<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Changing cipher for ssh access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638660#M1091263</link>
    <description>&lt;P&gt;Hi We have cisco switch. In order to access these switch (it may be old switch or old CRT)&lt;SPAN&gt;&amp;nbsp; via ssh, some cipher need to change. Can we change these cipher via the command below to add or delete any of there cipher? the command is like below. I tried to delete one, but it looks like it cannot be deleted. Thank you&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip ssh client algorithm encryption&lt;/STRONG&gt; aes128-ctr&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SW(config)#do sh ip ssh&lt;BR /&gt;SSH Enabled - version 2.0&lt;BR /&gt;Authentication methods:publickey,keyboard-interactive,password&lt;BR /&gt;Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,rsa-sha2-256,rsa-sha2-512&lt;BR /&gt;Hostkey Algorithms:x509v3-ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-rsa&lt;BR /&gt;Encryption Algorithms:aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;MAC Algorithms:hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512&lt;BR /&gt;KEX Algorithms:ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1&lt;BR /&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;BR /&gt;Minimum expected Diffie Hellman key size : 2048 bits&lt;BR /&gt;IOS Keys in SECSH format(ssh-rsa, base64 encoded): TP-self-signed-3371933816&lt;BR /&gt;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCaV9Z7R/PmZXvzdAvyNIZOvQj+VlV8TImtS193NMErCucOK&lt;BR /&gt;3G1JIEfnJH7U2XfuS67ld0TrpW2HRJJasdfnP5USoPp0iE0AFkeraea7d8Shx3xID2z9QuyWdfh5YLq9zBBgndLv&lt;BR /&gt;QZ4lO6e3uzNmMW4ZaIGVQfFI3AaSo8bnA1K7ZERH3VuYK68A2n/3a014Z+gVuW8xlpumtSvhTxSpOhPu&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jun 2022 21:43:06 GMT</pubDate>
    <dc:creator>Leftz</dc:creator>
    <dc:date>2022-06-24T21:43:06Z</dc:date>
    <item>
      <title>Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638660#M1091263</link>
      <description>&lt;P&gt;Hi We have cisco switch. In order to access these switch (it may be old switch or old CRT)&lt;SPAN&gt;&amp;nbsp; via ssh, some cipher need to change. Can we change these cipher via the command below to add or delete any of there cipher? the command is like below. I tried to delete one, but it looks like it cannot be deleted. Thank you&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip ssh client algorithm encryption&lt;/STRONG&gt; aes128-ctr&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SW(config)#do sh ip ssh&lt;BR /&gt;SSH Enabled - version 2.0&lt;BR /&gt;Authentication methods:publickey,keyboard-interactive,password&lt;BR /&gt;Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,rsa-sha2-256,rsa-sha2-512&lt;BR /&gt;Hostkey Algorithms:x509v3-ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-rsa&lt;BR /&gt;Encryption Algorithms:aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;MAC Algorithms:hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha2-512&lt;BR /&gt;KEX Algorithms:ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1&lt;BR /&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;BR /&gt;Minimum expected Diffie Hellman key size : 2048 bits&lt;BR /&gt;IOS Keys in SECSH format(ssh-rsa, base64 encoded): TP-self-signed-3371933816&lt;BR /&gt;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCaV9Z7R/PmZXvzdAvyNIZOvQj+VlV8TImtS193NMErCucOK&lt;BR /&gt;3G1JIEfnJH7U2XfuS67ld0TrpW2HRJJasdfnP5USoPp0iE0AFkeraea7d8Shx3xID2z9QuyWdfh5YLq9zBBgndLv&lt;BR /&gt;QZ4lO6e3uzNmMW4ZaIGVQfFI3AaSo8bnA1K7ZERH3VuYK68A2n/3a014Z+gVuW8xlpumtSvhTxSpOhPu&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 21:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638660#M1091263</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-24T21:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access in switch</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638676#M1091266</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;as I know NO command not work you need to&amp;nbsp;return to&amp;nbsp;default via the below command.&lt;BR /&gt;default ip ssh client algorithm encryption&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 21:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638676#M1091266</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-24T21:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access in switch</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638683#M1091268</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;Thank you very much for your reply. I default it with the command mentioned above. After deleting aes128-ctr, it still exists. Please see the below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SW(config)#do sh ip ssh | i ctr&lt;BR /&gt;Encryption Algorithms:aes256-ctr,aes192-ctr,&lt;STRONG&gt;aes128-ctr&lt;/STRONG&gt;&lt;BR /&gt;SW(config)#&lt;BR /&gt;SW(config)#&lt;STRONG&gt;no&lt;/STRONG&gt; ip ssh client algorithm encryption &lt;STRONG&gt;aes128-ctr&lt;/STRONG&gt;&lt;BR /&gt;SW(config)#&lt;BR /&gt;SW(config)#do sh ip ssh | i ctr&lt;BR /&gt;Encryption Algorithms:aes256-ctr,aes192-ctr,&lt;STRONG&gt;aes128-ctr&lt;/STRONG&gt;&lt;BR /&gt;SW(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 21:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638683#M1091268</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-24T21:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access in switch</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638685#M1091269</link>
      <description>&lt;P&gt;there are many encrypt cipher and the both client and server exchange cipher proposal and accept one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 21:19:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638685#M1091269</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-24T21:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638687#M1091270</link>
      <description>&lt;P&gt;Why below command does not work to delete aes128-ctr?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;ip ssh client algorithm encryption&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;aes128-ctr&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 21:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638687#M1091270</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-24T21:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638698#M1091272</link>
