When attempting to modify the Messaging Gateway ssh server cipher list while running in FIPS mode an error is returned indicating "No such file or directory", a bad cipher spec has been entered, and the configuration is reverting to the last backup.
smg [10.7.5-4]> sshd-config --ciphers 'blowfish-cbc,cast128-cbc,aes128-cbc,aes192-cbc,aes256-cbc,[email protected],aes128-ctr,aes192-ctr,aes256-ctr'
/opt/Symantec/Brightmail/cli/sbin/sshdver: line 37: dev/null: No such file or directory
Please be aware that the ciphers you have selected have not been validated
for being FIPS certified. It is your responsibility to ensure that you
are not including a non-FIPS-certified cipher in your list.
Previous setting for Ciphers:
blowfish-cbc,cast128-cbc,aes128-cbc,aes192-cbc,aes256-cbc,[email protected],aes128-ctr,aes192-ctr,aes256-ctr
New setting for Ciphers:
blowfish-cbc,cast128-cbc,aes128-cbc,aes192-cbc,aes256-cbc,[email protected],aes128-ctr,aes192-ctr,aes256-ctr
Do you wish to make this change? (yes/no) yes
/etc/ssh/sshd_config line 160: Bad SSH2 cipher spec 'blowfish-cbc,cast128-cbc,aes128-cbc,aes192-cbc,aes256-cbc,[email protected],aes128-ctr,aes192-ctr,aes256-ctr'.
sshd_config: Error: new /etc/ssh/sshd_config fails validation. Reverting to backup.
Release : 10.7.5
Component : CLI
This is a known defect when attempting to modify the sshd configuration while running in FIPS mode.
This issue will be addressed in a future release.
This issue only occurs when running in FIPS mode and the sshd configuration can be modified while running in standard / non-FIPS mode. To modify the sshd configuration first exit FIPS mode, modify the ssh daemon via the sshd-config command and then re-enable FIPS mode. The changes made in non-FIPS mode will be retained following the switch back to FIPS mode.
Example
fipsmode off
sshd-config --ciphers '[email protected],aes128-ctr,aes192-ctr,aes256-ctr'
fipsmode on