<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to disable DH-14 group1 and SHA-1 from Cisco ISE sshd service? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4784359#M580127</link>
    <description>&lt;P&gt;When I ssh into my Cisco ISE 3.1 patch-5 appliance from my Ubuntu server 22.0.4-5 LTS, I get this:&lt;/P&gt;&lt;P&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group16-sha512,diffie-hellman-group14-sha256,&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;diffie-hellman-group14-sha1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;debug2: host key algorithms: ssh-rsa,rsa-sha2-256,rsa-sha2-512&lt;BR /&gt;debug2: ciphers ctos: aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes256-ctr&lt;BR /&gt;debug2: ciphers stoc: aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes256-ctr&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;debug2: MACs ctos: hmac-sha2-512,hmac-sha2-256,hmac-sha1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;debug2: MACs stoc: hmac-sha2-512,hmac-sha2-256,hmac-sha1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;/P&gt;&lt;P&gt;I would like to disable these weak security settings from the Cisco ISE because security folks require us to do so.&amp;nbsp; I can do this easily on Linux server by modifying the /etc/ssh/sshd_config but since the Cisco ISE is a black box, how do I go about doing it?&lt;/P&gt;&lt;P&gt;CiscoISE/admin(config)# service sshd ?&lt;BR /&gt;enable Enable sshd service&lt;BR /&gt;encryption-algorithm Configure SSH encryption algorithms. supported algorithms are a&lt;BR /&gt;encryption-mode Configure SSH encryption mode on system. Supported modes are cb&lt;BR /&gt;key-exchange-algorithm Specify allowable key exchange algorithms for sshd service&lt;BR /&gt;loglevel Log level of messages from sshd to secure system log&lt;/P&gt;&lt;P&gt;CiscoISE/admin(config)# service sshd&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
    <pubDate>Tue, 28 Feb 2023 19:44:26 GMT</pubDate>
    <dc:creator>adamscottmaster2013</dc:creator>
    <dc:date>2023-02-28T19:44:26Z</dc:date>
    <item>
      <title>How to disable DH-14 group1 and SHA-1 from Cisco ISE sshd service?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4784359#M580127</link>
      <description>&lt;P&gt;When I ssh into my Cisco ISE 3.1 patch-5 appliance from my Ubuntu server 22.0.4-5 LTS, I get this:&lt;/P&gt;&lt;P&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group16-sha512,diffie-hellman-group14-sha256,&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;diffie-hellman-group14-sha1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;debug2: host key algorithms: ssh-rsa,rsa-sha2-256,rsa-sha2-512&lt;BR /&gt;debug2: ciphers ctos: aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes256-ctr&lt;BR /&gt;debug2: ciphers stoc: aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes256-ctr&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;debug2: MACs ctos: hmac-sha2-512,hmac-sha2-256,hmac-sha1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;debug2: MACs stoc: hmac-sha2-512,hmac-sha2-256,hmac-sha1&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;/P&gt;&lt;P&gt;I would like to disable these weak security settings from the Cisco ISE because security folks require us to do so.&amp;nbsp; I can do this easily on Linux server by modifying the /etc/ssh/sshd_config but since the Cisco ISE is a black box, how do I go about doing it?&lt;/P&gt;&lt;P&gt;CiscoISE/admin(config)# service sshd ?&lt;BR /&gt;enable Enable sshd service&lt;BR /&gt;encryption-algorithm Configure SSH encryption algorithms. supported algorithms are a&lt;BR /&gt;encryption-mode Configure SSH encryption mode on system. Supported modes are cb&lt;BR /&gt;key-exchange-algorithm Specify allowable key exchange algorithms for sshd service&lt;BR /&gt;loglevel Log level of messages from sshd to secure system log&lt;/P&gt;&lt;P&gt;CiscoISE/admin(config)# service sshd&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 19:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4784359#M580127</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-02-28T19:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable DH-14 group1 and SHA-1 from Cisco ISE sshd service?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4784510#M580130</link>
      <description>&lt;P&gt;You can configure the sshd service to restrict the key exchange algorithm to the following options:&lt;/P&gt;
&lt;PRE&gt;ise31-1/admin(config)# service sshd key-exchange-algorithm ?&lt;BR /&gt;diffie-hellman-group14-sha1 Restrict key exchange algorithm to diffie-hellman-group14-sha1&lt;BR /&gt;ecdh-sha2-nistp256 Restrict key exchange algorithm to ecdh-sha2-nistp256&lt;BR /&gt;ecdh-sha2-nistp384 Restrict key exchange algorithm to ecdh-sha2-nistp384&lt;BR /&gt;ecdh-sha2-nistp521 Restrict key exchange algorithm to ecdh-sha2-nistp521&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is an enhancement bug filed to support &lt;SPAN class="subheader-large"&gt;diffie-hellman-group-exchange-sha256&lt;/SPAN&gt;, but this has not been applied to any currently shipping version of ISE at this time.&lt;BR /&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa33476" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa33476&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 21:33:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4784510#M580130</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-02-28T21:33:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable DH-14 group1 and SHA-1 from Cisco ISE sshd service?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4916172#M583852</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;:&amp;nbsp; This is what I currently have on the ISE 3.2 patch-2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;service sshd enable&lt;BR /&gt;service sshd encryption-algorithm aes256-ctr aes256-gcm-openssh.com&lt;BR /&gt;service sshd key-exchange-algorithm ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521&lt;BR /&gt;service sshd loglevel 4&lt;/P&gt;&lt;P&gt;However, whenever I ssh to the ISE from my ubuntu box with the verbose options, ssh -vvv &lt;A href="mailto:admin@cisco_ise_ip:" target="_blank"&gt;admin@cisco_ise_ip, I see this:&lt;/A&gt;&lt;/P&gt;&lt;P&gt;debug2: peer server KEXINIT proposal&lt;BR /&gt;debug2: KEX algorithms: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521&lt;BR /&gt;debug2: host key algorithms: ssh-rsa,rsa-sha2-256,rsa-sha2-512&lt;BR /&gt;debug2: ciphers ctos: aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes256-ctr&lt;BR /&gt;debug2: ciphers stoc: aes128-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes256-ctr&lt;BR /&gt;debug2: MACs ctos: hmac-sha2-512,hmac-sha2-256,hmac-sha1&lt;BR /&gt;debug2: MACs stoc: hmac-sha2-512,hmac-sha2-256,hmac-sha1&lt;BR /&gt;debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;debug2: compression stoc: none,zlib@openssh.com&lt;/P&gt;&lt;P&gt;seems like hmac-sha1 is still there and it is confirmed by Qualys scan.&amp;nbsp; How do I go about getting rid of that?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2023 13:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4916172#M583852</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-09-01T13:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable DH-14 group1 and SHA-1 from Cisco ISE sshd service?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4916228#M583855</link>
      <description>&lt;P&gt;Not possible with Cisco ISE:&amp;nbsp;&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvq64821" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvq64821&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2023 14:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-disable-dh-14-group1-and-sha-1-from-cisco-ise-sshd/m-p/4916228#M583855</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-09-01T14:57:45Z</dc:date>
    </item>
  </channel>
</rss>

