Versionen im Vergleich

Schlüssel

  • Diese Zeile wurde hinzugefügt.
  • Diese Zeile wurde entfernt.
  • Formatierung wurde geändert.

...

Info

When using SSH, the SSH server and the SSH client transmit the supported encryption algorithms to each other. As the SSH server always selects the first algorithm from the list of the SSH client , the server also supports, it is sufficient to restrict the preferred algorothms algorithms in the client.

Requirement:

  • SSH - client (e.g.   PuTTY)

Procedure:

General procedure:

...

Procedure for the SSH client PuTTY:

Info

In PuTTY the there are no options to configure hash algorithms. It is therefore suffictient sufficient to modify the encryption algorithsalgorithms

1) Open PuTTY and navigate to the menu Connection → SSH → Cipher.

...

2) Move the following algorithms as follows via Drag & Drop or via the the Up and Down buttons as follows:

  • AES-GCM has to be moved to the top.
  • AES has to be moved to the second position.
  • ChaCha20 has to be moved below "warn below here".
  • 3DES has to be moved below "warn below here".

...