Add the following lines in /etc/ssh/sshd_config
Ciphers aes128-ctr,aes192-ctr,aes256-ctr
MACs hmac-sha1,umac-64@openssh.com,hmac-ripemd160
Now check with below command
Ciphers aes128-ctr,aes192-ctr,aes256-ctr
MACs hmac-sha1,umac-64@openssh.com,hmac-ripemd160
Now check with below command
THAT'S ALL
Following command is for your ssh configuration to find the correction.
ssh -vvv -F /etc/ssh/sshd_config root@192.168.1.1
If it's shows everything ok then no issue otherwise
it will show like this
/etc/ssh/sshd_config: line 28: Bad configuration option: hostkey
/etc/ssh/sshd_config: line 30: Bad configuration option: hostkey
/etc/ssh/sshd_config: line 31: Bad configuration option: hostkey
/etc/ssh/sshd_config: line 43: Bad configuration option: syslogfacility
/etc/ssh/sshd_config: line 49: Bad configuration option: permitrootlogin
/etc/ssh/sshd_config: line 59: Bad configuration option: authorizedkeysfile
/etc/ssh/sshd_config: line 94: Bad configuration option: gssapicleanupcredentials
/etc/ssh/sshd_config: line 110: Bad configuration option: usepam
/etc/ssh/sshd_config: line 115: Bad configuration option: x11forwarding
/etc/ssh/sshd_config: line 123: Bad configuration option: useprivilegeseparation
/etc/ssh/sshd_config: line 140: Bad configuration option: acceptenv
/etc/ssh/sshd_config: line 141: Bad configuration option: acceptenv
/etc/ssh/sshd_config: line 142: Bad configuration option: acceptenv
/etc/ssh/sshd_config: line 143: Bad configuration option: acceptenv
/etc/ssh/sshd_config: line 146: Bad configuration option: subsystem
Now add # the following lines that above mentioned.
No comments:
Post a Comment