What Ciphers and algorithms are used with PAM?
search cancel

What Ciphers and algorithms are used with PAM?

book

Article ID: 191438

calendar_today

Updated On:

Products

CA Privileged Access Manager (PAM) CA Privileged Access Manager - Cloakware Password Authority (PA) CA Privileged Access Manager - Server Control (PAMSC)

Issue/Introduction

What Ciphers and algorithms are used with PAM 3.2.2 and 3.3.3?

Environment

Release : 3.2.2, 3.3.3

Component : PRIVILEGED ACCESS MANAGEMENT

Resolution



3.2.2 - OpenSSH 6.7

3.3.3 - OpenSSH 7.6

Mindterm:

kex  ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521, diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
hmacs  hmac-sha2-256,hmac-sha2-512,[email protected],[email protected],[email protected],hmac-sha1,hmac-md5,hmac-sha1-96,hmac-md5-96
ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,blowfish-ctr,blowfish-cbc,aes192-cbc,aes256-cbc,3des-ctr,3des-cbc,arcfour,[email protected]

Mindterm:

kex ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256
hmac hmac-sha2-512,hmac-sha2-256
ciphers aes256-ctr,aes256-cbc,aes192-ctr,aes192-cbc,aes128-ctr

Target Connector:

Cipher  : aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc

HMAC :hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96

Key Ex : ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1

Target Connector:

cipher   aes256-ctr,aes256-cbc,aes192-ctr,aes192-cbc,aes128-ctr
hmac  hmac-sha2-512,hmac-sha2-256,hmac-sha1,hmac-sha1-96
Key Ex-   ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1

SSH Proxy

KEX algorithm: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1

ciphers: aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],[email protected]
MACs [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1

SSH Proxy

KEX algorithms: [email protected],ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256
ciphers[email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr
MACs[email protected],[email protected],hmac-sha2-512,hmac-sha2-256

With weak cipher support patch

KEX algorithms: curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c

ciphers[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]
MACs [email protected],[email protected],[email protected],[email protected],hmac-sha1-[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1