<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cipher should be replaced at switch in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637856#M1091227</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; yes it is possible, best to do it via console. Test the commands on a local switch, before rolling out remotely.&lt;/P&gt;
&lt;P&gt;Ensure you are using an up to date ssh client that supports the ciphers&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jun 2022 20:02:03 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-06-23T20:02:03Z</dc:date>
    <item>
      <title>Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636932#M1091188</link>
      <description>&lt;P&gt;Hi We got security vulnerability issue report. We are not sure which cipher should be replaced. http/https are disabled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks like ssh is related with the issue. Anyone can share some suggestions? Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The switch info:&amp;nbsp;CAT3K_CAA-UNIVERSALK9-M, Version 03.06.06E&lt;/P&gt;&lt;P&gt;Security Report says it like the below:&lt;/P&gt;&lt;P&gt;Ciphers using CFB of OFB&lt;BR /&gt;Very uncommon, and deprecated because of weaknesses compared to newer cipher chaining modes such as CTR or GCM&lt;BR /&gt;RC4 cipher (arcfour, arcfour128, arcfour256)&lt;BR /&gt;The RC4 cipher has a cryptographic bias and is no longer considered secure&lt;BR /&gt;Ciphers with a 64-bit block size (DES, 3DES, Blowfish, IDEA, CAST)&lt;BR /&gt;Ciphers with a 64-bit block size may be vulnerable to birthday attacks (Sweet32)&lt;BR /&gt;Key exchange algorithms using DH group 1 (diffie-hellman-group1-sha1, gss-group1-sha1-*)&lt;BR /&gt;DH group 1 uses a 1024-bit key which is considered too short and vulnerable to Logjam-style attacks&lt;BR /&gt;Key exchange algorithm "rsa1024sha1"&lt;BR /&gt;Very uncommon, and deprecated because of the short RSA key size&lt;BR /&gt;MAC algorithm "umac-32"&lt;BR /&gt;Very uncommon, and deprecated because of the very short MAC length&lt;BR /&gt;Cipher "none"&lt;BR /&gt;This is available only in SSHv1&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 20:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636932#M1091188</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-22T20:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636938#M1091189</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; you should look to upgrade your IOS, version 03.06.06E is very old. The newer IOS versions will support the latest ciphers. Something like the following (if supported by your image) would be more secure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto key generate rsa modulus 2048&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;ip ssh client algorithm encryption aes256-ctr aes192-ctr aes128-ctr&lt;BR /&gt;ip ssh server algorithm encryption aes256-ctr aes192-ctr aes128-ctr&lt;BR /&gt;ip ssh server algorithm mac hmac-sha1&lt;BR /&gt;ip ssh dh min size 2048&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 20:34:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636938#M1091189</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-06-22T20:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636940#M1091190</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Thank you very much for your reply!&lt;/P&gt;&lt;P&gt;So the below commands should also fix the issue?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto key generate rsa modulus 2048&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip ssh version 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip ssh client algorithm encryption aes256-ctr aes192-ctr aes128-ctr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip ssh server algorithm encryption aes256-ctr aes192-ctr aes128-ctr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip ssh server algorithm mac hmac-sha1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip ssh dh min size 2048&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 20:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636940#M1091190</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-22T20:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636942#M1091191</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; if supported by your software image, yes. &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-8/configuration_guide/sec/b_168_sec_9300_cg/m9_168_sec_secure_shell_algorithms_cg.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-8/configuration_guide/sec/b_168_sec_9300_cg/m9_168_sec_secure_shell_algorithms_cg.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could see if the more secure ciphers such as the following is accepted in your old IOS version:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;ip ssh server algorithm &lt;SPAN class="highlight appended"&gt;mac&lt;/SPAN&gt; h&lt;SPAN class="highlight appended"&gt;mac&lt;/SPAN&gt;-sha2-256, h&lt;SPAN class="highlight appended"&gt;mac&lt;/SPAN&gt;-sha2-512, h&lt;SPAN class="highlight appended"&gt;mac&lt;/SPAN&gt;-sha1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class=""&gt;SHA2 will be more secure than SHA1.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 20:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636942#M1091191</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-06-22T20:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636943#M1091192</link>
      <description>&lt;P&gt;Thank you very much for your nice explanation. what command can I use to show current cipher that the switch is using?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 20:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636943#M1091192</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-22T20:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636946#M1091193</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; use "show ip ssh"&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 20:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636946#M1091193</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-06-22T20:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636951#M1091194</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok I got it. Thank you very much!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 20:54:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4636951#M1091194</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-22T20:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637855#M1091226</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Is it possible to lose ssh connection after adding these cli? thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 19:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637855#M1091226</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-23T19:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637856#M1091227</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; yes it is possible, best to do it via console. Test the commands on a local switch, before rolling out remotely.&lt;/P&gt;
&lt;P&gt;Ensure you are using an up to date ssh client that supports the ciphers&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 20:02:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637856#M1091227</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-06-23T20:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637863#M1091228</link>
      <description>&lt;P&gt;Thanks Rob. How to rolling out? I do not think reboot without save can rolling out, right?&amp;nbsp;&lt;/P&gt;&lt;P&gt;and can I say all ciphers at client side have to cover ciphers at its server?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 20:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637863#M1091228</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-23T20:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cipher should be replaced at switch</title>
      <link>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637868#M1091229</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; to rollout I mean you should test all the commands above are accepted by whatever version of IOS-XE you are running on a local switch, that you have console access - confirm they work before rolling out on the remaining switches. A reboot without saving the configuration would reboot with the old settings.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Use the same client and server settings.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 20:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cipher-should-be-replaced-at-switch/m-p/4637868#M1091229</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-06-23T20:33:18Z</dc:date>
    </item>
  </channel>
</rss>

