Why does runZero attempt to log in to SSH as _STATUS_?

Modified on Wed, Feb 28 at 11:07 AM

By default, the runZero Explorer will attempt to get information from SSH services by sending a user-defined username (_STATUS_ by default). This allows it to determine the SSH software being used via fingerprinting, and to record the encryption and signature methods supported and other useful information. The Explorer does not attempt to log in by providing a key or password; however, some firewall devices will flag the connection anyway.

One SSH connection will be made for each IP address the Explorer finds. This means that a firewall with many IP addresses may see many connections.

You can disable the SSH fingerprinting feature by setting the ssh-fingerprint value to false in Probes and SNMP settings of the scan configuration. If you do this you will lose the ssh.authMethodsssh.authPassword, and ssh.authPublicKey attributes. 


You will also lose the ssh.hostKey.* attributes which help detect duplicate SSH keys.

If you're still interested in getting the SSH information for other devices on the network, you could set the value of Excluded hosts in the scan configuration to the IP address of the firewall(s). A separate scan task can then be created for just the firewalls, and the two sets of data will be combined into your inventory.

Another option is to change the username to a custom value, and use that value to filter the events from any SIEM you are using.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article