<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE sshd encryption-algorithm choices &amp;amp; OpenSSH in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5214930#M592666</link>
    <description>&lt;P&gt;It's good to get one's head around these things, because it's not obvious at first glance.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 25 Oct 2024 06:52:49 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-10-25T06:52:49Z</dc:date>
    <item>
      <title>Cisco ISE sshd encryption-algorithm choices &amp; OpenSSH</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5212855#M592567</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-4/cli_guide/b_ise_CLI_Reference_Guide_34/b_ise_CLIReferenceGuide_chapter_011.html" target="_self"&gt;In the following Cisco ISE guide&lt;/A&gt; it is stated the four encryption-algorithm options supported for the sshd service are: aes128-cbc, aes256-cbc, aes128-ctr, aes128-ctr. However, I read somewhere Cisco ISE's ssh functionality is based on the OpenSSH library. Current OpenSSH versions offer &lt;A href="https://man.openbsd.org/ssh_config#Ciphers" target="_self"&gt;more than those four choices&lt;/A&gt;:&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;OpenSSH: the supported ciphers are&lt;/P&gt;&lt;DIV class=""&gt;&lt;PRE&gt;3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com&lt;/PRE&gt;&lt;/DIV&gt;&lt;P class=""&gt;OpenSSH: the default is&lt;/P&gt;&lt;DIV class=""&gt;&lt;PRE&gt;chacha20-poly1305@openssh.com,
aes128-ctr,aes192-ctr,aes256-ctr,
aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;/PRE&gt;&lt;/DIV&gt;&lt;P&gt;I wonder if any of the&amp;nbsp;@openssh.com choices would be able to be used for Cisco ISE as well, on its current state.&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 10:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5212855#M592567</guid>
      <dc:creator>dynaB</dc:creator>
      <dc:date>2024-10-22T10:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE sshd encryption-algorithm choices &amp; OpenSSH</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5212883#M592569</link>
      <description>&lt;P&gt;As of version 3.3 the algorithms shown in this link seem to be the only ones supported:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-3/cli_guide/b_ise_CLI_Reference_Guide_33/b_ise_CLIReferenceGuide_33_chapter_011.html#wp1664237597" target="_blank"&gt;Cisco Identity Services Engine CLI Reference Guide, Release 3.3 - Cisco ISE CLI Commands in Configuration Mode [Cisco Identity Services Engine] - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I'm not sure though if TAC team via ISE root shell could enable more algorithms or not. I think it's worth check with TAC about this.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 11:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5212883#M592569</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-10-22T11:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE sshd encryption-algorithm choices &amp; OpenSSH</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5213208#M592588</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1803414"&gt;@dynaB&lt;/a&gt;&amp;nbsp;may I ask why you're looking for additional SSH encryption algorithms in ISE?&amp;nbsp; Is there an issue with the ones that we have available? I haven't studied the pros and cons of all of these - just curious.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 00:41:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5213208#M592588</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-23T00:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE sshd encryption-algorithm choices &amp; OpenSSH</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5214358#M592626</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/82347"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;So far there shouldn't be a problem with the encryption algorithms using CTR since it goes accompanied with authentication via a MAC, and CBC is still supported to this day even if not as a default in some libraries (openssh, for example) due to other options (CTR in this case) being considered more secure. These two options also seem more widespread than GCM.&lt;/P&gt;&lt;P&gt;However, supporting GCM as well could be an attractive option. Without trying to sound too preachy, it is a form of authenticated encryption - it encrypts via using a variant of CTR, while having a built-in integrity check, thus forgoing the need for a MAC found in the current options. Overall, GCM is considered a faster (due to integrating authentication within the encryption process rather than separated) and safer option to implement (it is only one implementation rather than two; less concern is raised with making encryption side and authentication side compatible with each other).&lt;/P&gt;&lt;P&gt;An aspect to consider is that current SSH options for GCM (and Chacha20Poly1305, offering a similar functionality) &lt;A href="https://security.stackexchange.com/questions/231092/openssh-meaning-of-cipher-with-email-address-openssh-com" target="_self"&gt;are defined by openssh itself, based on RFC 5647 (SSH follows its corresponding IETF RFCs as standard)&lt;/A&gt;. Hence why they are accompanied with the&amp;nbsp;@openssh.com tag. This in principle shouldn't be a problem since the differing factor from the standard is a matter of functionality within OpenSSH, fixing an existing issue.&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 11:02:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5214358#M592626</guid>
      <dc:creator>dynaB</dc:creator>
      <dc:date>2024-10-24T11:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE sshd encryption-algorithm choices &amp; OpenSSH</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5214930#M592666</link>
      <description>&lt;P&gt;It's good to get one's head around these things, because it's not obvious at first glance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 06:52:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-sshd-encryption-algorithm-choices-amp-openssh/m-p/5214930#M592666</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-10-25T06:52:49Z</dc:date>
    </item>
  </channel>
</rss>

