Possible to disable SSH CBC cipher and weak MAC hashing?

L0 Member

Possible to disable SSH CBC cipher and weak MAC hashing?



May I check if it is possible to disable SSH CBC cipher and weak MAC hashing on Palo Alto Firewall?

If so, may I know how to do it.


Had no luck searching for a solution online.

Seems like there is no menu/config file (e.g. /etc/ssh/ssh_config) to edit such settings.


This is with relation to Nessus vulnerability findings.

Try to see how it can be addressed.





Thank you in advance

Tags (2)
L4 Transporter



Even the latest Pan-OS version running in FIPS mode still has cbc enabled. There is not a way to modify this. 



Non-FIPS/CC mode 

Decryption (SSHv2 only) 

Ciphers: aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc 

MAC Algorithms: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-sha1-96,hmac-md5-96 






FIPS/CC mode 


Authentication – RSA (2048 bit key only) 

Key agreement – DH Group 14 (2048 bit) 

Symmetric Algorithm – AES128, AES192, or AES256 (CBC or CTR for all three) 

L1 Bithead

Good link for setting ciphers.  Remember do not include CBC in your config.



For MAC's I used these:

set deviceconfig system ssh mac mgmt hmac-sha1
set deviceconfig system ssh mac mgmt hmac-sha2-256
set deviceconfig system ssh mac mgmt hmac-sha2-512
Tags (1)
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!