Il giorno gio 22 nov 2018 alle ore 20:50 owl...@gmail.com
<owl...@gmail.com> ha scritto:
>
> Il giorno gio 22 nov 2018 alle ore 20:48 Roberto C. Sánchez
> <robe...@debian.org> ha scritto:
> >
> > On Thu, Nov 22, 2018 at 08:40:52PM +0100, owl...@gmail.com wrote:
> > > Thanks Roberto,
> > >
> > > I have tried also the latest dropbear server but this is incompatible too
> > >
> > > Do you have idea how can I find appropriate key exchange and cipher 
> > > algorithms?
> > >
> > Please don't top post.  It is considered impolite.
> >
> > I do not use dropbear, but I would expect its documentation should
> > provide a list of supported key exchange and cipher algorithms.  You
> > could then look at the output of 'ssh -Q kex' and 'ssh -Q cipher' for
> > lists of key exchange and cipher algorithms supported by ssh on your
> > system, respectively.
> >
> > I also forgot to mention in my earlier reply that you might need to
> > specify weaker MAC algorithms.  Available MAC algorithms can be obtained
> > with 'ssh -Q mac'.
> >
> > Regards,
> >
> > -Roberto
> >
> > --
> > Roberto C. Sánchez
> >
>
> Thanks Roberto, tomorrow ill'try

I have tried to use the right KexAlgorithm and Ciphers, but dropbear
client fail always

myhostname sshd[3905]: debug1: SSH2_MSG_KEXINIT sent [preauth]

There aren't other debug messages

Only for test purpose i have add all options i can in
/etc/sshd_config, but nothing, what am I doing wrong?

Ciphers 
3des-cbc,blowfish-cbc,cast128-cbc,arcfour,arcfour128,arcfour256,aes128-cbc,aes192-cbc,aes256-cbc,rijndael-...@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com,chacha20-poly1...@openssh.com
HostbasedAcceptedKeyTypes
ssh-ed25519,ssh-ed25519-cert-...@openssh.com,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,ecdsa-sha2-nistp256-cert-...@openssh.com,ecdsa-sha2-nistp384-cert-...@openssh.com,ecdsa-sha2-nistp521-cert-...@openssh.com
HostKeyAlgorithms
ssh-ed25519,ssh-ed25519-cert-...@openssh.com,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,ecdsa-sha2-nistp256-cert-...@openssh.com,ecdsa-sha2-nistp384-cert-...@openssh.com,ecdsa-sha2-nistp521-cert-...@openssh.com
KexAlgorithms 
diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,curve25519-sha256,curve25519-sha...@libssh.org
MACs 
hmac-sha1,hmac-sha1-96,hmac-sha2-256,hmac-sha2-512,hmac-md5,hmac-md5-96,hmac-ripemd160,hmac-ripemd...@openssh.com,umac...@openssh.com,umac-...@openssh.com,hmac-sha1-...@openssh.com,hmac-sha1-96-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-sha2-512-...@openssh.com,hmac-md5-...@openssh.com,hmac-md5-96-...@openssh.com,hmac-ripemd160-...@openssh.com,umac-64-...@openssh.com,umac-128-...@openssh.com
PubkeyAcceptedKeyTypes
ssh-ed25519,ssh-ed25519-cert-...@openssh.com,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa-cert-...@openssh.com,ssh-dss-cert-...@openssh.com,ecdsa-sha2-nistp256-cert-...@openssh.com,ecdsa-sha2-nistp384-cert-...@openssh.com,ecdsa-sha2-nistp521-cert-...@openssh.com

Reply via email to