Got it

Different SSH behavior between the V5 and V8 devices

Created: Feb 27, 2021 15:10:18Latest reply: Feb 27, 2021 15:15:50 264 1 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

Hi,

Both V5 and V8 devices are deployed in our environment.

On the V8 device, the SSH client which doesn't allow on the ACL list can still connect and prompt messages as below. 

 SSH

 

SSH

However, the V5 device can block the client which doesn't allow on the ACL list.

SSH


Why the SSH behavior different between the V5 and V8 device?

Featured Answers

Recommended answer

Popeye_Wang
Admin Created Feb 27, 2021 15:15:50

Hello,

There are changes on the authentication mechanism of SSH when comparing the IP address of ACL list.

At V5 platform 

The SSH login process is as follows:

a.  When there is the user trying to access from the public network.

b.  The vty acl command takes effect when applying for VTY resources.

c.  After the TCP three-way handshake is complete and SSH negotiation is complete, the user name and password are authenticated.

d. After the authentication is successful, the VTY resource is applied.

e. The user can log in to the device only after the VTY resource is successfully applied.

 

At V8 platform

The SSH login process is as follows:

a.  After the TCP three-way handshake is complete and SSH negotiation is complete, the user name and password are authenticated.

b. After the authentication is successful, the VTY resource is applied.

c. The user can log in to the device only after the VTY resource is successfully applied.

d. The vty acl command takes effect when applying for VTY resources.

 

 Thus, you might found even if you used an IP address that is not allowed on ACL list under vty view, there is still a message prompt out to enter username/password. And during user authentication, logs are generated regardless of whether the authentication succeeds or fails.

The SSH service contains multiple login protocols. Some protocols require VTY resources while others do not. When a TCP connection is established, the protocol used by the user for login cannot be determined, and the VTY authentication process is not started, therefore, invalid IP cannot be intercepted in VTY mode.

Suggest configuring the ssh server acl 3001 command under system view to restrict users right before TCP establishment.


View more
  • x
  • convention:

All Answers

Hello,

There are changes on the authentication mechanism of SSH when comparing the IP address of ACL list.

At V5 platform 

The SSH login process is as follows:

a.  When there is the user trying to access from the public network.

b.  The vty acl command takes effect when applying for VTY resources.

c.  After the TCP three-way handshake is complete and SSH negotiation is complete, the user name and password are authenticated.

d. After the authentication is successful, the VTY resource is applied.

e. The user can log in to the device only after the VTY resource is successfully applied.

 

At V8 platform

The SSH login process is as follows:

a.  After the TCP three-way handshake is complete and SSH negotiation is complete, the user name and password are authenticated.

b. After the authentication is successful, the VTY resource is applied.

c. The user can log in to the device only after the VTY resource is successfully applied.

d. The vty acl command takes effect when applying for VTY resources.

 

 Thus, you might found even if you used an IP address that is not allowed on ACL list under vty view, there is still a message prompt out to enter username/password. And during user authentication, logs are generated regardless of whether the authentication succeeds or fails.

The SSH service contains multiple login protocols. Some protocols require VTY resources while others do not. When a TCP connection is established, the protocol used by the user for login cannot be determined, and the VTY authentication process is not started, therefore, invalid IP cannot be intercepted in VTY mode.

Suggest configuring the ssh server acl 3001 command under system view to restrict users right before TCP establishment.


View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.