<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Modifying SSH cipher on FTD by editing &amp;quot;/etc/ssh/sshd_config&amp;quot; in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687760#M1093398</link>
    <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;I have been through lots of Cisco FTD Docs and cannot find the answer, trying not to raise a TAC case for this if it can be avoided.&lt;/P&gt;
&lt;P&gt;Does anyone know if you can&amp;nbsp;modify the SSH cipher on FTD by editing "/etc/ssh/sshd_config" on Cisco FTD 2100?&lt;/P&gt;
&lt;P&gt;I found that the below Customer is on 6.6.1, not on the affected list, but as you can see no work around.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvr20579" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCvr20579&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Our of the 8 FTD Devices the customer has only 3 flagged with this issue on a pentest.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Sep 2022 10:38:25 GMT</pubDate>
    <dc:creator>Grizzelz</dc:creator>
    <dc:date>2022-09-15T10:38:25Z</dc:date>
    <item>
      <title>Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config"</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687760#M1093398</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;I have been through lots of Cisco FTD Docs and cannot find the answer, trying not to raise a TAC case for this if it can be avoided.&lt;/P&gt;
&lt;P&gt;Does anyone know if you can&amp;nbsp;modify the SSH cipher on FTD by editing "/etc/ssh/sshd_config" on Cisco FTD 2100?&lt;/P&gt;
&lt;P&gt;I found that the below Customer is on 6.6.1, not on the affected list, but as you can see no work around.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cisco.com/bugsearch/bug/CSCvr20579" target="_blank"&gt;https://bst.cisco.com/bugsearch/bug/CSCvr20579&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Our of the 8 FTD Devices the customer has only 3 flagged with this issue on a pentest.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 10:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687760#M1093398</guid>
      <dc:creator>Grizzelz</dc:creator>
      <dc:date>2022-09-15T10:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config&amp;</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687797#M1093399</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- At all times you can 'evaluate' modifications to&amp;nbsp;&lt;SPAN&gt;"/etc/ssh/sshd_config" with&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;FONT size="5"&gt;%&lt;STRONG&gt; nmap --script ssh2-enum-algos yourdevice&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 11:32:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687797#M1093399</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-09-15T11:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config&amp;</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687804#M1093400</link>
      <description>&lt;P&gt;Hello Marce,&lt;/P&gt;
&lt;P&gt;Thank you for this, I take it you mean to run this command from expert within the FTD.&lt;/P&gt;
&lt;P&gt;Do you have any Cisco Documentation on this.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 11:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687804#M1093400</guid>
      <dc:creator>Grizzelz</dc:creator>
      <dc:date>2022-09-15T11:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config&amp;</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687824#M1093401</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- No ,from an outside system which has nmap installed , linux systems have this native , you can also install it on windows :&amp;nbsp;&lt;A href="https://nmap.org/download" target="_blank"&gt;https://nmap.org/download&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 12:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687824#M1093401</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-09-15T12:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config&amp;</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687832#M1093402</link>
      <description>&lt;P&gt;Hi Marce,&lt;/P&gt;
&lt;P&gt;Sorry never done this before, so you are saying use NMAP to connect to the FTD and it can be disabled this way correct ?&lt;/P&gt;
&lt;P&gt;Sorry if am not following.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 12:17:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687832#M1093402</guid>
      <dc:creator>Grizzelz</dc:creator>
      <dc:date>2022-09-15T12:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config&amp;</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687860#M1093404</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- The idea is to just launch this command from a &lt;STRONG&gt;remote&lt;/STRONG&gt; system, on a Linux box you could just paste the given command. Nmap will then probe the &lt;STRONG&gt;ssh server&lt;/STRONG&gt; on the FTD and return the available ciphers. That way it can be established if modifying the sshd config file will list &lt;EM&gt;different&lt;/EM&gt; available ciphers (nmap output) or not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 13:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687860#M1093404</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-09-15T13:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config&amp;</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687874#M1093407</link>
      <description>&lt;P&gt;Hi Marce,&lt;/P&gt;
&lt;P&gt;That is good to know, but what if I want to change the actual file, how would I do that?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 13:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4687874#M1093407</guid>
      <dc:creator>Grizzelz</dc:creator>
      <dc:date>2022-09-15T13:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config&amp;</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4688068#M1093420</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Probably ( I am not familiar with FTD myself) , you need to be in &lt;STRONG&gt;expert mod&lt;/STRONG&gt;e and then for instance &lt;STRONG&gt;sudo vi&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;/etc/ssh/sshd_config&lt;/STRONG&gt; , you will be prompted for a password , this is the same as the admin password.(To go into the &lt;STRONG&gt;expert mode&lt;/STRONG&gt; you type "expert" from the CLISH&amp;nbsp;(FTD CLI))&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;M.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2022 17:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4688068#M1093420</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-09-15T17:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Modifying SSH cipher on FTD by editing "/etc/ssh/sshd_config&amp;</title>
      <link>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4688533#M1093441</link>
      <description>&lt;P&gt;From Cisco TAC&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Instructions to execute via CLI and remove the weak ciphers:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Connect from FXOS, to FTD&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;connect ftd, enter expert mode;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt; expert&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Change to root:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sudo&amp;nbsp; -i&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="2"&gt;
&lt;LI&gt;To see existing ciphers,&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cat /etc/ssh/sshd_config | grep -e Ciphers -e MAC -e Kex&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Make a copy of the original SSH daemon configuration file:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cp /etc/ssh/sshd_config /etc/ssh/sshd_config.orig&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;Execute the following command to remove the CBC ciphers from the SSH daemon configuration:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- vim /etc/ssh/sshd_config&lt;/P&gt;
&lt;P&gt;- "i" to edit&lt;/P&gt;
&lt;P&gt;- remove aes128-cbc,aes192-cbc,aes256-cbc, 3des-cbc from list of ciphers --&amp;gt; wq!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;Restart the SSH daemon:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/etc/init.d/sshd restart&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note: SSH connection may be down while restarts. Later you can run a new vulnerability scan to confirm results.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 11:52:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/modifying-ssh-cipher-on-ftd-by-editing-quot-etc-ssh-sshd-config/m-p/4688533#M1093441</guid>
      <dc:creator>Grizzelz</dc:creator>
      <dc:date>2022-09-16T11:52:50Z</dc:date>
    </item>
  </channel>
</rss>

