How to fix the error "SSH Protocol Version 1 Session Key Retrieval"

Description

PCI scan of the SonicWall UTM appliance reports the following vulnerability: "SSH Protocol Version 1 Session Key Retrieval".

Resolution for SonicOS 7.X

This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.

SonicWall UTM appliances uses SSH1 along with SSH2 and as of now we cannot disable SSH1 alone. But this vulnerability can be remedied using one of the following resolutions.

Resolution1: Disable SSH on the WAN interfaces.

Step 1: Click Network|System|Interfaces. Click Configure icon on the Wan interface.

Image

Step 2: Disable SSH management and click OK.

Image

Resolution 2:  Allow SSH management access only from specific trusted source IP Addresses.

Step1: Click Object in the top navigation menu. Go to Match Objects | Addresses and click Add under address objects.

Step2: Enter the name for the object and enter the IP address of the computer from where you are trying to take SSH session. Select the zone as WAN.

Image

 Step3: Go to Policy | Rules and Policies | Access Rules and select WAN > WAN rule.  You can see the SSH             management rule.

  Image

  Step4:  Edit the rule and select "My IP address" from the drop down list.

Image

 Note: If you want to allow multiple IP addresses, you need to create address objects and group them together in a     address   group. Then select the address group in the source of access rule.



Resolution for SonicOS 6.5

This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.

SonicWall UTM appliances uses SSH1 along with SSH2 and as of now we cannot disable SSH1 alone. But this vulnerability can be remedied using one of the following resolutions.

Resolution1: Disable SSH on the WAN interfaces.

Step 1: Click Manage in the top navigation menu. Go to Network | Iinterfaces. Click Configure icon on the WAN interface.

Image

Step 2: Disable SSH management and click OK.

Image

Resolution 2:  Allow SSH management access only from specific trusted source IP Addresses.

Step1: Click Manage in the top navigation menu. Go to Objects | Address Objects and click Add under address objects.


Step2: Enter the name for the object and enter the IP address of the computer from where you are trying to take SSH session. Select the zone as WAN.


Image


Step3: Go to Rules | AcceSS Rules and select WAN > WAN rule.  You can see the SSH management rule.

Image


Step4:  Edit the rule and select "My IP address" from the drop down list.

Image

Note: If you want to allow multiple IP addresses, you need to create address objects and group them together in a address group. Then select the address group in the source of access rule.
 

Resolution for SonicOS 6.2 and Below

The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.

SonicWall UTM appliances uses SSH1 along with SSH2 and as of now we cannot disable SSH1 alone. But this vulnerability can be remedied using one of the following resolutions.

Resolution1: Disable SSH on the WAN interfaces.

Step 1: Goto Network | Iinterface. Click Configure icon on the WAN interface.

Image

Step 2: Disable SSH management and click OK.

Image

Resolution 2:  Allow SSH management access only from specific trusted source IP Addresses.

Step1: Go to Firewall | Address Objectt
 and click Add under address objects.

Step2: Enter the name for the object and enter the IP address of the computer from where you are trying to take SSH session. Select the zone as WAN.


Image


Step3: Goto Firewall | AcceSS Rule and select WAN > WAN rule.  You can see the SSH management rule.

Image


Step4:  Edit the rule and select "My IP address" from the drop down list.

Image

Note: If you want to allow multiple IP addresses, you need to create address objects and group them together in a address group. Then select the address group in the source of access rule.

Related Articles

  • Using 31-Bit Prefixes on IPv4 Address Error: Index of the interface: Invalid IP Address
    Read More
  • How to block a website using CFS 4.0 CLI commands
    Read More
  • How to Configure Wire / Tap mode in SonicOS
    Read More
not finding your answers?
was this article helpful?