<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26081#M23784</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you've got ciphers listed that are supported by your SSH client, yes.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Mar 2018 15:00:20 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-03-21T15:00:20Z</dc:date>
    <item>
      <title>Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26076#M23779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In R77.30&amp;nbsp; i need&amp;nbsp; enable the CTR or GCM cipher mode&amp;nbsp; encryption instead of CBC cipher encryption, Please&amp;nbsp; some one help me to fix this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 08:35:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26076#M23779</guid>
      <dc:creator>rajesh_s</dc:creator>
      <dc:date>2018-01-31T08:35:48Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26077#M23780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please clarify which part of the product you're asking about as there are several places that use these ciphers and the answer is different for each one.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 03:17:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26077#M23780</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-01T03:17:05Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26078#M23781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Demeon,&lt;/P&gt;&lt;P&gt;Thanks for your response&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: #002060;"&gt;The SSH server is configured to support Cipher Block Chaining (CBC) encryption. This may allow an attacker to recover the plaintext message from the ciphertext.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: #002060;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2018 08:17:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26078#M23781</guid>
      <dc:creator>rajesh_s</dc:creator>
      <dc:date>2018-02-01T08:17:06Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26079#M23782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can change the&amp;nbsp;enabled SSH ciphers in the following files:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;/etc/ssh/ssh&lt;/EM&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;_config&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&lt;EM&gt;/etc/ssh/sshd_config&lt;/EM&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Look for the Ciphers line and remove the appropriate entries from that line.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Restart the ssh daemon with the command:&amp;nbsp;&lt;EM&gt;service sshd restart&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2018 00:16:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26079#M23782</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-02T00:16:03Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26080#M23783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Demeon,&lt;/P&gt;&lt;P&gt;I found the chipper keys&amp;nbsp; " Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes2 "&lt;/P&gt;&lt;P&gt;That is only keys i found in ssh configuration, If i remove those keys, Will i able to access the gateway via ssh?.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2018 09:19:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26080#M23783</guid>
      <dc:creator>rajesh_s</dc:creator>
      <dc:date>2018-03-21T09:19:27Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26081#M23784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you've got ciphers listed that are supported by your SSH client, yes.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2018 15:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26081#M23784</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-21T15:00:20Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26082#M23785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp;There was no ciphers key in sshd_config file, Just i had below mentioned cipher keys in sshd_config file.&lt;/P&gt;&lt;P&gt;Ciphers aes128-ctr,aes192-ctr,aes256-ctr&lt;/P&gt;&lt;P&gt;MACs hmac-sha1,hmac-ripemd160.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2018 15:22:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26082#M23785</guid>
      <dc:creator>rajesh_s</dc:creator>
      <dc:date>2018-03-21T15:22:03Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26083#M23786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you know of a way to modify this ciphers on Gaia Embedded?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 11:48:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26083#M23786</guid>
      <dc:creator>Bryce_Myers</dc:creator>
      <dc:date>2018-11-05T11:48:53Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26084#M23787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not that I'm aware of.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2018 12:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/26084#M23787</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-05T12:47:33Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/57862#M23788</link>
      <description>&lt;P&gt;Look here to be able to see them at least:&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk144632&amp;amp;partition=Advanced&amp;amp;product=Small" target="_blank" rel="noopener"&gt;&amp;nbsp;sk144632: How to see the supported ciphers and HMACs of the SSH protocol on SMB appliances&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 08:39:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/57862#M23788</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-07-10T08:39:13Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/57866#M23789</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk123294&amp;amp;partition=General&amp;amp;product=Branch" target="_blank" rel="noopener"&gt;R77.20.80 for Small and Medium Business Appliances&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;removed unsafe ciphers/HMACs from SSH server supported ciphers/HMACs: &lt;/SPAN&gt;&lt;EM&gt;hmac-sha1-96, hmac-md5&lt;/EM&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Looks like the ciphers are compiled into the dropbear SSH server binary for Embedded systems!&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 08:53:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/57866#M23789</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-07-10T08:53:03Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/101546#M23790</link>
