<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH to ISR Requires Key Size of 1024? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238615#M1118347</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325526"&gt;@Matthew Martin&lt;/a&gt; try to zerorise the current key and create a new RSA key.&lt;/P&gt;
&lt;PRE&gt;crypto key generate rsa modulus 3072 label SSH_KEY&lt;BR /&gt;ip ssh rsa keypair-name SSH_KEY&lt;/PRE&gt;
&lt;P&gt;Once done, run "show ip ssh" and this will confirm that "SSH_KEY"&lt;/P&gt;
&lt;P&gt;More information - &lt;A href="https://integrate.uk.com/securing-ios-xe-ssh/" target="_blank"&gt;https://integrate.uk.com/securing-ios-xe-ssh/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Dec 2024 21:21:30 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-12-18T21:21:30Z</dc:date>
    <item>
      <title>SSH to ISR Requires Key Size of 1024?</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238611#M1118345</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;A few months back I noticed my WSL Linux was requiring me to add this &lt;STRONG&gt;"ssh &lt;U&gt;-o RequiredRSASize=1024&lt;/U&gt; &lt;A href="mailto:user@ipaddr&amp;quot;" target="_blank" rel="noopener"&gt;user@ipaddr"&lt;/A&gt;&lt;/STRONG&gt; to some hosts that I ssh to, this included a few servers and some Cisco gear.&lt;/P&gt;&lt;P&gt;I'm guessing my WSL had some update or openssh was updated, or something along those lines increasing the default minimum key size...&lt;/P&gt;&lt;P&gt;I have two ISR-4451X's and one of them is requiring me to include that option and the other is not. I'm guessing I need to generate a new rsa key on the one 4451X.&lt;/P&gt;&lt;P&gt;These ISRs are where some of our ISP connections are plugged in so I wanted to be sure I got this right... Could someone tell me what commands are needed to do this? And if it would require any reboot, or would cause any disruption in traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;!!! Box needing the extra cmd line option while ssh'ing:
4451X-HQ1#show run all | inc rsa
ip ssh server algorithm hostkey x509v3-ssh-rsa rsa-sha2-512 rsa-sha2-256 ssh-rsa
ip ssh server algorithm publickey x509v3-ssh-rsa ssh-rsa ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 x509v3-ecdsa-sha2-nistp256 x509v3-ecdsa-sha2-nistp384 rsa-sha2-256 rsa-sha2-512

!!! Box working normally:
4451X-HQ2#show run all | inc rsa
 rsakeypair TP-self-signed-3313371257
ip ssh server algorithm hostkey x509v3-ssh-rsa rsa-sha2-512 rsa-sha2-256 ssh-rsa
ip ssh server algorithm publickey x509v3-ssh-rsa ssh-rsa ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 x509v3-ecdsa-sha2-nistp256 x509v3-ecdsa-sha2-nistp384 rsa-sha2-256 rsa-sha2-512&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And on my ssh_config in WSL I have the following. I think at some point I tried adding ciphers in order to not need that extra CLI option. But didn't work:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;# cat /etc/ssh/ssh_config | grep Ciphers
# Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc
#Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes256-cbc
Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance,&lt;BR /&gt;Matt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 21:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238611#M1118345</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2024-12-18T21:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to ISR Requires Key Size of 1024?</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238613#M1118346</link>
      <description>&lt;P&gt;you need to generate key in both SW&lt;/P&gt;
&lt;P&gt;show crypto key mypubkey rsa &amp;lt;&amp;lt;- use this command to check if key is add&lt;/P&gt;
&lt;P&gt;TP-self key &amp;lt;&amp;lt;- this key for smart license it not relate to ssh&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 21:25:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238613#M1118346</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-18T21:25:12Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to ISR Requires Key Size of 1024?</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238615#M1118347</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325526"&gt;@Matthew Martin&lt;/a&gt; try to zerorise the current key and create a new RSA key.&lt;/P&gt;
&lt;PRE&gt;crypto key generate rsa modulus 3072 label SSH_KEY&lt;BR /&gt;ip ssh rsa keypair-name SSH_KEY&lt;/PRE&gt;
&lt;P&gt;Once done, run "show ip ssh" and this will confirm that "SSH_KEY"&lt;/P&gt;
&lt;P&gt;More information - &lt;A href="https://integrate.uk.com/securing-ios-xe-ssh/" target="_blank"&gt;https://integrate.uk.com/securing-ios-xe-ssh/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 21:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238615#M1118347</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-18T21:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to ISR Requires Key Size of 1024?</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238645#M1118351</link>
      <description>&lt;P&gt;Thanks Rob!&lt;/P&gt;&lt;P&gt;Got the new key generated and assigned to ssh. All is well now!&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;4451X-HQ1#show ip ssh
SSH Enabled - version 2.0
Authentication methods:publickey,keyboard-interactive,password
...............
cut.............
...............
Authentication timeout: 120 secs; Authentication retries: 3
Minimum expected Diffie Hellman key size : 2048 bits
IOS Keys in SECSH format(ssh-rsa, base64 encoded): SSH_KEY
ssh-rsa AAA3...........................&lt;/LI-CODE&gt;&lt;P&gt;Thanks Again,&lt;BR /&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 18 Dec 2024 22:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-isr-requires-key-size-of-1024/m-p/5238645#M1118351</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2024-12-18T22:57:03Z</dc:date>
    </item>
  </channel>
</rss>

