The purpose of this document is to list the steps to mitigate the reported vulnerability.
This document provides mitigation steps specifically when the MAC algorithm considered weak is used due to a weak hashing function.
Symptoms:
Security scans on VIDM Appliance may report the below:
"The SSH server supports cryptographically weak Hash-Based Message Authentication Codes (HMACs)"
The scan report will also list the insecure algorithms that it may have found e.g.
Insecure MAC algorithms in use:
SSH MAC algorithms are used to validate data integrity and authenticity.
The MAC algorithm uses a message and private key to generate the fixed-length MAC.
MAC algorithms may be considered weak for the following reasons: