Changes

Enable Legacy Cipher in Linux for SecureCRT

798 bytes added, 05:06, 27 February 2017
Created page with "upporting legacy ciphers for backwards compatibility is necessary to connect "ssh" with SecureCRT. The ssh server "sshd" ciphers can be configured via the file: vi /etc/ssh/..."
upporting legacy ciphers for backwards compatibility is necessary to connect "ssh" with SecureCRT. The ssh server "sshd" ciphers can be configured via the file: vi /etc/ssh/sshd_config See what ciphers are available on your system: ssh -Q cipher localhost Even though 3des-cbc is enabled in the configuration, the client using 3des-cbc is rejected, as evidence in the log cat /var/log/auth.log It turns out that number of version 2 ciphers have been disabled in the 6.7p1-1 release of openssh. Lets see what version of OpenSSH we have. dpkg-query -l|grep -i openssh Debian Linux Jessie reports openssh-server 1:6.7p1-5+deb8u3 which has the following ciphers disabled: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,arcfour128,arcfour256,aes128-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
Bureaucrat, administrator
16,199
edits