-
-
Notifications
You must be signed in to change notification settings - Fork 301
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for key exchange algorithm diffie-hellman-group-exchange-sha256 #8488
Comments
I checked with the latest Version 4.7 (16463) and it fails with the same error message. For example my OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 that is integrated with OSX works without a hitch. |
The negotiation fails because we find no matching key exchange algorithm. We currently support |
my findings -longer description*
I re-enabled "hmac-sha2-512" in sshd settings /etc/ssh/sshd_config:
Now sshd complains about not being able to agree upon a key exchange method
Cyberduck does not provide the hardened key exchange methods "curve25519-sha256@libssh.org" nor "diffie-hellman-group-exchange-sha256".
|
Any updates on this issue? |
In 18434. |
After latest Snowden leaks it seems that default OpenSSH settings are no longer acceptable for secure communication. See:
https://stribika.github.io/2015/01/04/secure-secure-shell.html
Having the following lines in sshd_config in server side prevents Cyberduck connecting with a error message:
Connection Failed
I get no entries to log drawer.
Sshd config on server side:
At least by the look of it, diffie-helman-group-exchange-sha256 and curve25519-sha256@libssh.org are enabled in these kex settings, so my guess is that the incompatibility is either due lack of appropriate ciphers or a bug in kex implementation.
I'm connecting to
OpenSSH_6.6.1p1 Debian-4~bpo70+1, OpenSSL 1.0.1e 13
The text was updated successfully, but these errors were encountered: