<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH Terrapin Prefix Truncation Weakness in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995235#M1107877</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324366"&gt;@dacruzer1&lt;/a&gt; use unaffected algorithms such as AES-GCM&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;ip ssh server algorithm encryption aes256-gcm aes128-gcm&lt;/SPAN&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 12 Jan 2024 14:00:16 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-01-12T14:00:16Z</dc:date>
    <item>
      <title>SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995233#M1107876</link>
      <description>&lt;P&gt;Good Day All,&lt;/P&gt;&lt;P&gt;I found a vulnerability on my 4321 router regarding this:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"The remote SSH server is vulnerable to a man-in-the-middle prefix truncation weakness known as Terrapin. This can allow a remote, man-in-the-middle attacker to bypass integrity checks and downgrade the connection's security."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Anyone information on how to resolve this is greatly appreciated.&lt;/P&gt;&lt;P&gt;-Alfred&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 13:56:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995233#M1107876</guid>
      <dc:creator>dacruzer1</dc:creator>
      <dc:date>2024-01-12T13:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995235#M1107877</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324366"&gt;@dacruzer1&lt;/a&gt; use unaffected algorithms such as AES-GCM&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;ip ssh server algorithm encryption aes256-gcm aes128-gcm&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 12 Jan 2024 14:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995235#M1107877</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-12T14:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995269#M1107880</link>
      <description>&lt;P&gt;adding to other comment check also below CVE :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z" target="_blank"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-privesc-j22SaA4z&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 14:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995269#M1107880</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-12T14:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995271#M1107881</link>
      <description>&lt;P&gt;HI Rob,&lt;/P&gt;&lt;P&gt;I configured that line and now I am getting this error when I tried to SSH:&lt;/P&gt;&lt;P&gt;couldn't agree a client-to-server cipher (available: aes256-gcm, aes128-gcm)&lt;/P&gt;&lt;P&gt;I am using putty to ssh&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 14:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995271#M1107881</guid>
      <dc:creator>dacruzer1</dc:creator>
      <dc:date>2024-01-12T14:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995277#M1107885</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324366"&gt;@dacruzer1&lt;/a&gt; where do you receive this error on the device when configuring or in putty when connecting? If in putty then putty might not support GCM, what version of putty? And what ciphers does it support?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 15:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995277#M1107885</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-12T15:01:36Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995279#M1107886</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;In putty, when connecting.&amp;nbsp; Putty release version 0.70&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It supports:&amp;nbsp; AES (SSH-2 only), ChaCHa20 (SSH-2 only), Blowfish, 3DES&lt;/P&gt;&lt;P&gt;Is there an SSH tool that support GCM ?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 15:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995279#M1107886</guid>
      <dc:creator>dacruzer1</dc:creator>
      <dc:date>2024-01-12T15:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995280#M1107887</link>
      <description>&lt;P&gt;try latest putty 0.80 and check&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 15:12:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995280#M1107887</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-12T15:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995281#M1107888</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324366"&gt;@dacruzer1&lt;/a&gt; 0.70 is very old, 0.80 is the latest, download - &lt;A href="https://www.chiark.greenend.org.uk/~sgtatham/putty/releases/0.80.html" target="_blank"&gt;https://www.chiark.greenend.org.uk/~sgtatham/putty/releases/0.80.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 15:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995281#M1107888</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-12T15:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995286#M1107889</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;Downloaded and installed the latest version of putty, but still not connecting.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Putty Fatal Error:&lt;/P&gt;&lt;P&gt;"Selected client-to-server cipher "aes256-gcm, aes128-gcm" does not correspond to any supported algorithm"&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 15:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995286#M1107889</guid>
      <dc:creator>dacruzer1</dc:creator>
      <dc:date>2024-01-12T15:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995295#M1107890</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324366"&gt;@dacruzer1&lt;/a&gt; I can connect using GCM, try changing the priority cipher selection.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1705073544723.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/207144i11F29BA5BC3CC515/image-size/medium?v=v2&amp;amp;px=400" role="button" title="RobIngram_0-1705073544723.png" alt="RobIngram_0-1705073544723.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 15:33:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995295#M1107890</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-12T15:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995325#M1107891</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;It did not work, the same error...&lt;/P&gt;&lt;P&gt;I will need to console in and remove that line that I configured.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 15:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995325#M1107891</guid>
      <dc:creator>dacruzer1</dc:creator>
      <dc:date>2024-01-12T15:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995836#M1107907</link>
