![]()  | 
The MAC (Message Authentication Code) algorithm(s) used for data integrity 
verification can be selected in the sshd2_config file: 
MACs hmac-sha1,hmac-md5
The system will attempt to use the different HMAC algorithms in the sequence they are specified on the line. The supported MAC names are the following:
hmac-md5 | hmac-sha2-256 | hmac-sha384@ssh.com | 
hmac-md5-96 | hmac-sha256-2@ssh.com | hmac-sha2-512 | 
hmac-sha1 | hmac-sha224@ssh.com | hmac-sha512@ssh.com | 
hmac-sha1-96 | hmac-sha256@ssh.com | 
Special values for this option are the following:
Any: includes all supported MACs plus none.
AnyStd: includes MACs from the IETF SSH standards (hmac-md5, 
hmac-md5-96, hmac-sha1, hmac-sha1-96,
hmac-sha2-256, hmac-sha2-512) and none.
none: means that no cryptographic data integrity method 
is used.
AnyMac: the same as Any but excludes 
none.
AnyStdMac: the same as AnyStd but 
exludes none.
The default MAC algorithms are: hmac-sha1, 
hmac-sha1-96, hmac-sha2-256, 
hmac-sha256-2@ssh.com, hmac-sha224@ssh.com, 
hmac-sha256@ssh.com, hmac-sha384@ssh.com, 
hmac-sha2-512, and hmac-sha512@ssh.com.