<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VA issue in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/va-issue/m-p/408828#M1160</link>
    <description>&lt;H3&gt;&lt;SPAN&gt;For SSH&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; configure
# delete deviceconfig system ssh
# set deviceconfig system ssh ciphers mgmt aes256-ctr
# set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256
# set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256
# set deviceconfig system ssh session-rekey mgmt interval 3600
# set deviceconfig system ssh mac mgmt hmac-sha2-256
# commit
# exit
&amp;gt; set ssh service-restart mgmt&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you need to move away from using the diffie-hellman key exchange algorithm, you need to upgrade to PAN-OS 9.0 or above.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;After upgrading, to modify the key-exchange algorithm for SSH please execute:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; configure
# set deviceconfig system ssh kex mgmt ecdh-sha2-nistp256
# commit
# exit
&amp;gt; set ssh service-restart mgmt&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please note that stronger versions are also available, so you can pick the one that you prefer, additional options include ecdh-sha2-nistp384 or ecdh-sha2-nistp521.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The command for those would instead be:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;# set deviceconfig system ssh kex mgmt ecdh-sha2-nistp384
# set deviceconfig system ssh kex mgmt ecdh-sha2-nistp521&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Special note for SSH:&lt;/P&gt;
&lt;P class="p1"&gt;If you are in HA, make sure you have an open SSH session to the secondary firewall prior to running those commands on a primary member in a cluster, because once you commit, and the config gets synced to the secondary, it won't let you SSH in until the SSH service is restarted. If you do forget, a simple way around it is to enable Telnet through GUI, jump in via Telnet, run the restart command and then disable Telnet again. Otherwise you have to get console access.&lt;/P&gt;
&lt;H3&gt;For SSL/TLS:&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;set shared ssl-tls-service-profile TLS-PROFILE protocol-settings min-version tls1-2
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings max-version max
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings auth-algo-sha1 no
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings enc-algo-3des no
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings enc-algo-rc4 no
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings keyxchg-algo-dhe no&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;Special note for SSL:&lt;/P&gt;
&lt;P class="p2"&gt;If you move to using a ECDSA self-signed certificate for management, make sure you deploy a chained certificate. If you instead used a standalone ECDSA CA certificate it won't work and you will lose access to the WebUI. If you want to be careful, enable the HTTP service temporarily until you verify that the HTTPS access is working properly.&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;You can verify which algorithms the firewall is running by using these NMAP commands:&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;SSH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;nmap --script ssh2-enum-algos -sV -p 22 [TARGET_IP]&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;SSL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;nmap --script ssl-enum-ciphers -p 443 [TARGET_IP]&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Here are official KBs which cover this topic as well.&lt;/P&gt;
&lt;P class="p2"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG" target="_self"&gt;HOW TO FIX WEAK CIPHERS AND KEYS ON THE MANAGEMENT INTERFACE FOR SSH ACCESS&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-cli-quick-start/get-started-with-the-cli/refresh-ssh-keys-mgt-port-connection.html" target="_self"&gt;Refresh SSH Keys and Configure Key Options for Management Interface Connection&lt;/A&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5mCAC" target="_self"&gt;INFORMATION ON SWEET32 FOR PALO ALTO NETWORKS CUSTOMERS&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC" target="_self"&gt;HOW TO DISABLE MEDIUM STRENGTH SSL CIPHERS FOR SSL/TLS SERVICE PROFILE&lt;/A&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 24 May 2021 22:40:42 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2021-05-24T22:40:42Z</dc:date>
    <item>
      <title>VA issue</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/va-issue/m-p/408655#M1159</link>
      <description>&lt;P&gt;Is there anyway to solve those VA issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) 90317 - SSH Weak Algorithms Supported&lt;/P&gt;&lt;P&gt;2) 42873 - SSL Medium Strength Cipher Suites Supported (SWEET32)&lt;/P&gt;&lt;P&gt;3) 70658 - SSH Server CBC Mode Ciphers Enabled&lt;/P&gt;&lt;P&gt;4) 71049 - SSH Weak MAC Algorithms Enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly help please..Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 24 May 2021 08:12:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/va-issue/m-p/408655#M1159</guid>
      <dc:creator>Vector</dc:creator>
