<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Weak Key Exchange Algorithms Enabled has been raised on VA Sca in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4558643#M1087629</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which device is this on (e.g. ASA or IOS) ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can enable/disable whichever algorithms you want with the command 'ip ssh server algorithm encryption':&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt; ip ssh server algorithm encryption&lt;/STRONG&gt; aes128-ctr aes192-ctr aes256-ctr aes128-cbc 3des-cbc aes192-cbc aes256-cbc&lt;/P&gt;</description>
    <pubDate>Thu, 24 Feb 2022 08:29:08 GMT</pubDate>
    <dc:creator>Georg Pauwen</dc:creator>
    <dc:date>2022-02-24T08:29:08Z</dc:date>
    <item>
      <title>SSH Weak Key Exchange Algorithms Enabled has been raised on VA Scan</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4558527#M1087628</link>
      <description>&lt;P&gt;Please help to know if anyway to fix this observation or any workaround.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The remote SSH server is configured to allow key exchange algorithms which are considered weak.&lt;/P&gt;&lt;P&gt;This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH)&lt;BR /&gt;draft-ietf-curdle-ssh-kex-sha2-20. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and MUST NOT be&lt;BR /&gt;enabled. This includes:&lt;/P&gt;&lt;P&gt;diffie-hellman-group-exchange-sha1&lt;/P&gt;&lt;P&gt;diffie-hellman-group1-sha1&lt;/P&gt;&lt;P&gt;gss-gex-sha1-*&lt;/P&gt;&lt;P&gt;gss-group1-sha1-*&lt;/P&gt;&lt;P&gt;gss-group14-sha1-*&lt;/P&gt;&lt;P&gt;rsa1024-sha1&lt;/P&gt;&lt;P&gt;Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software&lt;BR /&gt;versions.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 05:55:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4558527#M1087628</guid>
      <dc:creator>Sufiyan1</dc:creator>
      <dc:date>2022-02-24T05:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Weak Key Exchange Algorithms Enabled has been raised on VA Sca</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4558643#M1087629</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which device is this on (e.g. ASA or IOS) ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can enable/disable whichever algorithms you want with the command 'ip ssh server algorithm encryption':&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt; ip ssh server algorithm encryption&lt;/STRONG&gt; aes128-ctr aes192-ctr aes256-ctr aes128-cbc 3des-cbc aes192-cbc aes256-cbc&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 08:29:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4558643#M1087629</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2022-02-24T08:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Weak Key Exchange Algorithms Enabled has been raised on VA Sca</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4560431#M1087736</link>
      <description>&lt;P&gt;Hello Georg,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for quick reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This raised on both IOS&amp;nbsp; and ASA devices to change KEX values as per recommended however only two options are available we can see on IOS devices but on ASA doesn't shows anything wrt of KEX algorithm.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inXXXX #sh ip ssh | i KEX&lt;BR /&gt;KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inXXXX #sh ip ssh | i Encryption&lt;BR /&gt;Encryption Algorithms:aes128-ctr,aes192-ctr,aes256-ctr&lt;/P&gt;</description>
      <pubDate>Sun, 27 Feb 2022 15:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4560431#M1087736</guid>
      <dc:creator>Sufiyan1</dc:creator>
      <dc:date>2022-02-27T15:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Weak Key Exchange Algorithms Enabled has been raised on VA Sca</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4560462#M1087737</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1317557"&gt;@Sufiyan1&lt;/a&gt; you can change the DH groups on the ASA using the commands - "ssh key-exchange group dh-group14-sha1"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 10:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4560462#M1087737</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-01T10:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Weak Key Exchange Algorithms Enabled has been raised on VA Sca</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4561367#M1087821</link>
      <description>&lt;P&gt;Thank Rob for this info.&lt;/P&gt;&lt;P&gt;Can someone help to know how we can change SSH KEX values on IOS devices as per recommended option to close this weaker SSH KEX algorithm enabled or any info that states current values are not come into weak algorithm.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;inXXXX #sh ip ssh | i KEX&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 10:15:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4561367#M1087821</guid>
      <dc:creator>Sufiyan1</dc:creator>
      <dc:date>2022-03-01T10:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Weak Key Exchange Algorithms Enabled has been raised on VA Sca</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4561377#M1087823</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1317557"&gt;@Sufiyan1&lt;/a&gt; select one...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="wp-block-code"&gt;&lt;CODE&gt;router(config)#ip ssh dh min size ?
  1024  Diffie Group 1 1024-bit key
  2048  Diffie Group 14 2048-bit key
  4096  Diffie Group 16 4096-bit key&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Mar 2022 10:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4561377#M1087823</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-03-01T10:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Weak Key Exchange Algorithms Enabled has been raised on VA Sca</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4568891#M1088168</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; So does this dh value change fix this vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess vulnerability is highlighted on below kex algorithm. Could you help to understand on this if this can be changed to recommended value or are we any plan to introduce more secure values.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;router(config)#ip ssh server algorithm kex ?&lt;BR /&gt;diffie-hellman-group-exchange-sha1 DH_GRPX_SHA1 diffie-hellman key exchange algorithm&lt;BR /&gt;diffie-hellman-group14-sha1 DH_GRP14_SHA1 diffie-hellman key exchange algorithm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 15:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/4568891#M1088168</guid>
      <dc:creator>Sufiyan1</dc:creator>
      <dc:date>2022-03-11T15:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Weak Key Exchange Algorithms Enabled has been raised on VA Sca</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/5166068#M1115381</link>
      <description>&lt;P&gt;Device#conf t&lt;BR /&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;BR /&gt;Device(config)#ip ssh server algorithm KEX diffie-hellman-group14-sha1&lt;BR /&gt;Device(config)#end&lt;/P&gt;</description>
      <pubDate>Mon, 26 Aug 2024 17:44:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-key-exchange-algorithms-enabled-has-been-raised-on-va/m-p/5166068#M1115381</guid>
      <dc:creator>ARPALANISAM</dc:creator>
      <dc:date>2024-08-26T17:44:54Z</dc:date>
    </item>
  </channel>
</rss>