      <description>&lt;P&gt;&lt;STRONG&gt;DESCRIPTION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The SSH server is configured to support either Arcfour or Cipher Block Chaining (CBC) mode cipher algorithms. SSH can be configured to use Counter (CTR) mode encryption instead of CBC. The use of Arcfour algorithms should be disabled.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;RISK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;A weak cipher has been detected.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;RECOMMENDATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Configure the SSH server to disable Arcfour and CBC ciphers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the configuration to disable CBC and enable CTR?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is what I have on the router now:&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTTP secure server ciphersuite: 3des-ede-cbc-sha des-cbc-sha rc4-128-md5&lt;BR /&gt;rc4-128-sha aes-128-cbc-sha aes-256-cbc-sha dhe-aes-128-cbc-sha&lt;BR /&gt;dhe-aes-256-cbc-sha ecdhe-rsa-3des-ede-cbc-sha ecdhe-rsa-aes-256-cbc-sha&lt;BR /&gt;ecdhe-rsa-rc4-128-sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 18:17:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/101546#M23790</guid>
      <dc:creator>johnnyhinton777</dc:creator>
      <dc:date>2020-11-09T18:17:29Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/101556#M23791</link>
      <description>&lt;P&gt;It would be exactly the same configuration as you would do on a standard OpenSSH, which I assume would start by removing anything that mentions CBC in the name.&lt;BR /&gt;The version of OpenSSH in use prior to R80.40 is fairly old, so it may not support newer ciphers that may be suggested.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 20:29:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/101556#M23791</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-09T20:29:39Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/133222#M23792</link>
      <description>&lt;P&gt;Hello, thanks for the info.&lt;/P&gt;&lt;P&gt;I just checked both files and there are &lt;STRONG&gt;no&lt;/STRONG&gt; Ciphers listed in the&amp;nbsp;&lt;EM&gt;sshd_config&amp;nbsp;&lt;/EM&gt;file. There &lt;STRONG&gt;is&lt;/STRONG&gt;, however, a line in the&amp;nbsp;&lt;EM&gt;ssh_config&amp;nbsp;&lt;/EM&gt;file as follows:&lt;/P&gt;&lt;P&gt;Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc&lt;/P&gt;&lt;P&gt;What will happen after I removed all the ciphers listed above as all of them are considered weak? Is there a way to add ctr cipher instead?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&lt;BR /&gt;R80.30 Gateways&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 11:27:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/133222#M23792</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2021-11-04T11:27:12Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/133227#M23793</link>
      <description>&lt;P&gt;This is just the same behavior as on any other Linux/Unix box with OpenSSH, as long as we are not talking about SMB appliances.&lt;/P&gt;
&lt;P&gt;ssh_config is for the SSH client.&lt;/P&gt;
&lt;P&gt;sshd_config is for the SSH server.&lt;/P&gt;
&lt;P&gt;If you you not specify any ciphers in that file(s), the defaults apply.&lt;/P&gt;
&lt;P&gt;See defaults/supported ciphers here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk165685" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk165685&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;When changing these on versions prior to R81.10, please take care of:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106031" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106031&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;When running at least R80.40, a quite good hardening suggestion would be for example:&lt;/P&gt;
&lt;PRE&gt;KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256&lt;BR /&gt;&lt;BR /&gt;Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr&lt;BR /&gt;&lt;BR /&gt;MACs hmac-sha2-256,hmac-sha2-512,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com&lt;BR /&gt;&lt;BR /&gt;HostKeyAlgorithms ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521&lt;/PRE&gt;
&lt;P&gt;Just before hitting the "reply" button, I saw you are on R80.30. Thats sad, because that means you are limited to the possibilities of the very old OpenSSH version CheckPoint uses before R80.40, as PhoneBoy said already. Please see sk165685 for supported ciphers. The list is very short, but you can use ctr and get rid of cbc by specifiying only the ctr ciphers in your Ciphers string:&lt;/P&gt;
&lt;PRE&gt;Ciphers&amp;nbsp;aes128-ctr,aes192-ctr,aes256-ctr&lt;/PRE&gt;
&lt;P&gt;Not sure about Kex, MAC and HostKeyAlgorithms support in R80.30. Its not documented on sk165685 and I do not have access to anything older that R80.40 at the moment to look up myself.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 13:05:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/133227#M23793</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2021-11-04T13:05:04Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/133297#M23794</link>
      <description>&lt;P&gt;Thanks a lot for taking the time to explain. We are in the process of upgrading to R80.40 but just wanted to fix the cipher issue first&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Nov 2021 10:32:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/133297#M23794</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2021-11-05T10:32:25Z</dc:date>
    </item>
    <item>
      <title>Re:  Disable CBC mode cipher encryption and enable CTR or GCM cipher mode</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/148608#M23795</link>
      <description>&lt;P&gt;Hi All Expert,&lt;/P&gt;&lt;P&gt;I google on the same issue as well but i still not able to solve this, is there any article or youtube channel for me to solve this on disable a CBC and enabled CTR and GCM encryption.&lt;/P&gt;&lt;P&gt;The system i am using is&lt;/P&gt;&lt;P&gt;- windows server 2019&lt;/P&gt;&lt;P&gt;- sFTP server port 22&lt;/P&gt;&lt;P&gt;the finding result is from Nessus scanning&lt;/P&gt;&lt;P&gt;The code is&amp;nbsp;&lt;/P&gt;&lt;P&gt;70658 - SSH Server CBC Mode Ciphers Enabled&lt;/P&gt;&lt;P&gt;71049 - SSH Weak MAC Algorithms Enabled&lt;/P&gt;&lt;P&gt;153953 - SSH Weak Key Exchange Algorithms Enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;anyone can help?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i try to look for this folder but i dont know where to find.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;/etc/ssh/ssh&lt;/EM&gt;&lt;SPAN&gt;_config&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;EM&gt;/etc/ssh/sshd_config&lt;/EM&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Steve2688&lt;/P&gt;</description>
      <pubDate>Sat, 14 May 2022 05:50:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disable-CBC-mode-cipher-encryption-and-enable-CTR-or-GCM-cipher/m-p/148608#M23795</guid>
      <dc:creator>steve2688</dc:creator>
      <dc:date>2022-05-14T05:50:05Z</dc:date>
    </item>
  </channel>
</rss>

