<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to disable RSA/SHA1  on Palo alto device for SSH access in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/421267#M93933</link>
    <description>&lt;P&gt;&lt;SPAN&gt;to set the cipher suites only on the management interface, you can use a profile&amp;nbsp;for SSH&amp;nbsp;the set of commands is&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&amp;gt; configure
# delete deviceconfig system ssh
# set deviceconfig system ssh ciphers mgmt aes256-ctr
# set deviceconfig system ssh ciphers mgmt aes256-gcm
# set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256
# set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256
# set deviceconfig system ssh session-rekey mgmt interval 3600
# set deviceconfig system ssh mac mgmt hmac-sha2-256
# set deviceconfig system ssh mac mgmt hmac-sha2-512

# commit

# exit
&amp;gt; set ssh service-restart mgmt&lt;/PRE&gt;</description>
    <pubDate>Thu, 22 Jul 2021 09:58:41 GMT</pubDate>
    <dc:creator>blocker95848</dc:creator>
    <dc:date>2021-07-22T09:58:41Z</dc:date>
    <item>
      <title>How to disable RSA/SHA1  on Palo alto device for SSH access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/420903#M93908</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using OpenSSH v8.2 cannot connect to SSH hosts with SSH Proxy enabled (SSH Decryption).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Testing showing that this is due to the Palo Alto attempting to use RSA with SHA1 which has been removed by OpenSSH in v8.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way we can configure the Palo Alto to disable RSA/SHA1 for SSH?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 22:55:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/420903#M93908</guid>
      <dc:creator>Jatin.Singh</dc:creator>
      <dc:date>2021-07-20T22:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable RSA/SHA1  on Palo alto device for SSH access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/421037#M93919</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;If these hosts are internal, why not bypass decryption for them from trusted hosts/users?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 14:57:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/421037#M93919</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-07-21T14:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable RSA/SHA1  on Palo alto device for SSH access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/421267#M93933</link>
      <description>&lt;P&gt;&lt;SPAN&gt;to set the cipher suites only on the management interface, you can use a profile&amp;nbsp;for SSH&amp;nbsp;the set of commands is&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&amp;gt; configure
# delete deviceconfig system ssh
# set deviceconfig system ssh ciphers mgmt aes256-ctr
# set deviceconfig system ssh ciphers mgmt aes256-gcm
# set deviceconfig system ssh default-hostkey mgmt key-type ECDSA 256
# set deviceconfig system ssh regenerate-hostkeys mgmt key-type ECDSA key-length 256
# set deviceconfig system ssh session-rekey mgmt interval 3600
# set deviceconfig system ssh mac mgmt hmac-sha2-256
# set deviceconfig system ssh mac mgmt hmac-sha2-512

# commit

# exit
&amp;gt; set ssh service-restart mgmt&lt;/PRE&gt;</description>
      <pubDate>Thu, 22 Jul 2021 09:58:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/421267#M93933</guid>
      <dc:creator>blocker95848</dc:creator>
      <dc:date>2021-07-22T09:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable RSA/SHA1  on Palo alto device for SSH access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/549456#M112114</link>
      <description>&lt;P&gt;You can also configure the SSH profile directly from the firewall; caveat - you will still need to run the restart command listed above by&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-L0-Member lia-component-message-view-widget-author-username"&gt;&lt;A id="link_18" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/188319" target="_self" aria-label="View Profile of blocker95848"&gt;&lt;SPAN class=""&gt;@Blocker95848&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zmacharia_PA_1-1689529866214.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/51620iFFDD74589DEF5993/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="zmacharia_PA_1-1689529866214.png" alt="zmacharia_PA_1-1689529866214.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zmacharia_PA_0-1689529842973.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/51619i751344E6BAECD378/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="zmacharia_PA_0-1689529842973.png" alt="zmacharia_PA_0-1689529842973.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jul 2023 17:54:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/549456#M112114</guid>
      <dc:creator>zmacharia_PA</dc:creator>
      <dc:date>2023-07-16T17:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to disable RSA/SHA1  on Palo alto device for SSH access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/549462#M112117</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/114565"&gt;@Jatin.Singh&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That is a great question.&amp;nbsp; It would be nice to disabled protocols on the SSH Proxy tab of the decryption profile, but you can't.&amp;nbsp; The only purpose for SSH Proxy is to be able to detect the ssh-tunnel App-ID.&amp;nbsp; The NGFW does not actually perform content inspection on the decrypted traffic.&amp;nbsp; I would disable it as &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt; mentioned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jul 2023 01:23:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-disable-rsa-sha1-on-palo-alto-device-for-ssh-access/m-p/549462#M112117</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-07-17T01:23:10Z</dc:date>
    </item>
  </channel>
</rss>

