<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH Server CBC Mode Ciphers Enabled in ExtremeSwitching (Other)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-other/ssh-server-cbc-mode-ciphers-enabled/m-p/11868#M2896</link>
    <description>How do I resolve the below audit finding on the  C3 Switch?&lt;BR /&gt;
SSH Server CBC Mode Ciphers Enabled&lt;BR /&gt;
SSH Weak MAC Algorithms Enabled&lt;BR /&gt;</description>
    <pubDate>Tue, 23 Aug 2016 14:32:00 GMT</pubDate>
    <dc:creator>Andy_Robb</dc:creator>
    <dc:date>2016-08-23T14:32:00Z</dc:date>
    <item>
      <title>SSH Server CBC Mode Ciphers Enabled</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/ssh-server-cbc-mode-ciphers-enabled/m-p/11868#M2896</link>
      <description>How do I resolve the below audit finding on the  C3 Switch?&lt;BR /&gt;
SSH Server CBC Mode Ciphers Enabled&lt;BR /&gt;
SSH Weak MAC Algorithms Enabled&lt;BR /&gt;</description>
      <pubDate>Tue, 23 Aug 2016 14:32:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/ssh-server-cbc-mode-ciphers-enabled/m-p/11868#M2896</guid>
      <dc:creator>Andy_Robb</dc:creator>
      <dc:date>2016-08-23T14:32:00Z</dc:date>
    </item>
    <item>
      <title>RE: SSH Server CBC Mode Ciphers Enabled</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/ssh-server-cbc-mode-ciphers-enabled/m-p/11869#M2897</link>
      <description>The C3-Series switches are heading to the end of support and there are no plans to modifying SSH on those solutions.  &lt;BR /&gt;
&lt;BR /&gt;
The OpenSSH Security Advisory provides the following information: &lt;BR /&gt;
&lt;BR /&gt;
"&lt;I&gt;For most SSH usage scenarios, this attack has a very low likelihood of being carried out successfully - each attempt has a low probability of success and each failure will cause connection termination with a fatal error. It is therefore very unlikely for an interactive session to be usefully attacked using this protocol weakness: an attacker would expect around 11356 connection-killing attempts before they are likely to succeed.&lt;/I&gt;"&lt;BR /&gt;
&lt;BR /&gt;
Additional information is available at &lt;A href="http://www.openssh.com/txt/cbc.adv" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.openssh.com/txt/cbc.adv&lt;/A&gt;. &lt;BR /&gt;
&lt;BR /&gt;
I hope it helps.</description>
      <pubDate>Tue, 23 Aug 2016 19:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/ssh-server-cbc-mode-ciphers-enabled/m-p/11869#M2897</guid>
      <dc:creator>AG1</dc:creator>
      <dc:date>2016-08-23T19:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: SSH Server CBC Mode Ciphers Enabled</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-other/ssh-server-cbc-mode-ciphers-enabled/m-p/11870#M2898</link>
      <description>How about for an S4 chassis switch?  Any plans on fixing it there with this OS?&lt;BR /&gt;
Or this open issue? xos0060993&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 13 Oct 2017 19:00:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-other/ssh-server-cbc-mode-ciphers-enabled/m-p/11870#M2898</guid>
      <dc:creator>Eddie_Brown</dc:creator>
      <dc:date>2017-10-13T19:00:00Z</dc:date>
    </item>
  </channel>
</rss>

