<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identical R82.10 GWs with different options for set ssh server mac and set ssh server kex in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identical-R82-10-GWs-with-different-options-for-set-ssh-server/m-p/274195#M104456</link>
    <description>&lt;P&gt;As a workaround, I was given a few commands to make clish aware of the settings:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dbset ssh:kex:supported:sntrup761x25519-sha512@openssh.com t
dbset ssh:mac:supported:hmac-md5 t
dbset ssh:mac:supported:hmac-md5-96 t
dbset ssh:mac:supported:hmac-sha1-96 t
dbset ssh:public-key:supported:sk-ecdsa-sha2-nistp256-cert-v01@openssh.com t
dbset ssh:public-key:supported:sk-ecdsa-sha2-nistp256@openssh.com t
dbset ssh:public-key:supported:sk-ssh-ed25519-cert-v01@openssh.com t
dbset ssh:public-key:supported:sk-ssh-ed25519@openssh.com t&lt;/LI-CODE&gt;
&lt;P&gt;Note that I have no idea how supported or not this is. Get support's advice before trying it on a firewall you intend to use for anything but lab purposes.&lt;/P&gt;
&lt;P&gt;Got to say between the snapshot problems and this, my impressions of R82.10 are rather negative so far. Also irritated by all my SSH server keys getting regenerated yet again, and with the use of systemd.&lt;/P&gt;</description>
    <pubDate>Wed, 25 Mar 2026 21:08:10 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2026-03-25T21:08:10Z</dc:date>
    <item>
      <title>Identical R82.10 GWs with different options for set ssh server mac and set ssh server kex</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identical-R82-10-GWs-with-different-options-for-set-ssh-server/m-p/273384#M104120</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Identical R82.10 GWs with different options for set ssh server mac and set ssh server kex&lt;BR /&gt;For R82.10 if you do a fresh install these setting are an option in clish, On another lab server that I upgraded from R82 to R82.10 these are not options in clish:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set ssh server mac hmac-md5 off&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set ssh server mac hmac-md5-96 off&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set ssh server mac hmac-sha1-96 off&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;set ssh server kex&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:sntrup761x25519-sha512@openssh.com" rel="noopener" target="_blank"&gt;sntrup761x25519-sha512@openssh.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;on&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;==============================&lt;/P&gt;&lt;P&gt;atl-msslab-R82-fw1&amp;gt; show ssh server mac supported&lt;BR /&gt;--------------------------------&lt;BR /&gt;supported mac:&lt;BR /&gt;--------------------------------&lt;BR /&gt;hmac-md5-96-etm@openssh.com&lt;BR /&gt;hmac-md5-etm@openssh.com&lt;BR /&gt;hmac-sha1&lt;BR /&gt;hmac-sha1-96-etm@openssh.com&lt;BR /&gt;hmac-sha1-etm@openssh.com&lt;BR /&gt;hmac-sha2-256&lt;BR /&gt;hmac-sha2-256-etm@openssh.com&lt;BR /&gt;hmac-sha2-512&lt;BR /&gt;hmac-sha2-512-etm@openssh.com&lt;BR /&gt;umac-64-etm@openssh.com&lt;BR /&gt;umac-64@openssh.com&lt;BR /&gt;umac-128-etm@openssh.com&lt;BR /&gt;umac-128@openssh.com&lt;BR /&gt;--------------------------------&lt;BR /&gt;atl-msslab-R82-fw1&amp;gt; show ssh server kex supported&lt;BR /&gt;--------------------------------&lt;BR /&gt;supported kex:&lt;BR /&gt;--------------------------------&lt;BR /&gt;curve25519-sha256&lt;BR /&gt;curve25519-sha256@libssh.org&lt;BR /&gt;diffie-hellman-group1-sha1&lt;BR /&gt;diffie-hellman-group14-sha1&lt;BR /&gt;diffie-hellman-group14-sha256&lt;BR /&gt;diffie-hellman-group16-sha512&lt;BR /&gt;diffie-hellman-group18-sha512&lt;BR /&gt;diffie-hellman-group-exchange-sha1&lt;BR /&gt;diffie-hellman-group-exchange-sha256&lt;BR /&gt;ecdh-sha2-nistp256&lt;BR /&gt;ecdh-sha2-nistp384&lt;BR /&gt;ecdh-sha2-nistp521&lt;BR /&gt;--------------------------------&lt;BR /&gt;atl-msslab-R82-fw1&amp;gt; show asset system&lt;BR /&gt;Platform: VMware Virtual Platform&lt;BR /&gt;CPU Model: Intel(R) Xeon(R) CPU E5-2670 v3&lt;BR /&gt;CPU Frequency: 2299.997 Mhz&lt;BR /&gt;Number of Cores: 