Mitigating SSH Weak MAC Algorithms Supported and SSH Weak Encryption Algorithms Supported on HPE Aruba-OS Switches

Having recently setup OpenVAS (something I will likely blog about in further detail soon) I have found out that the default out of box deployment of Aruba-OS (formally ProCurve) supports a number of insecure SSH Algorithms with messages similar to the ones below logged even when running the latest firmware releases (YA.16.03.0004 on the 2530 series).

SSH Weak Encryption Algorithms Supported
The remote SSH server is configured to allow weak encryption algorithms.

and

SSH Weak MAC Algorithms Supported
The remote SSH server is configured to allow weak MD5 and/or 96-bit MAC algorithms.

To secure the switch simply run the following commands while logged into the switch

config
no ip ssh cipher aes128-cbc
no ip ssh cipher 3des-cbc
no ip ssh cipher aes192-cbc
no ip ssh cipher aes256-cbc
no ip ssh cipher rijndael-cbc@lysator.liu.se
no ip ssh cipher aes128-ctr
no ip ssh cipher aes192-ctr
no ip ssh mac hmac-md5
no ip ssh mac hmac-sha1-96
no ip ssh mac hmac-md5-96
write memory

0
Be the first one to like this.
Please wait...

One comment

  1. After adding the above commands,

    no ip ssh cipher aes128-cbc
    no ip ssh cipher 3des-cbc
    no ip ssh cipher aes192-cbc
    no ip ssh cipher aes256-cbc
    no ip ssh cipher rijndael-cbc@lysator.liu.se
    no ip ssh cipher aes128-ctr
    no ip ssh cipher aes192-ctr
    no ip ssh mac hmac-md5
    no ip ssh mac hmac-sha1-96
    no ip ssh mac hmac-md5-96

    Rapid7 scanning shows that the switch is “incomplete asset”, which can not be scanned.

    Pls. kindly advise.

    No votes yet.
    Please wait...

Leave a Reply

Your email address will not be published. Required fields are marked *