<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BSI recommended SSH hardening in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183413#M30581</link>
    <description>&lt;P&gt;See the linked doc for recommended macs. But why do you post your settings instead of comments or additions as requested?&lt;/P&gt;</description>
    <pubDate>Wed, 07 Jun 2023 07:25:33 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2023-06-07T07:25:33Z</dc:date>
    <item>
      <title>BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183322#M30561</link>
      <description>&lt;P&gt;The German &lt;STRONG&gt;BSI&lt;/STRONG&gt; (Federal Office for Information Security) is a main source for IT security recommendations in Europe. Based on its &lt;A class="c-link c-link--download FTpdf" title="Download:&amp;nbsp;Technical Guideline TR-02102-4_ Cryptographic Mechanisms: Recommendations and Key Lengths – Use of Secure Shell (SSH) Version: 2023-1&amp;nbsp;(PDF, 512KB, File meet accessibility standards) (Opens new window)" href="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-4.pdf?__blob=publicationFile&amp;amp;v=5" target="_blank" rel="noopener"&gt;Technical Guideline TR-02102-4_ Cryptographic Mechanisms: Recommendations and Key Lengths – Use of Secure Shell (SSH) Version: 2023-1&lt;/A&gt;, i have tried to harden SSH on my R81.20 Gateway using the suggested cryptographic protocols that should be safe until 2029+. This has resulted in the following configuration:&lt;/P&gt;
&lt;PRE&gt;GW8120&amp;gt; show ssh server cipher enabled&lt;BR /&gt;--------------------------------&lt;BR /&gt;enabled cipher:&lt;BR /&gt;--------------------------------&lt;BR /&gt;aes128-gcm@openssh.com&lt;BR /&gt;aes256-gcm@openssh.com&lt;BR /&gt;--------------------------------&lt;BR /&gt;GW8120&amp;gt; show ssh server kex enabled&lt;BR /&gt;--------------------------------&lt;BR /&gt;enabled kex:&lt;BR /&gt;--------------------------------&lt;BR /&gt;diffie-hellman-group16-sha512&lt;BR /&gt;diffie-hellman-group-exchange-sha256&lt;BR /&gt;ecdh-sha2-nistp256&lt;BR /&gt;ecdh-sha2-nistp384&lt;BR /&gt;ecdh-sha2-nistp521&lt;BR /&gt;--------------------------------&lt;BR /&gt;GW8120&amp;gt; show ssh server mac enabled&lt;BR /&gt;--------------------------------&lt;BR /&gt;enabled mac:&lt;BR /&gt;--------------------------------&lt;BR /&gt;hmac-sha2-256&lt;BR /&gt;hmac-sha2-256-etm@openssh.com&lt;BR /&gt;hmac-sha2-512&lt;BR /&gt;hmac-sha2-512-etm@openssh.com&lt;BR /&gt;--------------------------------&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;I would like to receive comments, additions and critical statements concerning SSH cryptographic protocols in CP products!&lt;/P&gt;
&lt;P&gt;Additional note: Suggested secure ciphers also include aes128-ctr, aes192-ctr and aes256-ctr, but the recommendation is AEAD_AES_128_GCM and AEAD_AES_256_GCM.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 09:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183322#M30561</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-06-06T09:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183373#M30571</link>
      <description>&lt;P&gt;R81.20 has a newer version of OpenSSH that supports more recent ciphers than earlier releases.&lt;BR /&gt;And has commands built into clish to manage them &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 19:47:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183373#M30571</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-06T19:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183381#M30574</link>
      <description>&lt;P&gt;That is true - i am writing about R81.20 and using these CLISH commands as seen above.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 21:09:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183381#M30574</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-06-06T21:09:08Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183396#M30575</link>
      <description>&lt;P&gt;Good to know &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 01:40:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183396#M30575</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-06-07T01:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183399#M30576</link>
      <description>&lt;P&gt;Hmm - Thanks for the information but I being a linux geek always prefer to modify sshd.conf or in checkpoint case may be edit sshd templates file?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 02:54:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183399#M30576</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2023-06-07T02:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183400#M30577</link>
      <description>&lt;P&gt;From my R81.20 jumbo 14 lab:&lt;/P&gt;
