aes256-gcm@openssh.com | not RFC5647, PROTOCOL of OpenSSH |
camellia256-ctr | draft-kanno-secsh-camellia-02 |
chacha20-poly1305@openssh.com | PROTOCOL.chacha20poly1305 of OpenSSH |
aes256-ctr | RFC4344 |
camellia256-cbc | draft-kanno-secsh-camellia-02 |
aes256-cbc | RFC4253 |
camellia192-ctr | draft-kanno-secsh-camellia-02 |
aes192-ctr | RFC4344 |
camellia192-cbc | draft-kanno-secsh-camellia-02 |
aes192-cbc | RFC4253 |
aes128-gcm@openssh.com | not RFC5647, PROTOCOL of OpenSSH |
camellia128-ctr | draft-kanno-secsh-camellia-02 |
aes128-ctr | RFC4344 |
camellia128-cbc | draft-kanno-secsh-camellia-02 |
aes128-cbc | RFC4253 |
3des-ctr | RFC4344 |
3des-cbc | RFC4253 |
blowfish-ctr | RFC4344 |
blowfish-cbc | RFC4253 |
cast128-ctr | RFC4344 |
cast128-cbc | RFC4253 |
3DES(SSH1) | |
arcfour256 | RFC4345 |
arcfour128 | RFC4345 |
arcfour | RFC4253 |
Blowfish(SSH1) | |
DES(SSH1) |
Configure the host key rotation feature(OpenSSH 6.8 or later).
SSH server has the host key, however the host key may be changed for any reason.
In this case, SSH server sends a list of new host keys to client. Next, the server urges updating of host key lists to client.
TTSSH can support this feature. When a list of new host key is received, the known hosts list of client is updated.
ecdh-sha2-nistp256 | RFC5656 |
ecdh-sha2-nistp384 | RFC5656 |
ecdh-sha2-nistp521 | RFC5656 |
diffie-hellman-group18-sha512 | RFC8268 |
diffie-hellman-group16-sha512 | RFC8268 |
diffie-hellman-group14-sha256 | RFC8268 |
diffie-hellman-group-exchange-sha256 | RFC4419 |
diffie-hellman-group-exchange-sha1 | RFC4419 |
diffie-hellman-group14-sha1 | RFC4253 |
diffie-hellman-group1-sha1 | RFC4253 |
hmac-sha2-512-etm@openssh.com | |
hmac-sha2-256-etm@openssh.com | |
hmac-sha1-etm@openssh.com | |
hmac-sha2-512 | RFC6668 |
hmac-sha2-256 | RFC6668 |
hmac-sha1 | RFC4253 |
hmac-ripemd160-etm@openssh.com | |
hmac-ripemd160@openssh.com | |
hmac-md5-etm@openssh.com | |
hmac-md5 | RFC4253 |
hmac-sha1-96-etm@openssh.com | |
hmac-md5-96-etm@openssh.com | |
hmac-sha1-96 | RFC4253 |
hmac-md5-96 | RFC4253 |
ecdsa-sha2-nistp256 | RFC5656 |
ecdsa-sha2-nistp384 | RFC5656 |
ecdsa-sha2-nistp521 | RFC5656 |
ssh-ed25519 | RFC8709 |
rsa-sha2-512 | RFC8332 |
rsa-sha2-256 | RFC8332 |
ssh-rsa | RFC4253 |
ssh-dss | RFC4253 |
zlib@openssh.com | PROTOCOL of OpenSSH | Delayed compression (Starts compressing after authentication) |
zlib | RFC4253 | |
none | RFC4253 | No compression |
Value | Meaning |
0 | Disabled |
5 | Fatal |
10 | Error |
30 | Warning |
50 | Notice |
80 | Information |
100 | Verbose |
200 | SSH Dump |