<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem with Weak SSH Key Exchange Options in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-weak-ssh-key-exchange-options/m-p/3762442#M8428</link>
    <description>&lt;P&gt;I am having an issue with the SSH connectivity groups, it does not let me use SHA256 which means my FIPS 140-2 SALT automation server can't connect in and run commands from the firewall itself.&amp;nbsp; There are options to set the ASDM and VPN exchanges, but I only have group 1 and 14 available for SSH to the management interface, and it does not include the SHA256 option made available in&amp;nbsp;&lt;A href="https://www.ietf.org/rfc/rfc4419.txt" target="_blank"&gt;https://www.ietf.org/rfc/rfc4419.txt&lt;/A&gt; which is way back in 2006.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it the case that my security device doesn't support more advanced exchanges?&amp;nbsp; Is there no way to use something more advanced than:&lt;/P&gt;
&lt;PRE class="lang:sh decode:true"&gt;ssh key-exchange group dh-group1-sha1&lt;/PRE&gt;
&lt;P&gt;Any assistance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am running the latest software and ASDM v10.1 on an ASA-5525-X.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blog.gdssecurity.com/labs/2015/8/3/ssh-weak-diffie-hellman-group-identification-tool.html" target="_blank"&gt;https://blog.gdssecurity.com/labs/2015/8/3/ssh-weak-diffie-hellman-group-identification-tool.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:34:17 GMT</pubDate>
    <dc:creator>sp2lm@leidos.com</dc:creator>
    <dc:date>2020-02-21T16:34:17Z</dc:date>
    <item>
      <title>Problem with Weak SSH Key Exchange Options</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-weak-ssh-key-exchange-options/m-p/3762442#M8428</link>
      <description>&lt;P&gt;I am having an issue with the SSH connectivity groups, it does not let me use SHA256 which means my FIPS 140-2 SALT automation server can't connect in and run commands from the firewall itself.&amp;nbsp; There are options to set the ASDM and VPN exchanges, but I only have group 1 and 14 available for SSH to the management interface, and it does not include the SHA256 option made available in&amp;nbsp;&lt;A href="https://www.ietf.org/rfc/rfc4419.txt" target="_blank"&gt;https://www.ietf.org/rfc/rfc4419.txt&lt;/A&gt; which is way back in 2006.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it the case that my security device doesn't support more advanced exchanges?&amp;nbsp; Is there no way to use something more advanced than:&lt;/P&gt;
&lt;PRE class="lang:sh decode:true"&gt;ssh key-exchange group dh-group1-sha1&lt;/PRE&gt;
&lt;P&gt;Any assistance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am running the latest software and ASDM v10.1 on an ASA-5525-X.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blog.gdssecurity.com/labs/2015/8/3/ssh-weak-diffie-hellman-group-identification-tool.html" target="_blank"&gt;https://blog.gdssecurity.com/labs/2015/8/3/ssh-weak-diffie-hellman-group-identification-tool.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:34:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-weak-ssh-key-exchange-options/m-p/3762442#M8428</guid>
      <dc:creator>sp2lm@leidos.com</dc:creator>
      <dc:date>2020-02-21T16:34:17Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with Weak SSH Key Exchange Options</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-weak-ssh-key-exchange-options/m-p/3763808#M8429</link>
      <description>&lt;P&gt;So, I have my answer for anyone whose interested:&amp;nbsp; Yes, the ASA is using weak key exchanges which are susceptible to the LogJam attack.&amp;nbsp; OpenSSH 7 and above removes support for&amp;nbsp;&lt;SPAN&gt;diffie-hellman-group1-sha1 as a default, by specifying it manually we are about to get in on the CLI and by modifying the&amp;nbsp;~/.ssh/config file we are able to allow it to be used on a host which is using a weak protocol, which hilariously in this cases is an expensive ASA Firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 user@legacyhost&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.openssh.com/legacy.html" target="_blank"&gt;https://www.openssh.com/legacy.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 15:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-weak-ssh-key-exchange-options/m-p/3763808#M8429</guid>
      <dc:creator>sp2lm@leidos.com</dc:creator>
      <dc:date>2018-12-14T15:12:11Z</dc:date>
    </item>
  </channel>
</rss>

