<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Insecurity message with ssh in switch 3850 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543545#M1086965</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; that message from tenable is probably referring to the https server that is enabled on the switch, not ssh.&lt;/P&gt;
&lt;P&gt;If you are not using it you can disable using "no ip http secure-server" you can also disable http server "no ip http server".&lt;/P&gt;</description>
    <pubDate>Tue, 01 Feb 2022 17:00:16 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-02-01T17:00:16Z</dc:date>
    <item>
      <title>Insecurity message with ssh in switch 3850</title>
      <link>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543542#M1086964</link>
      <description>&lt;P&gt;Hi We have switch c3850/ver 03.03.01.SE. Now some insecurity message (Please see the below) is sent to us from tenable.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The device has the below two commands. Are these two commands is the reason for the insecurity? Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;message is from tenable:&lt;/P&gt;&lt;P&gt;"The remote service accepts connections encrypted using SSL 2.0 and/or&lt;BR /&gt;SSL 3.0. These versions of SSL are affected by several cryptographic&lt;BR /&gt;flaws, including:&lt;/P&gt;&lt;P&gt;- An insecure padding scheme with CBC ciphers.&lt;/P&gt;&lt;P&gt;- Insecure session renegotiation and resumption schemes.&lt;/P&gt;&lt;P&gt;An attacker can exploit these flaws to conduct man-in-the-middle&lt;BR /&gt;attacks or to decrypt communications between the affected service and&lt;BR /&gt;clients.&lt;/P&gt;&lt;P&gt;Although SSL/TLS has a secure means for choosing the highest supported&lt;BR /&gt;version of the protocol (so that these versions will be used only if&lt;BR /&gt;the client or server support nothing better), many web browsers&lt;BR /&gt;implement this in an unsafe way that allows an attacker to downgrade&lt;BR /&gt;a connection (such as in POODLE). Therefore, it is recommended that&lt;BR /&gt;these protocols be disabled entirely.&lt;/P&gt;&lt;P&gt;NIST has determined that SSL 3.0 is no longer acceptable for secure&lt;BR /&gt;communications. As of the date of enforcement found in PCI DSS v3.1,&lt;BR /&gt;any version of SSL will not meet the PCI SSC's definition of 'strong&lt;BR /&gt;cryptography'."&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 16:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543542#M1086964</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-02-01T16:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Insecurity message with ssh in switch 3850</title>
      <link>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543545#M1086965</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; that message from tenable is probably referring to the https server that is enabled on the switch, not ssh.&lt;/P&gt;
&lt;P&gt;If you are not using it you can disable using "no ip http secure-server" you can also disable http server "no ip http server".&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 17:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543545#M1086965</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-02-01T17:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Insecurity message with ssh in switch 3850</title>
      <link>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543566#M1086968</link>
      <description>&lt;P&gt;Hi Rob, Thank you very much! I think you are right.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 17:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543566#M1086968</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-02-01T17:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Insecurity message with ssh in switch 3850</title>
      <link>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543707#M1086986</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&lt;SPAN&gt;We have switch c3850/ver 03.03.01.SE.&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;If the switch's firmware cannot/will-not be upgraded, anything else is an exercise of futility.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 22:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4543707#M1086986</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2022-02-01T22:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: Insecurity message with ssh in switch 3850</title>
      <link>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4544244#M1087007</link>
      <description>&lt;P&gt;Thank you Leo!&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 16:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insecurity-message-with-ssh-in-switch-3850/m-p/4544244#M1087007</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-02-02T16:26:01Z</dc:date>
    </item>
  </channel>
</rss>