      <dc:date>2021-05-24T08:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: VA issue</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/va-issue/m-p/408828#M1160</link>
      <description>&lt;H3&gt;&lt;SPAN&gt;For SSH&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; configure
# delete deviceconfig system ssh
# set deviceconfig system ssh ciphers mgmt aes256-ctr
# set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256
# set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256
# set deviceconfig system ssh session-rekey mgmt interval 3600
# set deviceconfig system ssh mac mgmt hmac-sha2-256
# commit
# exit
&amp;gt; set ssh service-restart mgmt&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you need to move away from using the diffie-hellman key exchange algorithm, you need to upgrade to PAN-OS 9.0 or above.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;After upgrading, to modify the key-exchange algorithm for SSH please execute:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; configure
# set deviceconfig system ssh kex mgmt ecdh-sha2-nistp256
# commit
# exit
&amp;gt; set ssh service-restart mgmt&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please note that stronger versions are also available, so you can pick the one that you prefer, additional options include ecdh-sha2-nistp384 or ecdh-sha2-nistp521.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The command for those would instead be:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;# set deviceconfig system ssh kex mgmt ecdh-sha2-nistp384
# set deviceconfig system ssh kex mgmt ecdh-sha2-nistp521&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Special note for SSH:&lt;/P&gt;
&lt;P class="p1"&gt;If you are in HA, make sure you have an open SSH session to the secondary firewall prior to running those commands on a primary member in a cluster, because once you commit, and the config gets synced to the secondary, it won't let you SSH in until the SSH service is restarted. If you do forget, a simple way around it is to enable Telnet through GUI, jump in via Telnet, run the restart command and then disable Telnet again. Otherwise you have to get console access.&lt;/P&gt;
&lt;H3&gt;For SSL/TLS:&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;set shared ssl-tls-service-profile TLS-PROFILE protocol-settings min-version tls1-2
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings max-version max
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings auth-algo-sha1 no
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings enc-algo-3des no
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings enc-algo-rc4 no
set shared ssl-tls-service-profile TLS-PROFILE protocol-settings keyxchg-algo-dhe no&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;Special note for SSL:&lt;/P&gt;
&lt;P class="p2"&gt;If you move to using a ECDSA self-signed certificate for management, make sure you deploy a chained certificate. If you instead used a standalone ECDSA CA certificate it won't work and you will lose access to the WebUI. If you want to be careful, enable the HTTP service temporarily until you verify that the HTTPS access is working properly.&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;You can verify which algorithms the firewall is running by using these NMAP commands:&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;SSH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;nmap --script ssh2-enum-algos -sV -p 22 [TARGET_IP]&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;SSL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;nmap --script ssl-enum-ciphers -p 443 [TARGET_IP]&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Here are official KBs which cover this topic as well.&lt;/P&gt;
&lt;P class="p2"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PN5bCAG" target="_self"&gt;HOW TO FIX WEAK CIPHERS AND KEYS ON THE MANAGEMENT INTERFACE FOR SSH ACCESS&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-cli-quick-start/get-started-with-the-cli/refresh-ssh-keys-mgt-port-connection.html" target="_self"&gt;Refresh SSH Keys and Configure Key Options for Management Interface Connection&lt;/A&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm5mCAC" target="_self"&gt;INFORMATION ON SWEET32 FOR PALO ALTO NETWORKS CUSTOMERS&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CmqeCAC" target="_self"&gt;HOW TO DISABLE MEDIUM STRENGTH SSL CIPHERS FOR SSL/TLS SERVICE PROFILE&lt;/A&gt;&lt;SPAN class="s1"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 May 2021 22:40:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/va-issue/m-p/408828#M1160</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-05-24T22:40:42Z</dc:date>
    </item>
    <item>
      <title>Re: VA issue</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/va-issue/m-p/596029#M2264</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any impact on taking ssh access of palo alto, if we apply the ssh cli commands given by you. if yes, what precaution we can take.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 09:36:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/va-issue/m-p/596029#M2264</guid>
      <dc:creator>vishalrsshah</dc:creator>
      <dc:date>2024-08-27T09:36:27Z</dc:date>
    </item>
  </channel>
</rss>