&lt;P&gt;quantum-firewall&amp;gt; show ssh server cipher enabled&lt;BR /&gt;--------------------------------&lt;BR /&gt;enabled cipher:&lt;BR /&gt;--------------------------------&lt;BR /&gt;aes128-ctr&lt;BR /&gt;aes128-gcm@openssh.com&lt;BR /&gt;aes192-ctr&lt;BR /&gt;aes256-ctr&lt;BR /&gt;aes256-gcm@openssh.com&lt;BR /&gt;chacha20-poly1305@openssh.com&lt;BR /&gt;--------------------------------&lt;BR /&gt;quantum-firewall&amp;gt; show ssh server mac enabled&lt;BR /&gt;--------------------------------&lt;BR /&gt;enabled mac:&lt;BR /&gt;--------------------------------&lt;BR /&gt;hmac-sha1&lt;BR /&gt;hmac-sha1-etm@openssh.com&lt;BR /&gt;hmac-sha2-256&lt;BR /&gt;hmac-sha2-256-etm@openssh.com&lt;BR /&gt;hmac-sha2-512&lt;BR /&gt;hmac-sha2-512-etm@openssh.com&lt;BR /&gt;umac-64-etm@openssh.com&lt;BR /&gt;umac-64@openssh.com&lt;BR /&gt;umac-128-etm@openssh.com&lt;BR /&gt;umac-128@openssh.com&lt;BR /&gt;--------------------------------&lt;BR /&gt;quantum-firewall&amp;gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 04:18:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183400#M30577</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-06-07T04:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183413#M30581</link>
      <description>&lt;P&gt;See the linked doc for recommended macs. But why do you post your settings instead of comments or additions as requested?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 07:25:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183413#M30581</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-06-07T07:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183414#M30582</link>
      <description>&lt;P&gt;Yes, see &lt;A href="https://support.checkpoint.com/results/sk/sk106031" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk106031: How to change SSH encryption protocols and Message Authentication Code settings&lt;/SPAN&gt;&lt;/A&gt;! For small changes the clish commands do come handy...&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2023 07:23:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/183414#M30582</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-06-07T07:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/267151#M44927</link>
      <description>&lt;P&gt;Hello, I have just noticed&amp;nbsp;CVE-2023-48795 of 2023 which advises to disable&amp;nbsp;cipher&amp;nbsp;&lt;SPAN&gt;chacha20-poly1305.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I was expecting on latest hotfixes, this cipher would have been disabled by default. Today, on 2026, on reccomanded hotfix Take 120, this cipher is still enabled, so I will disable on all gateways. To me it is an unexpected behavior. Why ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 09:10:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/267151#M44927</guid>
      <dc:creator>Ilovecheckpoint</dc:creator>
      <dc:date>2026-01-13T09:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/267221#M44938</link>
      <description>&lt;P&gt;It appears the default for this setting changed in R82 and above.&lt;BR /&gt;However, that only applies for fresh installs as upgrades (JHF or version) do not change existing settings.&lt;BR /&gt;A fresh install of R81.20 (and presumably earlier releases) appears to have chacha20-poly1305 enabled by default.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 17:03:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/267221#M44938</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-01-13T17:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: BSI recommended SSH hardening</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/267241#M44939</link>
      <description>&lt;P&gt;That CVE is technically an issue, but all an attacker could do with it is disable keystroke timing obfuscation or cause the session to break.&lt;/P&gt;
&lt;P&gt;The keystroke timing obfuscation feature was &lt;A href="https://www.openssh.org/txt/release-9.5" target="_self"&gt;added in OpenSSH 9.5&lt;/A&gt;, and the most recent version Check Point ships is 8.7p1 in R82.10. The feature isn't in any version they ship, so that aspect of the CVE is not relevant.&lt;/P&gt;
&lt;P&gt;The attack requires that the attacker be able to discard packets between the client and server. An attacker who can do that can obviously break the connection without attacking the cryptography: just discard the SYNs!&lt;/P&gt;
&lt;P&gt;This CVE is a total nonissue for Check Point systems. You should have&amp;nbsp;ChaCha20-Poly1305 enabled. It's both stronger and faster than AES128-GCM.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 21:55:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BSI-recommended-SSH-hardening/m-p/267241#M44939</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-01-13T21:55:54Z</dc:date>
    </item>
  </channel>
</rss>