12&lt;BR /&gt;CPU Hyperthreading: Disabled&lt;/P&gt;&lt;P&gt;atl-msslab-R82-fw1&amp;gt; fw ver&lt;BR /&gt;This is Check Point's software version R82.10 - Build 767&lt;BR /&gt;atl-msslab-R82-fw1&amp;gt; exit&lt;BR /&gt;[Expert@atl-msslab-R82-fw1:0]# uname -a&lt;BR /&gt;Linux atl-msslab-R82-fw1 5.14.0-427.13.1cpx86_64 #1 SMP Fri Dec 12 10:23:31 IST 2025 x86_64 x86_64 x86_64 GNU/Linux&lt;/P&gt;&lt;P&gt;==============================&lt;/P&gt;&lt;P&gt;atl-msslab-CP-FW1&amp;gt; show ssh server mac supported&lt;BR /&gt;--------------------------------&lt;BR /&gt;supported mac:&lt;BR /&gt;--------------------------------&lt;BR /&gt;hmac-md5&lt;BR /&gt;hmac-md5-96&lt;BR /&gt;hmac-md5-96-etm@openssh.com&lt;BR /&gt;hmac-md5-etm@openssh.com&lt;BR /&gt;hmac-sha1&lt;BR /&gt;hmac-sha1-96&lt;BR /&gt;hmac-sha1-96-etm@openssh.com&lt;BR /&gt;hmac-sha1-etm@openssh.com&lt;BR /&gt;hmac-sha2-256&lt;BR /&gt;hmac-sha2-256-etm@openssh.com&lt;BR /&gt;hmac-sha2-512&lt;BR /&gt;hmac-sha2-512-etm@openssh.com&lt;BR /&gt;umac-64-etm@openssh.com&lt;BR /&gt;umac-64@openssh.com&lt;BR /&gt;umac-128-etm@openssh.com&lt;BR /&gt;umac-128@openssh.com&lt;BR /&gt;--------------------------------&lt;BR /&gt;atl-msslab-CP-FW1&amp;gt; show ssh server kex supported&lt;BR /&gt;--------------------------------&lt;BR /&gt;supported kex:&lt;BR /&gt;--------------------------------&lt;BR /&gt;curve25519-sha256&lt;BR /&gt;curve25519-sha256@libssh.org&lt;BR /&gt;diffie-hellman-group1-sha1&lt;BR /&gt;diffie-hellman-group14-sha1&lt;BR /&gt;diffie-hellman-group14-sha256&lt;BR /&gt;diffie-hellman-group16-sha512&lt;BR /&gt;diffie-hellman-group18-sha512&lt;BR /&gt;diffie-hellman-group-exchange-sha1&lt;BR /&gt;diffie-hellman-group-exchange-sha256&lt;BR /&gt;ecdh-sha2-nistp256&lt;BR /&gt;ecdh-sha2-nistp384&lt;BR /&gt;ecdh-sha2-nistp521&lt;BR /&gt;sntrup761x25519-sha512@openssh.com&lt;BR /&gt;--------------------------------&lt;BR /&gt;atl-msslab-CP-FW1&amp;gt; show asset system&lt;BR /&gt;Platform: VMware Virtual Platform&lt;BR /&gt;CPU Model: Intel(R) Xeon(R) CPU E5-2670 v3&lt;BR /&gt;CPU Frequency: 2299.997 Mhz&lt;BR /&gt;Number of Cores: 8&lt;BR /&gt;CPU Hyperthreading: Disabled&lt;/P&gt;&lt;P&gt;atl-msslab-CP-FW1&amp;gt; fw ver&lt;BR /&gt;This is Check Point's software version R82.10 - Build 767&lt;BR /&gt;atl-msslab-CP-FW1&amp;gt; exit&lt;BR /&gt;[Expert@atl-msslab-CP-FW1:0]# uname -a&lt;BR /&gt;Linux atl-msslab-CP-FW1 5.14.0-427.13.1cpx86_64 #1 SMP Fri Dec 12 10:23:31 IST 2025 x86_64 x86_64 x86_64 GNU/Linux&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2026 17:20:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identical-R82-10-GWs-with-different-options-for-set-ssh-server/m-p/273384#M104120</guid>
      <dc:creator>Douglas_Rich</dc:creator>
      <dc:date>2026-03-13T17:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Identical R82.10 GWs with different options for set ssh server mac and set ssh server kex</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identical-R82-10-GWs-with-different-options-for-set-ssh-server/m-p/274188#M104452</link>
      <description>&lt;P&gt;I've also hit this problem now. I have a cluster with two members.&lt;/P&gt;
&lt;P&gt;02 was built a while ago at R81.10, upgraded to R81.20, then R82, now R82.10.&lt;/P&gt;
&lt;P&gt;01 originally followed the same path. I tried to roll it back to a snapshot I took manually on R82 so others on the team could run the upgrade, but the snapshot is broken. A very large file (snap_log_backup.tgz) was added to /tmp while the snapshot was being taken, and it prevented other, more important files from being copied. I've confirmed this happened on both members, and I've got a ticket about it.&lt;/P&gt;
&lt;P&gt;I just restored 01 factory defaults on R81.10, used config_system to run the first-time config, updated CPUSE, upgraded to R82.10 (via 'installer upgrade'), installed the&amp;nbsp;sk184766 hotfix, established SIC, and pushed policy. Once it was talking to the management, I tried to get it to the same config as 02 (except IPs, hostname, and other expected differences). I can't because 01 has these options and 02 doesn't.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;SomeFirewall-01&amp;gt; set ssh server kex [Tab]

