![]() |
The algorithm(s) used for session encryption can be specified in the
sshd2_config file:
Ciphers aes128-cbc,3des-cbc
The system will attempt to use the different encryption ciphers in the sequence specified on the line. Currently supported cipher names are the following:
aes128-ctr | 3des-cbc | twofish192-cbc |
aes192-ctr | arcfour | twofish256-cbc |
aes256-ctr | blowfish-cbc | cast128-12-cbc@ssh.com |
aes128-cbc | cast128-cbc | seed-cbc@ssh.com |
aes192-cbc | twofish-cbc | rijndael-cbc@ssh.com |
aes256-cbc | twofish128-cbc |
Special values for this option are the following:
Any: includes all supported ciphers plus
none.
AnyStd: includes ciphers from the
IETF SSH standards and none. The standard
ciphers are aes128-ctr, aes192-ctr,
aes256-ctr, aes128-cbc, aes192-cbc,
aes256-cbc, 3des-cbc, arcfour,
blowfish-cbc, cast128-cbc, twofish128-cbc,
twofish192-cbc, twofish256-cbc, twofish-cbc.
none: no encryption, connection will be in plaintext.
AnyCipher: allows any available cipher apart from the
non-encrypting cipher mode none.
AnyStdCipher: the same as AnyStd, but
excludes none.
The default ciphers are aes128-ctr, aes192-ctr,
aes256-ctr, aes128-cbc, aes192-cbc,
aes256-cbc and 3des-cbc.