<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hi debottym2 Check this in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ssh2-issues/m-p/3863875#M72629</link>
    <description>&lt;P&gt;Sorry for updating in this old thread.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just had this issue on a newly patched Catalyst 2960X, which was upgraded to 15.2(7)E.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our self-made application only supported DH key lengths of 1024, but this new IOS only supports 2048 or 4096.&lt;/P&gt;
&lt;P&gt;hostnam(config)#ip ssh dh min size ?&lt;BR /&gt;2048 Diffie Group 14 2048-bit key&lt;BR /&gt;4096 Diffie Group 16 4096-bit key&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here the debug output:&lt;/P&gt;
&lt;P&gt;May 28 13:55:59.615: SSH0: starting SSH control process&lt;BR /&gt;May 28 13:55:59.615: SSH0: sent protocol version id SSH-2.0-Cisco-1.25&lt;BR /&gt;May 28 13:55:59.615: SSH0: protocol version id is - SSH-2.0-Renci.SshNet.SshClient.0.0.1&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: kexinit sent: kex algo = diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: Server certificate trustpoint not found. Skipping hostkey algo = x509v3-ssh-rsa&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: kexinit sent: hostkey algo = ssh-rsa&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: kexinit sent: encryption algo = aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: kexinit sent: mac algo = hmac-sha1,hmac-sha1-96&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: send:packet of length 256 (length also includes padlen of 4)&lt;BR /&gt;May 28 13:55:59.618: SSH2 0: SSH2_MSG_KEXINIT sent&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: ssh_receive: 464 bytes received &lt;BR /&gt;May 28 13:55:59.622: SSH2 0: input: total packet length of 464 bytes&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: partial packet length(block size)8 bytes,needed 456 bytes,&lt;BR /&gt;maclen 0&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: input: padlength 14 bytes&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: SSH2_MSG_KEXINIT received&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: kex: client-&amp;gt;server enc:aes256-ctr mac:hmac-sha1 &lt;BR /&gt;May 28 13:55:59.622: SSH2 0: kex: server-&amp;gt;client enc:aes256-ctr mac:hmac-sha1 &lt;BR /&gt;May 28 13:55:59.622: SSH2 0: Using kex_algo = diffie-hellman-group-exchange-sha1&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: ssh_receive: 32 bytes received &lt;BR /&gt;May 28 13:55:59.622: SSH2 0: input: total packet length of 32 bytes&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: partial packet length(block size)8 bytes,needed 24 bytes,&lt;BR /&gt;maclen 0&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: input: padlength 14 bytes&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: SSH2_MSG_KEX_DH_GEX_REQUEST received&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: Range sent by client is - 1024 &amp;lt; 1024 &amp;lt; 1024 &lt;BR /&gt;May 28 13:55:59: %SSH-3-DH_RANGE_FAIL: Client DH key range mismatch with minimum configured DH key on server&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: send:packet of length 104 (length also includes padlen of 7)&lt;BR /&gt;May 28 13:55:59.727: SSH0: Session disconnected - error 0x00&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We fixed it by upgrading our SSH client to a (much) more recent version in our application.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 May 2019 14:32:35 GMT</pubDate>
    <dc:creator>patoberli</dc:creator>
    <dc:date>2019-05-28T14:32:35Z</dc:date>
    <item>
      <title>SSH2 issues</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh2-issues/m-p/2542288#M72627</link>
      <description>&lt;P&gt;Any idea how to resolve this? I can't seem to ssh into the router, and consoling in yields the following error message.&lt;/P&gt;&lt;P&gt;Running cat4500e-entservicesk9-mz.151-1.SG.bin on a 4948.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*Dec 31 17:32:39 PST: SSH2 0: input: padlength 6 bytes&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2 0: SSH2_MSG_KEXINIT received&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2:kex: client-&amp;gt;server enc:aes128-cbc mac:hmac-sha1&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2:kex: server-&amp;gt;client enc:aes128-cbc mac:hmac-sha1&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2 0: ssh_receive: 24 bytes received&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2 0: input: total packet length of 24 bytes&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2 0: partial packet length(block size)8 bytes,needed 16 bytes,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; maclen 0&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2 0: input: padlength 6 bytes&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2 0: SSH2_MSG_KEX_DH_GEX_REQUEST received&lt;BR /&gt;*Dec 31 17:32:39 PST: SSH2 0: Range sent by client is - 1024 &amp;lt; 7680 &amp;lt; 8192&lt;BR /&gt;*Dec 31 17:32:39 PST: %SSH-3-DH_RANGE_FAIL: Client DH key range mismatch with maximum configured DH key on server&lt;BR /&gt;*Dec 31 17:32:40 PST: SSH0: Session disconnected - error 0x00&lt;BR /&gt;fr01.ash2#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:06:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh2-issues/m-p/2542288#M72627</guid>