curve25519-sha256
curve25519-sha256@libssh.org
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1
diffie-hellman-group14-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
sntrup761x25519-sha512@openssh.com

SomeFirewall-01&amp;gt; set ssh server mac [Tab]

hmac-md5
hmac-md5-96
hmac-md5-96-etm@openssh.com
hmac-md5-etm@openssh.com
hmac-sha1
hmac-sha1-96
hmac-sha1-96-etm@openssh.com
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com

SomeFirewall-01&amp;gt; set ssh server public-key [Tab]

ecdsa-sha2-nistp256
ecdsa-sha2-nistp256-cert-v01@openssh.com
ecdsa-sha2-nistp384
ecdsa-sha2-nistp384-cert-v01@openssh.com
ecdsa-sha2-nistp521
ecdsa-sha2-nistp521-cert-v01@openssh.com
rsa-sha2-256
rsa-sha2-256-cert-v01@openssh.com
rsa-sha2-512
rsa-sha2-512-cert-v01@openssh.com
sk-ecdsa-sha2-nistp256-cert-v01@openssh.com
sk-ecdsa-sha2-nistp256@openssh.com
sk-ssh-ed25519-cert-v01@openssh.com
sk-ssh-ed25519@openssh.com
ssh-dss
ssh-dss-cert-v01@openssh.com
ssh-ed25519
ssh-ed25519-cert-v01@openssh.com
ssh-rsa
ssh-rsa-cert-v01@openssh.com&lt;/LI-CODE&gt;
&lt;P&gt;And on member 02:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;SomeFirewall-02&amp;gt; set ssh server kex [Tab]

curve25519-sha256
curve25519-sha256@libssh.org
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1
diffie-hellman-group14-sha256
diffie-hellman-group16-sha512
diffie-hellman-group18-sha512
diffie-hellman-group-exchange-sha1
diffie-hellman-group-exchange-sha256
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521

SomeFirewall-02&amp;gt; set ssh server mac [Tab]

hmac-md5-96-etm@openssh.com
hmac-md5-etm@openssh.com
hmac-sha1
hmac-sha1-96-etm@openssh.com
hmac-sha1-etm@openssh.com
hmac-sha2-256
hmac-sha2-256-etm@openssh.com
hmac-sha2-512
hmac-sha2-512-etm@openssh.com
umac-64-etm@openssh.com
umac-64@openssh.com
umac-128-etm@openssh.com
umac-128@openssh.com

SomeFirewall-02&amp;gt; set ssh server public-key [Tab]

ecdsa-sha2-nistp256
ecdsa-sha2-nistp256-cert-v01@openssh.com
ecdsa-sha2-nistp384
ecdsa-sha2-nistp384-cert-v01@openssh.com
ecdsa-sha2-nistp521
ecdsa-sha2-nistp521-cert-v01@openssh.com
rsa-sha2-256
rsa-sha2-256-cert-v01@openssh.com
rsa-sha2-512
rsa-sha2-512-cert-v01@openssh.com
ssh-dss
ssh-dss-cert-v01@openssh.com
ssh-ed25519
ssh-ed25519-cert-v01@openssh.com
ssh-rsa
ssh-rsa-cert-v01@openssh.com&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 19:44:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identical-R82-10-GWs-with-different-options-for-set-ssh-server/m-p/274188#M104452</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-03-25T19:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Identical R82.10 GWs with different options for set ssh server mac and set ssh server kex</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identical-R82-10-GWs-with-different-options-for-set-ssh-server/m-p/274195#M104456</link>
      <description>&lt;P&gt;As a workaround, I was given a few commands to make clish aware of the settings:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dbset ssh:kex:supported:sntrup761x25519-sha512@openssh.com t
dbset ssh:mac:supported:hmac-md5 t
dbset ssh:mac:supported:hmac-md5-96 t
dbset ssh:mac:supported:hmac-sha1-96 t
dbset ssh:public-key:supported:sk-ecdsa-sha2-nistp256-cert-v01@openssh.com t
dbset ssh:public-key:supported:sk-ecdsa-sha2-nistp256@openssh.com t
dbset ssh:public-key:supported:sk-ssh-ed25519-cert-v01@openssh.com t
dbset ssh:public-key:supported:sk-ssh-ed25519@openssh.com t&lt;/LI-CODE&gt;
&lt;P&gt;Note that I have no idea how supported or not this is. Get support's advice before trying it on a firewall you intend to use for anything but lab purposes.&lt;/P&gt;
&lt;P&gt;Got to say between the snapshot problems and this, my impressions of R82.10 are rather negative so far. Also irritated by all my SSH server keys getting regenerated yet again, and with the use of systemd.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 21:08:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identical-R82-10-GWs-with-different-options-for-set-ssh-server/m-p/274195#M104456</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-03-25T21:08:10Z</dc:date>
    </item>
  </channel>
</rss>

