- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- Re: SSH Cipher, SSH Hmac Version
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SSH Cipher, SSH Hmac Version
Anyone can provide me the step of SSH Server Cipher and Hmac Version to change.
Thanks
Win
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Honestly - no comprendo señor, can you please detail what you want to achieve ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi G_W_Albrecht,
I mean, I want to change ssh cipher to strong encryption example ( ciphers aes256-cbc) and also hmac want to do the same
Thanks,
Win
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
To change SSH Ciphers you have to edit this file:
etc/ssh/sshd_config
regards
Roman
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Roman_Niewiad01
Meaning we need to access with winscp and edit sshd_config file? How about cipher hmac file?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Take a look at this thread.
It should explain the process to you 😉
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Roman
I see brother. I found this on the checkpoint.
# Protocol 2,1
# Cipher 3des
# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
Cipher aes256-ctr
Are we able to change this? How about for Cipher 3des can change to higher version?
Best Regards,
Win
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you are using R77.30 it could be, that the sshd is to old and the new settings don`t take affect.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Roman,
Nope we are using R80.10
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You just need to modify the lines in /etc/ssh/ssh_config and /etc/ssh/sshd_config and restart sshd to take effect.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Ciphers aes256-ctr,aes128-ctr,aes192-ctr
MACs hmac-sha1
This will force other machines connecting via ssh to use those Cipers and MACs