      <description>&lt;P&gt;that hard to answer, from cisco command reference the &lt;STRONG&gt;NO&lt;/STRONG&gt; command is available, and default optional is not suitable for you, so can you try&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;change the order of cipher from&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;to be&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aes128-ctr,aes256-ctr,aes192-ctr&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;then try delete it with&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;no&lt;/STRONG&gt;&amp;nbsp;ip ssh client algorithm encryption&amp;nbsp;&lt;STRONG&gt;aes128-ctr&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jun 2022 15:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638698#M1091272</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-25T15:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638717#M1091273</link>
      <description>&lt;P&gt;what switch model is this ? and what IOS code running on the switch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; suggested with no command should work, if not please&amp;nbsp; refer security best practices:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/guide-to-better-ssh-security/ta-p/3133344" target="_blank"&gt;https://community.cisco.com/t5/security-documents/guide-to-better-ssh-security/ta-p/3133344&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-secure-shell-algorithm-ccc.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/sec-secure-shell-algorithm-ccc.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jun 2022 23:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4638717#M1091273</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-06-24T23:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639642#M1091334</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;Thanks for your reply. its good cisco documents.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The switch mentioned above is new 9300. We just want to test some cipher command on it. The reason is because we have a old switch 3850 with&amp;nbsp;03.06.06E, which needs to upgrade cipher or upgrade ios due to security vulnerability. I tested command "no&amp;nbsp;ip ssh client algorithm encryption&amp;nbsp;aes128-ctr", it looks like these cipher cannot be changed at the new switch. Maybe we can only add some ciphers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to cisco documents mentioned above, my understanding is there are three group ciphers, during ssh process, server and client have to have at least one same cipher in each of the three cipher group. If so, we can add newer cipher to ssh server(old switch), while in client side(securityCRT), we need to keep it new version. Its great if you correct me when you find some wrong. Below is three group of cipher. Can we say it like this?&amp;nbsp; thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco IOS SSH Server Algorithms&lt;BR /&gt;Cisco IOS secure shell (SSH) servers support the encryption algorithms (Advanced Encryption Standard Counter Mode [AES-CTR], AES Cipher Block Chaining [AES-CBC], Triple Data Encryption Standard [3DES]) in the following order:&lt;BR /&gt;aes128-ctr&lt;BR /&gt;aes192-ctr&lt;BR /&gt;aes256-ctr&lt;BR /&gt;aes128-cbc&lt;BR /&gt;3des-cbc&lt;BR /&gt;aes192-cbc&lt;BR /&gt;aes256-cbc&lt;BR /&gt;Cisco IOS SSH servers support the Message Authentication Code (MAC) algorithms in the following order:&lt;BR /&gt;hmac-sha1&lt;BR /&gt;hmac-sha1-96&lt;BR /&gt;Cisco IOS SSH servers support the host key algorithms in the following order:&lt;BR /&gt;x509v3-ssh-rsa&lt;BR /&gt;ssh-rsa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 16:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639642#M1091334</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-27T16:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639649#M1091336</link>
      <description>&lt;P&gt;do you try change the order of cipher and then delete the first one??&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 16:27:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639649#M1091336</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-27T16:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639653#M1091338</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1190993"&gt;@Leftz&lt;/a&gt; to change the cipher just specify exactly what ciphers you want to use. Example if you just want AES256 CTR:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;show run | inc ssh&lt;BR /&gt;ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;/PRE&gt;
&lt;P&gt;Specify the cipher you want to use, this removes the other ciphers.&lt;/P&gt;
&lt;PRE&gt;ip ssh server algorithm encryption aes256-ctr&lt;BR /&gt;show run | inc ssh&lt;BR /&gt;ip ssh server algorithm encryption aes256-ctr&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;You should definately remove 3DES it insecure, you may also want to removed AES CBC. Obviously you should test and ensure connectivity remains, before rolling this out to the rest of the network.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 16:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639653#M1091338</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-06-27T16:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639666#M1091340</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Great! it works at new switch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but at the old switch, it show it like this:&lt;/P&gt;&lt;P&gt;3850#sh run | i ssh&lt;BR /&gt;ip ssh time-out 90&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;transport input ssh&lt;BR /&gt;transport input ssh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It does not show cipher. The question is what cipher is the one we want to specify exactly for that old switch? this might be based on secureCRT version or what cipher CRT would use or have, right?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 16:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639666#M1091340</guid>
      <dc:creator>Leftz</dc:creator>
      <dc:date>2022-06-27T16:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: Changing cipher for ssh access</title>
      <link>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639677#M1091342</link>
      <description>&lt;PRE&gt;t does not show cipher. The question is what cipher is the one we want to specify exactly for that old switch? this might be based on secureCRT version or what cipher CRT would use or have, right? &lt;/PRE&gt;
&lt;P&gt;question here is what securre CRT version, new version of Secure CRT support all with backword compatability. since Cat 9300 new model so this has more secure cipher suites.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2022 17:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-cipher-for-ssh-access/m-p/4639677#M1091342</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-06-27T17:03:50Z</dc:date>
    </item>
  </channel>
</rss>