      <description>&lt;P&gt;Can you post the show logging and your show ssh output ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 21:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995836#M1107907</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-12T21:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995851#M1107909</link>
      <description>&lt;P&gt;2024-01-12 13:46:07 Looking up host "204.62.69.1" for SSH connection&lt;BR /&gt;2024-01-12 13:46:07 Connecting to 204.62.69.1 port 22&lt;BR /&gt;2024-01-12 13:46:07 We claim version: SSH-2.0-PuTTY_Release_0.80&lt;BR /&gt;2024-01-12 13:46:07 Connected to 204.62.69.1&lt;BR /&gt;2024-01-12 13:46:07 Remote version: SSH-2.0-Cisco-1.25&lt;BR /&gt;2024-01-12 13:46:07 We believe remote version has SSH-1 ignore bug&lt;BR /&gt;2024-01-12 13:46:07 We believe remote version needs a plain SSH-1 password&lt;BR /&gt;2024-01-12 13:46:07 We believe remote version can't handle SSH-1 RSA authentication&lt;BR /&gt;2024-01-12 13:46:07 Using SSH protocol version 2&lt;BR /&gt;2024-01-12 13:46:07 No GSSAPI security context available&lt;BR /&gt;2024-01-12 13:46:07 Selected client-to-server cipher "aes256-gcm,aes128-gcm" does not correspond to any supported algorithm&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 21:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/4995851#M1107909</guid>
      <dc:creator>dacruzer1</dc:creator>
      <dc:date>2024-01-12T21:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5009503#M1108626</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I ran into the same issue as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324366"&gt;@dacruzer1&lt;/a&gt;&amp;nbsp;has with trying to SSH to the switch after&amp;nbsp;&lt;SPAN&gt;using unaffected algorithms that&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;listed above, even with the latest version of Putty 0.80. I was able to fix that issue by using the following on the switch:&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;ip ssh server algorithm encryption aes256-gcm@openssh.com aes128-gcm@openssh.com&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;I still needed to use Putty 0.80 even after I did the change.&lt;/P&gt;&lt;P&gt;Please let me know if what I did is the correct way or not.&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Manwar&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 23:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5009503#M1108626</guid>
      <dc:creator>mmsabaeai</dc:creator>
      <dc:date>2024-01-30T23:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5009644#M1108638</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1674315"&gt;@mmsabaeai&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I am currently going to apply this fix and wanted to make sure the fix is already applied.&lt;/P&gt;&lt;P&gt;1. Do you have a command to run to verify if the fix already was applied?&lt;/P&gt;&lt;P&gt;2. Does this require a server reboot or will this cause impact traffic?&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. I believe this fix is applicable for Cisco Nexus 9300?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 06:00:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5009644#M1108638</guid>
      <dc:creator>johntug</dc:creator>
      <dc:date>2024-01-31T06:00:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5010358#M1108662</link>
      <description>&lt;P&gt;If you are still able to ssh to the device after adding that command then that is the correct way.&amp;nbsp; I used Nessus scanner to identify vulnerabilities on my network device that how I was able to detect this vulnerability.&amp;nbsp; hth&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 14:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5010358#M1108662</guid>
      <dc:creator>dacruzer1</dc:creator>
      <dc:date>2024-01-31T14:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5010759#M1108705</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I there a way to run a command to check if the fix was is already working? I dont have access on the customer physical location and just doing it remotely and losing ssh will be a problem for me. It is the customer who do the nessus scan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;BR /&gt;John&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 06:04:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5010759#M1108705</guid>
      <dc:creator>johntug</dc:creator>
      <dc:date>2024-02-01T06:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5010818#M1108708</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I tried to check the command but it seems&amp;nbsp;(ip ssh server algorithm encryption) is not available on my Nexus Cisco&amp;nbsp;Nexus9000.&lt;/P&gt;&lt;P&gt;I tried to tab below command nothing shows.&lt;/P&gt;&lt;P&gt;(config)# ip ssh ser&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 08:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5010818#M1108708</guid>
      <dc:creator>johntug</dc:creator>
      <dc:date>2024-02-01T08:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5015310#M1108933</link>
      <description>&lt;P&gt;&amp;gt;&lt;EM&gt;3. I believe this fix is applicable for Cisco Nexus 9300?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;For Nexus 9300, NX-OS, the fix will be different for modifying the SSH daemon CipherSuites. ~BAS&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 06:41:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5015310#M1108933</guid>
      <dc:creator>bseklecki</dc:creator>
      <dc:date>2024-02-09T06:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Terrapin Prefix Truncation Weakness</title>
      <link>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5015312#M1108934</link>
      <description>&lt;P&gt;&lt;EM&gt;&amp;gt; Is there a way to run a command to check if the ..&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;IOS (and IOS-XE?)# show ip ssh&lt;/P&gt;&lt;P&gt;Cat9K ( NX-OS ) # show ssh server&lt;/P&gt;&lt;P&gt;(it should print the acceptable KEX Key Exchange, MACs, and encryption CipherSuites)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="seklecki_0-1707461303534.png" style="width: 503px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/209936iDEB28C16C1E56F51/image-dimensions/503x361?v=v2" width="503" height="361" role="button" title="seklecki_0-1707461303534.png" alt="seklecki_0-1707461303534.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 06:48:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-terrapin-prefix-truncation-weakness/m-p/5015312#M1108934</guid>
      <dc:creator>bseklecki</dc:creator>
      <dc:date>2024-02-09T06:48:45Z</dc:date>
    </item>
  </channel>
</rss>

