-
-
Notifications
You must be signed in to change notification settings - Fork 323
Closed
Closed
Copy link
Description
cb22c3e created the issue
After latest Snowden leaks it seems that default OpenSSH settings are no longer acceptable for secure communication. See:
https://stribika.github.io/2015/01/04/secure-secure-shell.html
Having the following lines in sshd_config in server side prevents Cyberduck connecting with a error message:
Connection Failed
Unable to reach a settlement: [diffie-hellman-group14-sha1, diffie-hellman-group1-sha1] and [curve25519-sha256@libssh.org, diffie-hellman-group-exchange-sha256]. The connection attempt was rejected. The server may be down, or your network may not be properly configured
I get no entries to log drawer.
Sshd config on server side:
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
At least by the look of it, diffie-helman-group-exchange-sha256 and curve25519-sha256@libssh.org are enabled in these kex settings, so my guess is that the incompatibility is either due lack of appropriate ciphers or a bug in kex implementation.
I'm connecting to OpenSSH_6.6.1p1 Debian-4~bpo70+1, OpenSSL 1.0.1e 13
Metadata
Metadata
Assignees
Labels
sftpSFTP Protocol ImplementationSFTP Protocol Implementation