      <dc:creator>debottym2</dc:creator>
      <dc:date>2019-03-11T05:06:11Z</dc:date>
    </item>
    <item>
      <title>Hi debottym2 Check this</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh2-issues/m-p/2542289#M72628</link>
      <description>&lt;P&gt;Hi &lt;SPAN class="fullname" itemprop="author"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/debottym2" title="View user profile."&gt;debottym2&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check this previous post,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/11396186/ssh-3-dhrangefail"&gt;https://supportforums.cisco.com/discussion/11396186/ssh-3-dhrangefail&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is also a bug reported , ( not sure if you're matching )&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCuo76464"&gt;https://tools.cisco.com/bugsearch/bug/CSCuo76464&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Do not forget to rate helpful posts&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;-Randy-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 18:20:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh2-issues/m-p/2542289#M72628</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2014-10-14T18:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: Hi debottym2 Check this</title>
      <link>https://community.cisco.com/t5/network-access-control/ssh2-issues/m-p/3863875#M72629</link>
      <description>&lt;P&gt;Sorry for updating in this old thread.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just had this issue on a newly patched Catalyst 2960X, which was upgraded to 15.2(7)E.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our self-made application only supported DH key lengths of 1024, but this new IOS only supports 2048 or 4096.&lt;/P&gt;
&lt;P&gt;hostnam(config)#ip ssh dh min size ?&lt;BR /&gt;2048 Diffie Group 14 2048-bit key&lt;BR /&gt;4096 Diffie Group 16 4096-bit key&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here the debug output:&lt;/P&gt;
&lt;P&gt;May 28 13:55:59.615: SSH0: starting SSH control process&lt;BR /&gt;May 28 13:55:59.615: SSH0: sent protocol version id SSH-2.0-Cisco-1.25&lt;BR /&gt;May 28 13:55:59.615: SSH0: protocol version id is - SSH-2.0-Renci.SshNet.SshClient.0.0.1&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: kexinit sent: kex algo = diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: Server certificate trustpoint not found. Skipping hostkey algo = x509v3-ssh-rsa&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: kexinit sent: hostkey algo = ssh-rsa&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: kexinit sent: encryption algo = aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: kexinit sent: mac algo = hmac-sha1,hmac-sha1-96&lt;BR /&gt;May 28 13:55:59.615: SSH2 0: send:packet of length 256 (length also includes padlen of 4)&lt;BR /&gt;May 28 13:55:59.618: SSH2 0: SSH2_MSG_KEXINIT sent&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: ssh_receive: 464 bytes received &lt;BR /&gt;May 28 13:55:59.622: SSH2 0: input: total packet length of 464 bytes&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: partial packet length(block size)8 bytes,needed 456 bytes,&lt;BR /&gt;maclen 0&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: input: padlength 14 bytes&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: SSH2_MSG_KEXINIT received&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: kex: client-&amp;gt;server enc:aes256-ctr mac:hmac-sha1 &lt;BR /&gt;May 28 13:55:59.622: SSH2 0: kex: server-&amp;gt;client enc:aes256-ctr mac:hmac-sha1 &lt;BR /&gt;May 28 13:55:59.622: SSH2 0: Using kex_algo = diffie-hellman-group-exchange-sha1&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: ssh_receive: 32 bytes received &lt;BR /&gt;May 28 13:55:59.622: SSH2 0: input: total packet length of 32 bytes&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: partial packet length(block size)8 bytes,needed 24 bytes,&lt;BR /&gt;maclen 0&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: input: padlength 14 bytes&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: SSH2_MSG_KEX_DH_GEX_REQUEST received&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: Range sent by client is - 1024 &amp;lt; 1024 &amp;lt; 1024 &lt;BR /&gt;May 28 13:55:59: %SSH-3-DH_RANGE_FAIL: Client DH key range mismatch with minimum configured DH key on server&lt;BR /&gt;May 28 13:55:59.622: SSH2 0: send:packet of length 104 (length also includes padlen of 7)&lt;BR /&gt;May 28 13:55:59.727: SSH0: Session disconnected - error 0x00&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We fixed it by upgrading our SSH client to a (much) more recent version in our application.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 14:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ssh2-issues/m-p/3863875#M72629</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2019-05-28T14:32:35Z</dc:date>
    </item>
  </channel>
</rss>

