Solved

SSH - How to Disable CBC Mode Cipher Encryption and Enable CTR or GCM Cipher MOde Encryption?

Posted on 2015-01-13
4
5,786 Views
Last Modified: 2015-01-14
Hello Experts - Curious if someone could instruct me how to disable CBC mode cipher encryption, and enable CTR or GCM cipher mode encryption.  Any help or suggestions are greatly appreciated.
0
Comment
Question by:itsmevic
  • 2
  • 2
4 Comments
 
LVL 23

Accepted Solution

by:
savone earned 500 total points
ID: 40548256
You can simply add the ciphers option in the sshd_config by adding the following line:

Ciphers aes128-ctr,aes192-ctr,aes256-ctr
0
 

Author Closing Comment

by:itsmevic
ID: 40548794
Awesome, thank you!
0
 

Author Comment

by:itsmevic
ID: 40548851
I'm assuming I can add that line anywhere in the sshd_config file?   Is there a command to save my work?   Pardon my ignorance, I'm new with Linux.

Basically, how I'm going into it now is that I'm logging in as Root, then doing a:  

# vim /etc/ssh/sshd_config it will open and ask me if I want to Open, Delete, Edit, etc the file.  I choose "E" for Edit, then I went in and added Ciphers aes128-ctr,aes192-ctr,aes256-ctr  at the very bottom of the config file, then X'd out of the terminal window, thinking it would save my changes but I'm not sure if it is or not.  When I try and go back into the config file it's telling me that it's detected a SWP file of the config file.
0
 
LVL 23

Expert Comment

by:savone
ID: 40549311
You have to write the file first before closing the Window.

After making the edit hit escape to get out if edit mode. Then type :wq and hit enter to save.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The purpose of this article is to demonstrate how we can use conditional statements using Python.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question