<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH to PIX 506 from Linux  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131483#M609798</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX can only support SSH version 1.x.  Looks like your client is running v3.4, try using version 1.x and see what happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also confirm that your config is something like below:&lt;/P&gt;&lt;P&gt;hostname xxxx &lt;/P&gt;&lt;P&gt;domain-name xxxx &lt;/P&gt;&lt;P&gt;ca generate rsa key 1024 &lt;/P&gt;&lt;P&gt;ca save all &lt;/P&gt;&lt;P&gt;ssh 10.10.10.10 255.255.255.255 outside &lt;/P&gt;&lt;P&gt;ssh timeout 60 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Feb 2003 19:11:32 GMT</pubDate>
    <dc:creator>steve.barlow</dc:creator>
    <dc:date>2003-02-04T19:11:32Z</dc:date>
    <item>
      <title>SSH to PIX 506 from Linux</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131481#M609796</link>
      <description>&lt;P&gt;I have a PIX 506 at a remote location and I attempted to setup ssh access to it from my machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall = PIX 506 - 6.1(1)&lt;/P&gt;&lt;P&gt;my machine = RedHat Linux 8.0&lt;/P&gt;&lt;P&gt;ssh client = openssh 3.4p1-2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SSH session is failing with the following error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the client side: &lt;/P&gt;&lt;P&gt;Received disconnect from [pix ip here]: Invalid message type.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the PIX side (debug ssh): &lt;/P&gt;&lt;P&gt;315002: Permitted SSH session from [my ip here] on interface outside for user "pix"&lt;/P&gt;&lt;P&gt;315011: SSH session from [my ip here] on interface outside for user "pix" disconnected by SSH server, reason: "Invalid message type" (0x01)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a verbose dump from the client side:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@hydrogen virginia]# ssh -c des -v -l pix [pix ip here]&lt;/P&gt;&lt;P&gt;OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090602f&lt;/P&gt;&lt;P&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;/P&gt;&lt;P&gt;debug1: Applying options for *&lt;/P&gt;&lt;P&gt;debug1: Rhosts Authentication disabled, originating port will not be trusted.&lt;/P&gt;&lt;P&gt;debug1: ssh_connect: needpriv 0&lt;/P&gt;&lt;P&gt;debug1: Connecting to [pix ip here] port 22.&lt;/P&gt;&lt;P&gt;debug1: Connection established.&lt;/P&gt;&lt;P&gt;debug1: identity file /root/.ssh/identity type -1&lt;/P&gt;&lt;P&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;/P&gt;&lt;P&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;/P&gt;&lt;P&gt;debug1: Remote protocol version 1.5, remote software version Cisco-1.25&lt;/P&gt;&lt;P&gt;debug1: no match: Cisco-1.25&lt;/P&gt;&lt;P&gt;debug1: Local version string SSH-1.5-OpenSSH_3.4p1&lt;/P&gt;&lt;P&gt;debug1: Waiting for server public key.&lt;/P&gt;&lt;P&gt;debug1: Received server public key (768 bits) and host key (2048 bits).&lt;/P&gt;&lt;P&gt;debug1: Host '[pix ip here]' is known and matches the RSA1 host key.&lt;/P&gt;&lt;P&gt;debug1: Found key in /root/.ssh/known_hosts:5&lt;/P&gt;&lt;P&gt;debug1: Encryption type: des&lt;/P&gt;&lt;P&gt;debug1: Sent encrypted session key.&lt;/P&gt;&lt;P&gt;Warning: use of DES is strongly discouraged due to cryptographic weaknesses&lt;/P&gt;&lt;P&gt;debug1: Installing crc compensation attack detector.&lt;/P&gt;&lt;P&gt;debug1: Received encrypted confirmation.&lt;/P&gt;&lt;P&gt;debug1: Doing password authentication.&lt;/P&gt;&lt;P&gt;pix@[pix ip here]'s password:&lt;/P&gt;&lt;P&gt;debug1: Requesting pty.&lt;/P&gt;&lt;P&gt;debug1: Requesting X11 forwarding with authentication spoofing.&lt;/P&gt;&lt;P&gt;Warning: Remote host denied X11 forwarding.&lt;/P&gt;&lt;P&gt;debug1: fd 3 setting TCP_NODELAY&lt;/P&gt;&lt;P&gt;debug1: Requesting shell.&lt;/P&gt;&lt;P&gt;debug1: Entering interactive session.&lt;/P&gt;&lt;P&gt;Received disconnect from [pix ip here]: Invalid message type&lt;/P&gt;&lt;P&gt;debug1: Calling cleanup 0x8053120(0x0)&lt;/P&gt;&lt;P&gt;debug1: Calling cleanup 0x80674b0(0x0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131481#M609796</guid>
      <dc:creator>worshama</dc:creator>
      <dc:date>2020-02-21T06:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to PIX 506 from Linux</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131482#M609797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX can only support SSH version 1.x.  Looks like your client is running v3.4, try using version 1.x and see what happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also confirm that your config is something like below:&lt;/P&gt;&lt;P&gt;hostname xxxx &lt;/P&gt;&lt;P&gt;domain-name xxxx &lt;/P&gt;&lt;P&gt;ca generate rsa key 1024 &lt;/P&gt;&lt;P&gt;ca save all &lt;/P&gt;&lt;P&gt;ssh 10.10.10.10 255.255.255.255 outside &lt;/P&gt;&lt;P&gt;ssh timeout 60 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2003 19:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131482#M609797</guid>
      <dc:creator>steve.barlow</dc:creator>
      <dc:date>2003-02-04T19:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to PIX 506 from Linux</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131483#M609798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX can only support SSH version 1.x.  Looks like your client is running v3.4, try using version 1.x and see what happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also confirm that your config is something like below:&lt;/P&gt;&lt;P&gt;hostname xxxx &lt;/P&gt;&lt;P&gt;domain-name xxxx &lt;/P&gt;&lt;P&gt;ca generate rsa key 1024 &lt;/P&gt;&lt;P&gt;ca save all &lt;/P&gt;&lt;P&gt;ssh 10.10.10.10 255.255.255.255 outside &lt;/P&gt;&lt;P&gt;ssh timeout 60 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2003 19:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131483#M609798</guid>
      <dc:creator>steve.barlow</dc:creator>
      <dc:date>2003-02-04T19:11:32Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to PIX 506 from Linux</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131484#M609799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should probably set:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;X11Forwarding no&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or just comment it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#X11Forwarding no&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in your /etc/ssh/ssh_config file. Cisco SSH implementation do not support X11 forwarding, since no X11 is implemented. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not an OpenSSH default setting you are using, so you might want to check further settings in your SSH configuration file link EscapeChar...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2003 22:32:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131484#M609799</guid>
      <dc:creator>ods</dc:creator>
      <dc:date>2003-02-05T22:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: SSH to PIX 506 from Linux</title>
      <link>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131485#M609800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;X11Forwarding was the ticket.  Then again it also helped knowing the PIX only supports SSH 1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For anyone else in the same situation, use these settings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/etc/ssh/ssh_config  change X11Forwarding to no&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# ssh -v -c des -l pix -1 [pix ip address]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2003 15:41:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-to-pix-506-from-linux/m-p/131485#M609800</guid>
      <dc:creator>worshama</dc:creator>
      <dc:date>2003-02-06T15:41:02Z</dc:date>
    </item>
  </channel>
</rss>

