<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH Algorithm in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402959#M919955</link>
    <description>&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our internal network security team has idntified Vulnerability regarding the SSH server within the catalyst switches.As per the Vulnerability team SSH is configured to allow MD5 and 96-bit MAC algorithms for client to server communication.These Algorithms are assumed to be weak by &lt;/P&gt;&lt;P&gt;Vulnerability team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way by which we can change the alogorithms used between SSH server (switch) and client...From the CLI can we change the alogorithm used in this communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly suggest.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 13:04:48 GMT</pubDate>
    <dc:creator>sameermunj</dc:creator>
    <dc:date>2020-02-21T13:04:48Z</dc:date>
    <item>
      <title>SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402959#M919955</link>
      <description>&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our internal network security team has idntified Vulnerability regarding the SSH server within the catalyst switches.As per the Vulnerability team SSH is configured to allow MD5 and 96-bit MAC algorithms for client to server communication.These Algorithms are assumed to be weak by &lt;/P&gt;&lt;P&gt;Vulnerability team&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way by which we can change the alogorithms used between SSH server (switch) and client...From the CLI can we change the alogorithm used in this communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindly suggest.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402959#M919955</guid>
      <dc:creator>sameermunj</dc:creator>
      <dc:date>2020-02-21T13:04:48Z</dc:date>
    </item>
    <item>
      <title>SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402960#M919956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you enabled SSHv2?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 15:49:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402960#M919956</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-06T15:49:38Z</dc:date>
    </item>
    <item>
      <title>SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402961#M919957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello&lt;/P&gt;&lt;P&gt;Ssh is already enabled and is working..this is the vulnerability found by security team during their assessment.just wanted to understand weather the option is available from CLI to configure /change auth algorithms used between Client-server ssh communication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 16:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402961#M919957</guid>
      <dc:creator>sameermunj</dc:creator>
      <dc:date>2014-01-06T16:43:10Z</dc:date>
    </item>
    <item>
      <title>SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402962#M919958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you enabled SSHv2 or are you running version 1?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 16:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402962#M919958</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-06T16:45:12Z</dc:date>
    </item>
    <item>
      <title>SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402963#M919959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SSH-V2 already enabled&amp;nbsp; and working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 16:47:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402963#M919959</guid>
      <dc:creator>sameermunj</dc:creator>
      <dc:date>2014-01-06T16:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402964#M919960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will need to change the algorithm in your SSH client. There is no way to do it on the server side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can view the encrpytion with &lt;STRONG&gt;show ssh&lt;/STRONG&gt; when you're connected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 16:59:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402964#M919960</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-06T16:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402965#M919961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so i need to change the algorithms in my SSH client like the Putty client i used for initiating ssh connection..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the output of show ssh is mentioned below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OLD-1F-192.8#show ssh&lt;/P&gt;&lt;P&gt;%No SSHv1 server connections running.&lt;/P&gt;&lt;P&gt;Connection Version Mode Encryption&amp;nbsp; Hmac State&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Username&lt;/P&gt;&lt;P&gt;0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IN&amp;nbsp;&amp;nbsp; aes256-cbc&amp;nbsp; hmac-sha1&amp;nbsp;&amp;nbsp;&amp;nbsp; Session started&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a548464&lt;/P&gt;&lt;P&gt;0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; OUT&amp;nbsp; aes256-cbc&amp;nbsp; hmac-sha1&amp;nbsp;&amp;nbsp;&amp;nbsp; Session started&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; a548464&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so here the Hmac state(hmac-sha1) defined is one&amp;nbsp; supported by the switch right? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vulnerability team has concern about hmac-md5 &amp;amp;hmac-md5-96 wherein hmac-sha1 is ok for them..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please confirm..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 17:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402965#M919961</guid>
      <dc:creator>sameermunj</dc:creator>
      <dc:date>2014-01-06T17:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402966#M919962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the current connections are using SHA1. Correct you would change it Putty if that is what you use. I use SecureCRT and here's a screenshot of how I can set what encryption to use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/7/9/173976-1-6-2014%2011-38-17%20AM.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 17:40:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402966#M919962</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-06T17:40:34Z</dc:date>
    </item>
    <item>
      <title>SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402967#M919963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;last query is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so the output of show ssh is showing the MAC used from the SSH clinet and this output will change depending on the ssh client configuration and this has nothing to do with SSH server configuration which is the catalayst switch and no way we can change the encrption/auth algorithms to be used by SSH server ( catalyst switch)..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 17:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402967#M919963</guid>
      <dc:creator>sameermunj</dc:creator>
      <dc:date>2014-01-06T17:47:19Z</dc:date>
    </item>
    <item>
      <title>SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402968#M919964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 18:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/2402968#M919964</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-06T18:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: SSH Algorithm</title>
      <link>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/4300863#M1078991</link>
      <description>&lt;P&gt;All due respect, I don't think this statement is accurate (Hopefully, I didn't misunderstand the issue.):&lt;BR /&gt;"&lt;SPAN&gt;You will need to change the algorithm in your SSH client. There is no way to do it on the server side."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I look at the ssh server MAC algorithms, I can see hmac-sha1-96 enabled:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;LAB1-F3-DL1#sh ip ssh&lt;BR /&gt;SSH Enabled - version 2.0&lt;BR /&gt;Authentication methods:publickey,keyboard-interactive,password&lt;BR /&gt;Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Encryption Algorithms:aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;MAC Algorithms:hmac-sha2-256,hmac-sha2-512,hmac-sha1,&lt;U&gt;hmac-sha1-96&lt;/U&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I can restrict those methods with this command:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;LAB1-F3-DL1(config)#ip ssh server algorithm mac hmac-sha2-256 hmac-sha2-512&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;LAB1-F3-DL1(config)#&lt;BR /&gt;LAB1-F3-DL1(config)#end&lt;BR /&gt;LAB1-F3-DL1#sh ip ssh&lt;BR /&gt;SSH Enabled - version 2.0&lt;BR /&gt;Authentication methods:publickey,keyboard-interactive,password&lt;BR /&gt;Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa&lt;BR /&gt;Encryption Algorithms:aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;MAC Algorithms:&lt;U&gt;hmac-sha2-256,hmac-sha2-512&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 17:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-algorithm/m-p/4300863#M1078991</guid>
      <dc:creator>Robert Burlingame</dc:creator>
      <dc:date>2021-03-03T17:40:49Z</dc:date>
    </item>
  </channel>
</rss>

