443.https.get.body: "flexiwan" * 443.https.get.title: "FlexiWAN Management" ## OpenDaylight Confidence: Certain ### OpenDaylight SDN Controller #### Shodan * http.title:"OpenDaylight - Login" #### Censys * 8080.http.get.title: "OpenDaylight - Login" ## Tallac Networks Confidence: Certain ### Tallac SDN Activity Manager #### Shodan * http.title:"SDN Activity Manager" #### Censys * 443.https.get.title: "SDN Activity Manager" ## Cato Networks Confidence: Firm ### Cato Networks Edge SD-WAN (Cato Networks Socket) #### Shodan * http.title:"Cato Networks" * http.title:"Cato Networks Socket" #### Censys * 443.https.get.title: "Cato Networks" * 443.https.get.title: "Cato Networks Socket" ## SimpleWAN Confidence: Certain ### SimpleWAN SD-WAN 2.0 #### Shodan * http.title:"SimpleWAN Dashboard" * http.favicon.hash:-517891188 #### Censys * 443.https.get.title: "SimpleWAN Dashboard" ## Brocade Communications Systems Confidence: Certain ### Brocade Services Director #### Shodan * http.favicon.hash:12809338 #### Censys * 443.https.get.body: "Brocade Communications Systems, Inc. All rights reserved." ## Ubiquiti Networks Confidence: Firm ### Unifi SDN Controller #### Shodan * http.title:"UniFi SDN" #### Censys * 443.https.get.title: "UniFi SDN" ## Masergy Confidence: Firm ### Masergy Managed SD‑WAN #### Shodan * http.favicon.hash:-1188037111 ================================================ FILE: docs/leakage.md ================================================ # SD-WAN Version Leakage ## Overview The most popular and known SD-WAN products leaking software versions are enumerated using search engines. ## Vendors - [VMWare NSX SD-WAN](#vmware-nsx-sd-wan) - [TELoIP VINO SD-WAN](#teloip-vino-sd-wan) - [Fatpipe SYMPHONY SD-WAN](#fatpipe-symphony-sd-wan) - [Cisco Viptela SD-WAN](#cisco-viptela-sd-wan) - [Versa Networks](#versa-networks) - [Riverbed SD-WAN](#riverbed-sd-wan) - [Citrix NetScaler SD-WAN](#citrix-netscaler-sd-wan) - [Silver Peak SD-WAN](#silver-peak-sd-wan) - [Talari SD-WAN](#talari-sd-wan) - [Sonus SD-WAN](#sonus-sd-wan) - [Arista Networks EOS](#arista-networks-eos) - [Glue Networks](#glue-networks) - [Cradlepoint](#cradlepoint) - [Brain4Net](#brain4net) - [Fortinet](#fortinet) ## VMWare NSX SD-WAN ### VeloCloud Network Orchestrator Dislosure: UI info Source: HTTP response Example: ``` ``` ## TELoIP VINO SD-WAN ### Teloip Orchestrator API Dislosure: API version Source: HTML Example: ``` {"usage":"append '?debug=requestinfo' to any querystring. Optional params: virtualPathCount", "host":"_v5.02_Teloip Orchestrator API","hostType":"SelfHost (AppHostBase)",...} ``` ## Fatpipe SYMPHONY SD-WAN ### WARP Dislosure: product version Source: HTML Example: ```