You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<li><code>KexAlgorithms</code>: the key exchange methods that are used to generate
32
-
<li><code>HostkeyAlgorithms</code>: the public key algorithms accepted for a SSH server to authenticate itself to a ssh client.
32
+
per-connection keys
33
+
<li><code>HostkeyAlgorithms</code>: the public key algorithms accepted for an SSH
34
+
server to authenticate itself to an SSH client
33
35
<li><code>Ciphers</code>: the ciphers to encrypt the connection
34
36
<li><code>MACs</code>: the message authentication codes used to detect traffic
35
37
modification
@@ -53,24 +55,24 @@ <h2 id=OpenBSD>
53
55
In this case, the client and server were unable to agree on the key
54
56
exchange algorithm. The server offered only a single method
55
57
<code>diffie-hellman-group1-sha1</code>. OpenSSH supports this method,
56
-
but does not enable it by default because is weak and within theoretical
58
+
but does not enable it by default because it is weak and within theoretical
57
59
range of the so-called Logjam attack.
58
60
59
61
<p>
60
62
Several related options come into play later during user authentication.
61
63
<ul>
62
64
<li><code>PubkeyAcceptedKeyTypes</code> (ssh/sshd): the public key
63
65
algorithms that will be attempted by the client, and accepted by the server
64
-
for public-key authentication (e.g. via <code>.ssh/authorized_keys</code>).
66
+
for public-key authentication (e.g. via <code>.ssh/authorized_keys</code>)
65
67
<li><code>HostbasedKeyTypes</code> (ssh) and <code>HostbasedAcceptedKeyTypes</code> (sshd): the key types that will be attempted by the client, and accepted by
66
68
the server for host-based authentication (.e.g. via <code>.rhosts</code> or
67
-
<code>.shosts</code>).
69
+
<code>.shosts</code>)
68
70
</ul>
69
71
70
72
<p>
71
73
A mismatch between the client and server during authentication will cause
72
74
authentication to fail, despite it appearing to be configured. For example,
73
-
a<code>ssh-dss</code> user key may be listed in
75
+
an<code>ssh-dss</code> user key may be listed in
74
76
<code>.ssh/authorized_keys</code> but may not pass authentication because,
75
77
by default, sshd does not accept this key type.
76
78
</p>
@@ -79,15 +81,15 @@ <h2 id=OpenBSD>
79
81
The best resolution for these failures is to upgrade the software at
80
82
the other end and/or replace the weak key types with safer modern types.
81
83
OpenSSH only disables algorithms that we actively
82
-
recommend against using because they are known to be weak. In
83
-
some cases, this might not be immediately possible so you may need to
84
+
recommend against using because they are known to be weak.
85
+
This might not be immediately possible in some cases, so you may need to
84
86
temporarily re-enable the weak algorithms to retain access.
85
87
86
88
<p>
87
89
For the case of the above error message, OpenSSH can be configured to enable
88
90
the <code>diffie-hellman-group1-sha1</code>
89
91
key exchange algorithm (or any other that is disabled by default) using
90
-
the <code>KexAlgorithms</code> option - either on the command-line:
92
+
the <code>KexAlgorithms</code> option, either on the commandline:
0 commit comments