Changes

Debian Linux Distribution Reference

372 bytes removed, 06:03, 27 February 2017
/* Configuration */
The following lines were added (+) and removed (-):
Supporting legacy ciphers for backwards compatibility is necessary to connect "ssh" with SecureCRT.  The ssh server "sshd" ciphers can be configured via the file:Once installed and running sshd will allow you to remote connect.  If trying to use an old secure terminal software you might find that the cipher is no longer permitted.  You can [[Enable Legacy Cipher in Linux for SecureCRT]] but be advised that this will put the security of your machine at risk.  For an internal LAN server it is not a big deal, but enabling insecure ciphers on an Internet attached machine is not advised. vi /etc/ssh/sshd_configSee what ciphers are available on your system: ssh -Q cipher localhostEven though 3des-cbc is enabled in the configuration, the client using 3des-cbc is rejected, as evidence in the log cat /var/log/auth.logIt turns out that number of version 2 ciphers have been disabled in the 6.7p1-1 release of openssh.  Lets see what version of OpenSSH we have. dpkg-query -l|grep -i opensshDebian Linux Jessie reports openssh-server 1:6.7p1-5+deb8u3 which has the following ciphers disabled: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,arcfour128,arcfour256,aes128-cbc,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se
Bureaucrat, administrator
16,192
edits