02-23-2022 09:54 PM - edited 02-23-2022 09:55 PM
Please help to know if anyway to fix this observation or any workaround.
The remote SSH server is configured to allow key exchange algorithms which are considered weak.
This is based on the IETF draft document Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH)
draft-ietf-curdle-ssh-kex-sha2-20. Section 4 lists guidance on key exchange algorithms that SHOULD NOT and MUST NOT be
enabled. This includes:
diffie-hellman-group-exchange-sha1
diffie-hellman-group1-sha1
gss-gex-sha1-*
gss-group1-sha1-*
gss-group14-sha1-*
rsa1024-sha1
Note that this plugin only checks for the options of the SSH server, and it does not check for vulnerable software
versions.
02-24-2022 12:29 AM
Hello,
which device is this on (e.g. ASA or IOS) ?
You can enable/disable whichever algorithms you want with the command 'ip ssh server algorithm encryption':
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr aes128-cbc 3des-cbc aes192-cbc aes256-cbc
02-27-2022 07:38 AM - edited 02-27-2022 07:38 AM
Hello Georg,
Thank you for quick reply.
This raised on both IOS and ASA devices to change KEX values as per recommended however only two options are available we can see on IOS devices but on ASA doesn't shows anything wrt of KEX algorithm.
inXXXX #sh ip ssh | i KEX
KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
inXXXX #sh ip ssh | i Encryption
Encryption Algorithms:aes128-ctr,aes192-ctr,aes256-ctr
02-27-2022 09:01 AM - edited 03-01-2022 02:26 AM
@Sufiyan1 you can change the DH groups on the ASA using the commands - "ssh key-exchange group dh-group14-sha1"
03-01-2022 02:15 AM
Thank Rob for this info.
Can someone help to know how we can change SSH KEX values on IOS devices as per recommended option to close this weaker SSH KEX algorithm enabled or any info that states current values are not come into weak algorithm.
inXXXX #sh ip ssh | i KEX
KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
03-01-2022 02:25 AM
@Sufiyan1 select one...
router(config)#ip ssh dh min size ?
1024 Diffie Group 1 1024-bit key
2048 Diffie Group 14 2048-bit key
4096 Diffie Group 16 4096-bit key
03-11-2022 07:33 AM
@Rob Ingram So does this dh value change fix this vulnerability.
I guess vulnerability is highlighted on below kex algorithm. Could you help to understand on this if this can be changed to recommended value or are we any plan to introduce more secure values.
router(config)#ip ssh server algorithm kex ?
diffie-hellman-group-exchange-sha1 DH_GRPX_SHA1 diffie-hellman key exchange algorithm
diffie-hellman-group14-sha1 DH_GRP14_SHA1 diffie-hellman key exchange algorithm
08-26-2024 10:44 AM
Device#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Device(config)#ip ssh server algorithm KEX diffie-hellman-group14-sha1
Device(config)#end
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide