cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2367
Views
3
Helpful
13
Replies

TLS Confusion

jayu
Level 1
Level 1

We have three series of Cisco Catalyst switches (2960, 1000 and 9300).  The 2960 and 1000 units don't appear to support TLS 1.3 (very annoying).  On a recent scan, our 2960 and 1000 series switches show failing grades on the TLS 1.2 ciphers.  However, comparing those same 1.2 ciphers to another object that passed with flying colors, it appears the same ciphers are available as the ones listed as Failing on the switches.  

Example:
One device has this cipher available:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ecdh_x25519] - A

Yet the 2960 and 1000 units have this available:
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [secp256r1] - F

The only difference is that bit inside the brackets.  Are these switches just too old to get proper cipher suits or am I missing something?  Attempting to plug holes found by pen testers isn't going to get very far if I can't go any higher than the switches as we have to match at least one across the board, correct?  

1 Accepted Solution

Accepted Solutions

jayu
Level 1
Level 1

Update: Found what I was looking for:
https://mwhubbard.blogspot.com/2020/06/disable-weak-sshssl-ciphers-in-cisco-ios.html

gives all the commands I was after, especially important are the ones that will tell you what the switch supports as well as the commands to remove insecure ciphers and completely ban TLS 1.0 and 1.1

View solution in original post

13 Replies 13

can I see SSL config ?


Fri Jul 07 2023 13:37:26 GMT-0500 (Central Daylight Time)
===================================================================================
#show ip ssh
SSH Enabled - version 1.99
Authentication methods:publickey,keyboard-interactive,password
Authentication Publickey Algorithms:x509v3-ssh-rsa,ssh-rsa
Hostkey Algorithms:x509v3-ssh-rsa,ssh-rsa
Encryption Algorithms:aes128-ctr,aes192-ctr,aes256-ctr
MAC Algorithms:hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-sha1-96
KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
Authentication timeout: 120 secs; Authentication retries: 3
Minimum expected Diffie Hellman key size : 2048 bits
IOS Keys in SECSH format(ssh-rsa, base64 encoded): TP-self-signed-1853278720
Modulus Size : 1024 bits
ssh-rsa: redacted

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [ecdh_x25519] - A

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 [secp256r1] - F

first the key exchange is same 
the Auth is RSA 
the Cipher use is same 
except the KEY EXCHANGE algorithm is different.
so ecdh_x25519 and secp256r1 
that make issue I think 
so I need to see config especially the key exchange 

 

The first listed item is from a totally different device.  The list of seemingly available SSL/TLS cipher suites for the switch is missing anything higher than the second item.  I need to know how to add the first into the switch (if possible) or otherwise update/upgrade the available cipher suites.  

So, what commands would I need to issue here to change/update the Key Exchange algorithm?  That's the part I'm needing most.

I ALWAYS forget you are talking about ssl not ssh.

I will share command.

Thanks 

MHM

I hate to pester but...any luck with the command(s)?

you use SSL for HTTP GUI access ?

HTTP/S GUI access among other things...SSH being another.  Before we restrict the servers and end user machines via gpo to only use TLS 1.2 (since 1.3 isn't widely supported yet) we need to make sure the switches are capable of handling the same ciphers.  And remove the obsolete cipher suites while we're at it.  Anything we can do to increase security.

jayu
Level 1
Level 1

Update: Found what I was looking for:
https://mwhubbard.blogspot.com/2020/06/disable-weak-sshssl-ciphers-in-cisco-ios.html

gives all the commands I was after, especially important are the ones that will tell you what the switch supports as well as the commands to remove insecure ciphers and completely ban TLS 1.0 and 1.1

Glad you solve issue.

Sorry for late reply.

There are no command for ssl but there is command for http (ssl) and ssh' that why I ask do you use ssl for http.

Have a nice summer 

MHM

BTW, for the 2960 and 1100, are they also running the latest IOS and/or a crypto version (also excluding export crypto versions)?

Both the 2960 and 1100 series are on the latest recommended release for their series.  

Review Cisco Networking for a $25 gift card