<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Manish,I don't believe in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssh-weak-mac-algorithms-enabled/m-p/2668212#M920303</link>
    <description>&lt;P&gt;Hello Manish,&lt;/P&gt;&lt;P&gt;I don't believe you can disbale MD5 and 96-bit mac algorithms on a cisco device, but you can harden the switch by disabling ssh version 1 by entering&lt;/P&gt;&lt;P&gt;"ip ssh version 2".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The client that is initiating the connection can force the algorithms are used.&lt;/P&gt;&lt;P&gt;Below are options when initiating an ssh connection from&amp;nbsp;a cisco device.&lt;/P&gt;&lt;P&gt;ssh [-v {1 | 2} |-c {aes128-ctr |aes192-ctr|aes256-ctr |aes128-cbc | 3des-cbc |aes192-cbc | aes256-cbc} |-l user-id | -l user-id:vrf-name number ip-address ip-address | -l user-id:rotary number ip-address | -m {hmac-md5 | hmac-md5-96 | hmac-sha1 | hmac-sha1-96} | -o numberofpasswordprompts n | -p port-num] {ip-addr | hostname} [command | -vrf]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The following link gives best practices in hardening a cisco device.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc37"&gt;http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc37&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;if so, please rate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Apr 2015 15:56:26 GMT</pubDate>
    <dc:creator>Charles Hill</dc:creator>
    <dc:date>2015-04-08T15:56:26Z</dc:date>
    <item>
      <title>SSH Weak MAC Algorithms Enabled</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-mac-algorithms-enabled/m-p/2668211#M920302</link>
      <description>&lt;P&gt;Our Security Team is Reporting vulnerability related to &lt;SPAN style="font-size: 14.3999996185303px;"&gt;SSH Weak MAC Algorithms Enabled for one of my&amp;nbsp;&lt;/SPAN&gt;WS-C3750G-24TS-1U switch.&lt;/P&gt;&lt;P&gt;As far as i know&amp;nbsp;user will send the required negotiation cipher to access the device and device is just accepting it.&lt;/P&gt;&lt;P&gt;Also i don't find any option to disable cipher on device ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The actual error they shared is&amp;nbsp;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;SSH is configured to allow MD5 and 96-bit MAC algorithms for client to server communication&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Iam running IOS&amp;nbsp;&lt;/SPAN&gt;c3750-ipservicesk9-mz.122-55.SE9.bin&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Manish Rawat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-mac-algorithms-enabled/m-p/2668211#M920302</guid>
      <dc:creator>Manish221</dc:creator>
      <dc:date>2020-02-21T13:26:42Z</dc:date>
    </item>
    <item>
      <title>Hello Manish,I don't believe</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-mac-algorithms-enabled/m-p/2668212#M920303</link>
      <description>&lt;P&gt;Hello Manish,&lt;/P&gt;&lt;P&gt;I don't believe you can disbale MD5 and 96-bit mac algorithms on a cisco device, but you can harden the switch by disabling ssh version 1 by entering&lt;/P&gt;&lt;P&gt;"ip ssh version 2".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The client that is initiating the connection can force the algorithms are used.&lt;/P&gt;&lt;P&gt;Below are options when initiating an ssh connection from&amp;nbsp;a cisco device.&lt;/P&gt;&lt;P&gt;ssh [-v {1 | 2} |-c {aes128-ctr |aes192-ctr|aes256-ctr |aes128-cbc | 3des-cbc |aes192-cbc | aes256-cbc} |-l user-id | -l user-id:vrf-name number ip-address ip-address | -l user-id:rotary number ip-address | -m {hmac-md5 | hmac-md5-96 | hmac-sha1 | hmac-sha1-96} | -o numberofpasswordprompts n | -p port-num] {ip-addr | hostname} [command | -vrf]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The following link gives best practices in hardening a cisco device.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc37"&gt;http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc37&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;if so, please rate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2015 15:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-mac-algorithms-enabled/m-p/2668212#M920303</guid>
      <dc:creator>Charles Hill</dc:creator>
      <dc:date>2015-04-08T15:56:26Z</dc:date>
    </item>
    <item>
      <title>Hello Cehill  Agree that we</title>
      <link>https://community.cisco.com/t5/network-security/ssh-weak-mac-algorithms-enabled/m-p/2668213#M920304</link>
      <description>&lt;P&gt;Hello Cehill&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Agree&amp;nbsp;that we cannot disable the ssh algorithm.&lt;/P&gt;&lt;P&gt;what should i do so that security audit team does not report this vulnerability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2015 16:08:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssh-weak-mac-algorithms-enabled/m-p/2668213#M920304</guid>
      <dc:creator>Manish221</dc:creator>
      <dc:date>2015-04-08T16:08:53Z</dc:date>
    </item>
  </channel>
</rss>

