<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: *Urgent* SSH Protocol Version 1 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/388879#M90558</link>
    <description>&lt;P&gt;I have been trying to find out in the release notes to see where SSH version 1 is disabled completely. Any pointers would be appreciate it.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Mar 2021 18:08:00 GMT</pubDate>
    <dc:creator>Ram_Bista</dc:creator>
    <dc:date>2021-03-03T18:08:00Z</dc:date>
    <item>
      <title>*Urgent* SSH Protocol Version 1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/305853#M79492</link>
      <description>&lt;P&gt;Hi Peeps,&lt;/P&gt;&lt;P&gt;I got technical query regarding how to change SSH v1 to SSH v2 in PA firewall, Because one of our customer got an alert from VAPT tool like as follows,.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Description :-&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;KPMG test team observed that the Secure Shell protocol version 1 support was enabled on the tested devices.&lt;/P&gt;&lt;P&gt;Secure Shell is typically used as a cryptographically secure alternative to Telnet and other clear-text protocols. In addition to command-based access, Secure Shell services can enable the forwarding of network ports (such as X forwarding) or the transfer of files (such as Secure Copy or Secure File Transfer Protocol).&lt;/P&gt;&lt;P&gt;There are two main versions of the Secure Shell protocol, version 1 and 2. Version 2 was developed to both extend the functionality of the protocol and to enhance security. It is common for Secure Shell servers that support both versions of the protocol to be capable of being configured to support connections from clients using different versions of the protocol in order to maintain backward compatibility.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Severity :- Medium&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CVE/CWE ID :-&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Impact :-&amp;nbsp;Although flaws have been identified with Secure Shell protocol version 2, fundamental flaws exist in protocol version 1.&lt;/P&gt;&lt;P&gt;Recommendation :-&amp;nbsp;It is recommended that the Secure Shell service should be reconfigured to only support version 2 of the protocol.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2020 11:06:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/305853#M79492</guid>
      <dc:creator>sahithyan.subbu</dc:creator>
      <dc:date>2020-01-07T11:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: *Urgent* SSH Protocol Version 1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/305915#M79507</link>
      <description>&lt;P&gt;I did some research, and if you are on 8.0 and higher, you should be able to configure these&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;configure&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes128-cbc&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes192-cbc&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes256-cbc&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes128-ctr&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes192-ctr&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes256-ctr&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes128-gcm&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes256-gcm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will these work for you?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 00:12:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/305915#M79507</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2020-01-08T00:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: *Urgent* SSH Protocol Version 1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/305916#M79508</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I did some research, and if you are on 8.0 and higher, you should be able to configure these&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;configure&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes128-cbc&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes192-cbc&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes256-cbc&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes128-ctr&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes192-ctr&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes256-ctr&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes128-gcm&lt;BR /&gt;set deviceconfig system ssh ciphers mgmt aes256-gcm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will these work for you?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steve these are just the ciphers...not the version of the SSH protocol.&amp;nbsp; In your investigation was there are way to actually configure the SSH version used?&amp;nbsp; If not, I'm guessing the only way to accomplish this setting might be with putting the device into FIPS compliance mode.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 00:50:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/305916#M79508</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2020-01-08T00:50:09Z</dc:date>
    </item>
    <item>
      <title>Re: *Urgent* SSH Protocol Version 1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/305920#M79509</link>
      <description>&lt;P&gt;These are the supported SSH v2 ciphers.&lt;/P&gt;&lt;P&gt;By configuring and allowing only these, then V1 will not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So there is no way to disable SSHv1 support, only configuring the FW to allow the stronger ones, if that makes sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to research... when the scanner tested again, it passed without warning, which is what you are looking to do, I presume...get the warning to no longer show in a scan?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 01:19:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/305920#M79509</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2020-01-08T01:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: *Urgent* SSH Protocol Version 1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/306847#M79700</link>
      <description>&lt;P&gt;What version of PanOS are you running?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On 8.1.12, the only ciphers available are the ones listed above, there are no others available to choose from.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And , if I try to force my SSH client to connect using SSHv1, I get this:&lt;/P&gt;&lt;P&gt;Protocol major versions differ: 1 vs. 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, it looks like with 8.1 and higher, SSHv1 has been disabled completely.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 19:03:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/306847#M79700</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2020-01-15T19:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: *Urgent* SSH Protocol Version 1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/388879#M90558</link>
      <description>&lt;P&gt;I have been trying to find out in the release notes to see where SSH version 1 is disabled completely. Any pointers would be appreciate it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 18:08:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/388879#M90558</guid>
      <dc:creator>Ram_Bista</dc:creator>
      <dc:date>2021-03-03T18:08:00Z</dc:date>
    </item>
    <item>
      <title>Re: *Urgent* SSH Protocol Version 1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/388884#M90561</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/156763"&gt;@Ram_Bista&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not believe you will find that SSHv1 has been discontinued.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think it is up to engineers to know and to deprecate SSH v1, to only allow the FW to communicate via SSH v2 ciphers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 18:30:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/urgent-ssh-protocol-version-1/m-p/388884#M90561</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-03-03T18:30:31Z</dc:date>
    </item>
  </channel>
</rss>

