08-05-2016 01:16 AM
May I check if it is possible to disable SSH CBC cipher and weak MAC hashing on Palo Alto Firewall?
If so, may I know how to do it.
Had no luck searching for a solution online.
Seems like there is no menu/config file (e.g. /etc/ssh/ssh_config) to edit such settings.
This is with relation to Nessus vulnerability findings.
Try to see how it can be addressed.
Thank you in advance
08-18-2016 10:47 AM - last edited on 08-18-2016 04:08 PM by Retired Member
Even the latest Pan-OS version running in FIPS mode still has cbc enabled. There is not a way to modify this.
Decryption (SSHv2 only)
MAC Algorithms: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96
HMAC – HMAC-SHA-1
Authentication – RSA (2048 bit key only)
Key agreement – DH Group 14 (2048 bit)
Symmetric Algorithm – AES128, AES192, or AES256 (CBC or CTR for all three)
08-27-2019 09:19 AM
Good link for setting ciphers. Remember do not include CBC in your config.
For MAC's I used these:
configure set deviceconfig system ssh mac mgmt hmac-sha1 set deviceconfig system ssh mac mgmt hmac-sha2-256 set deviceconfig system ssh mac mgmt hmac-sha2-512 commit
08-12-2021 07:31 AM
As per below I could understand the CBC mode cipher encryption was handling by server not firewall right ? correct me If I'm wrong ...... Also for that we need to reach the concern server OS vendor or support to change encryption CBC to CTR, GCM encryption.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!