Difference between revisions of "Key exchange method (KEX)"

From wikieduonline
Jump to navigation Jump to search
Line 5: Line 5:
 
* [[Elliptic-curve Diffie–Hellman (ECDH)]]
 
* [[Elliptic-curve Diffie–Hellman (ECDH)]]
  
=== [[OpenSSH changelog]] ===  
+
== [[OpenSSH changelog]] ==  
 
* [[OpenSSH 9.0]] Aug 2022 Use the hybrid Streamlined [[NTRU]] Prime + [[x25519]] [[key exchange]] method by default
 
* [[OpenSSH 9.0]] Aug 2022 Use the hybrid Streamlined [[NTRU]] Prime + [[x25519]] [[key exchange]] method by default
 
* [[OpenSSH 8.5]] 03 March 2021 update/replace the experimental [[post-quantum]] hybrid key exchange method
 
* [[OpenSSH 8.5]] 03 March 2021 update/replace the experimental [[post-quantum]] hybrid key exchange method
Line 19: Line 19:
 
  ssh -o[[KexAlgorithms]]=+diffie-hellman-group1-sha1 123.123.123.123
 
  ssh -o[[KexAlgorithms]]=+diffie-hellman-group1-sha1 123.123.123.123
 
  [[ssh_dispatch_run_fatal]]: Connection to 123.123.123.123 port 22: [[Invalid key length]]
 
  [[ssh_dispatch_run_fatal]]: Connection to 123.123.123.123 port 22: [[Invalid key length]]
 
  
 
== Cisco IOS ==
 
== Cisco IOS ==

Revision as of 11:00, 22 February 2024

wikipedia:Key exchange method

OpenSSH changelog

ssh -V
OpenSSH_8.2p1 Ubuntu-4ubuntu0.2, OpenSSL 1.1.1f  31 Mar 2020
ssh -o PreferredAuthentications=keyboard-interactive -o PubkeyAuthentication=no [email protected]
Unable to negotiate with 10.10.10.2 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1


ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 123.123.123.123
ssh_dispatch_run_fatal: Connection to 123.123.123.123 port 22: Invalid key length

Cisco IOS

show ip ssh

KEX Algorithms:diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1

Related terms

See also

Advertising: