Configures SSH to require protocol version 2 only by setting the Protocol parameter in sshd_config
This Automox Worklet™ configures OpenSSH to use only SSH protocol version 2 by setting Protocol 2 in /etc/ssh/sshd_config. SSH version 1 was deprecated due to design flaws and cryptographic weaknesses, but some systems may still have it enabled for legacy compatibility.
The Worklet searches for an existing Protocol setting and updates it, or appends the setting if not present. Modern OpenSSH versions default to protocol 2, but explicit configuration satisfies security audits and prevents accidental re-enablement of version 1.
SSH protocol version 1 has fundamental security flaws. It uses CRC32 for integrity checking, which is not cryptographically secure. It is vulnerable to man-in-the-middle attacks, session hijacking, and insertion attacks. These weaknesses have been known for decades.
SSH protocol version 2 addresses all these issues with proper HMAC integrity checking, stronger key exchange algorithms, and better session security. There is no legitimate reason to use version 1 on modern systems.
Compliance frameworks and security benchmarks require SSH version 2. Vulnerability scanners flag any system that accepts version 1 connections. This Worklet helps you demonstrate compliance and eliminate an unnecessary attack vector.
Evaluation phase: Always triggers remediation (exit 1) to apply the configuration. This is a run-once hardening action.
Remediation phase: Uses grep and sed to find and update any existing Protocol line to Protocol 2. If no existing line is found, appends Protocol 2 to /etc/ssh/sshd_config. An optional sshd restart is available by uncommenting the service restart line.
Linux endpoints with OpenSSH server installed
Root privileges for the Automox agent
To apply immediately, uncomment the service sshd restart line in remediation script
Verify no legacy applications require SSH version 1
After remediation and sshd restart, the server only accepts SSH version 2 connections. Note that the Protocol setting was deprecated and removed in OpenSSH 7.6 because version 1 support was completely removed. On these newer versions, the setting has no effect but is harmless.
For older OpenSSH versions, verify the setting with sshd -T | grep protocol or by checking /etc/ssh/sshd_config directly. Clients attempting to connect with version 1 will receive connection errors. All modern SSH clients default to version 2 and will connect without issues.
Run this Worklet on a pilot Linux endpoint and review evaluation output for set ssh to version 2.
Confirm Automox activity logs show successful completion and exit code 0.
Verify endpoint state using checks aligned to evaluation script logic, such as exit.
Validate remediation effects from script operations such as grep, exit, then rerun evaluation for compliance.
For technical validation, compare endpoint state to the Worklet evaluation logic and remediation flow for set ssh to version 2. This supports repeatable security workflows, faster change control review, and auditable compliance evidence.
Useful script references for this Worklet include evaluation operations such as exit and remediation operations such as grep, exit. Use these indicators to verify that endpoint changes match intended policy outcomes.


By submitting this form you agree to our Master Services Agreement and Privacy Policy.
Already have an account? Log in
Consider Worklets your easy button
A Worklet is an automation script, written in Bash or PowerShell, designed for seamless execution on endpoints – at scale – within the Automox platform. Worklet automation scripts perform configuration, remediation, and the installation or removal of applications and settings across Windows, macOS, and Linux.

AUTOMOX + WORKLETS™
Uncover new possibilities with simple, powerful automation.
By submitting this form you agree to our Master Services Agreement and Privacy Policy