<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSH weak algorithm supported in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109693#M14969</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Its right in the sk itself:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Add the following 2 lines to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;/etc/ssh/ssh_config&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;/etc/ssh/sshd_config&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;files:&lt;BR /&gt;
&lt;P&gt;&lt;EM&gt;Ciphers&amp;nbsp;aes128-ctr,aes192-ctr,aes256-ctr&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;MACs hmac-sha1&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt;&amp;nbsp;There should be&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;no&lt;/STRONG&gt;&amp;nbsp;spaces between ciphers/MACs and commas.&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Remove previous "Ciphers/MACs" lines if they currently exist in the above files.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the SSH server using the&amp;nbsp;&lt;EM&gt;service sshd restart&lt;/EM&gt;&amp;nbsp;command.&lt;/LI&gt;
&lt;/OL&gt;</description>
    <pubDate>Wed, 03 Feb 2021 14:36:33 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2021-02-03T14:36:33Z</dc:date>
    <item>
      <title>SSH weak algorithm supported</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109288#M14818</link>
      <description>&lt;P&gt;a Vulnerability "SSH weak Algorithms supported" has been reported in R80.10 Gateways.. What is the procedure to resolve this vulnerability ?&lt;/P&gt;&lt;P&gt;are some modifications required in sshd conf file for this ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 12:55:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109288#M14818</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2021-01-29T12:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: SSH weak algorithm supported</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109290#M14820</link>
      <description>&lt;P&gt;Start with reviewing&amp;nbsp;&lt;SPAN&gt;sk106031 depending on the specific finding.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 13:42:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109290#M14820</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2021-01-29T13:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: SSH weak algorithm supported</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109304#M14823</link>
      <description>&lt;P&gt;You can adjust some of the algorithms offered by modifying the sshd configuration.&lt;BR /&gt;However, the version of OpenSSH we use prior to R80.40 is old and does not offer some of the currently recommended algorithms.&lt;BR /&gt;Given that R80.10 is End of Support in a few months, it’s highly recommended you upgrade.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 17:16:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109304#M14823</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-29T17:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: SSH weak algorithm supported</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109691#M14967</link>
      <description>&lt;P&gt;Yes ..we have an upgrade planned in March for this.&lt;/P&gt;&lt;P&gt;Can you please point out the config i need to modify in sshd file&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 14:28:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109691#M14967</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2021-02-03T14:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: SSH weak algorithm supported</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109693#M14969</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Its right in the sk itself:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Add the following 2 lines to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;/etc/ssh/ssh_config&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;/etc/ssh/sshd_config&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;files:&lt;BR /&gt;
&lt;P&gt;&lt;EM&gt;Ciphers&amp;nbsp;aes128-ctr,aes192-ctr,aes256-ctr&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;MACs hmac-sha1&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;STRONG&gt;Important:&lt;/STRONG&gt;&amp;nbsp;There should be&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;no&lt;/STRONG&gt;&amp;nbsp;spaces between ciphers/MACs and commas.&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;Remove previous "Ciphers/MACs" lines if they currently exist in the above files.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the SSH server using the&amp;nbsp;&lt;EM&gt;service sshd restart&lt;/EM&gt;&amp;nbsp;command.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 03 Feb 2021 14:36:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109693#M14969</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-03T14:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: SSH weak algorithm supported</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109700#M14970</link>
      <description>&lt;P&gt;Thanks for the reply..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i was looking in the sshd and ssh config files but i dont see any enabled CIPHERS there.&lt;/P&gt;&lt;P&gt;in the ssh config there is a line ciphers aes-.. blowfish.. and so on but it is hashed out .. this line is not present in sshd config file.&lt;/P&gt;&lt;P&gt;So i am a bit confused here.. why the vulnerability is being detected if it is hashed out ? or does no entry in the file related to default ciphers ?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 14:54:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109700#M14970</guid>
      <dc:creator>LostBoY</dc:creator>
      <dc:date>2021-02-03T14:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: SSH weak algorithm supported</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109701#M14971</link>
      <description>&lt;P&gt;Send me the file privately and I can compare it to one from fresh gateway.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 14:56:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109701#M14971</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-03T14:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: SSH weak algorithm supported</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109702#M14972</link>
      <description>&lt;P&gt;The OpenBSD developers (and OpenSSH is an OpenBSD project) include default values for most configurable items. These default values don't need anything in the config file to work, but they include them in the config file anyway as a valid config line which would result in the same behavior as the default, commented out.&lt;/P&gt;
&lt;P&gt;You can either remove the "# " at the start of the line and edit it to your requirements (the defaults for a given OpenSSH version are easy enough to find online), or you can add a new line in the file meeting your requirements.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 15:10:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSH-weak-algorithm-supported/m-p/109702#M14972</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-02-03T15:10:49Z</dc:date>
    </item>
  </channel>
</rss>

