Ciphers and MACs
The algorithm(s) used for symmetric session encryption
can be chosen in the sshd2_config
and
ssh2_config
files:
The system will attempt to use the different encryption ciphers
in the sequence specified on the line. Currently
supported cipher names are the following:
-
3des-cbc
-
aes128-cbc
-
aes192-cbc
-
aes256-cbc
-
arcfour
-
blowfish-cbc
-
cast128-cbc
-
twofish-cbc
-
twofish128-cbc
-
twofish192-cbc
-
twofish256-cbc
-
cast128-12-cbc@ssh.com
-
des-cbc@ssh.com
-
seed-cbc@ssh.com
-
rijndael-cbc@ssh.com
Special values for this option are the following:
-
Any
: allows all the cipher values including none
-
AnyStd
: allows only standard ciphers and none
-
none
: forbids any use of encryption
-
AnyCipher
: allows any available cipher
apart from the non-encrypting cipher mode none
-
AnyStdCipher
: the same as
AnyCipher
, but includes only those ciphers mentioned
in IETF-SecSh-draft (excluding
none
). This is the default value.
The MAC (Message Authentication Code) algorithm(s) used for data
integrity verification can be selected in the
sshd2_config
and ssh2_config
files:
The system will attempt to use the different HMAC algorithms in
the sequence they are specified on the line. Supported MAC
names are the following:
-
hmac-md5
-
hmac-md5-96
-
hmac-sha1
-
hmac-sha1-96
-
hmac-sha256@ssh.com
-
hmac-sha256-96@ssh.com
Special values for this option are the following:
-
Any
: allows all the MAC values including none
-
AnyStd
: allows only standard MACs and none
-
none
: forbids any use of MACs
-
AnyMac
: allows any available MAC apart from none
-
AnyStdMac
: the same as AnyMac
, but includes
only those MACs mentioned in IETF-SecSh-draft (excluding
none
). This is the default value.
Both cipher and MAC can also be defined using command-line arguments with
ssh2
and scp2
:
$ scp2 -c twofish -m hmac-md5 testfile user@remote:./tmp
Note: Algorithm names are case-sensitive.