Cryptographic algorithms

This feature allows administrators to customize the set of cryptographic algorithms used by the system for secure communications. By specifying algorithm names separated by commas or spaces, administrators can tailor the security protocols to meet organizational requirements. Special keywords enhance flexibility: DEFAULT expands to the system’s default set of secure algorithms, while ALL includes every available algorithm, encompassing both secure and less secure options. Additionally, prefixing an algorithm name with a minus sign (-) disables that specific algorithm. For example, to exclude a particular algorithm, you would list it as -AlgorithmName.

Available KEX algorithms:

  • curve25519-sha256
  • curve25519-sha256@libssh.org
  • diffie-hellman-group-exchange-sha256
  • diffie-hellman-group1-sha1
  • diffie-hellman-group14-sha1
  • diffie-hellman-group14-sha256
  • diffie-hellman-group16-sha512
  • ecdh-sha2-nistp256
  • ecdh-sha2-nistp384
  • ecdh-sha2-nistp521

Available key signature algorithms:

  • ecdsa-sha2-nistp256
  • ecdsa-sha2-nistp384
  • ecdsa-sha2-nistp521
  • rsa-sha2-256
  • ssh-ed25519
  • ssh-rsa

Available MAC algorithms:

  • hmac-sha1,hmac-sha1-96
  • hmac-sha2-256
  • hmac-sha2-512v

Available cipher algorithms:

  • aes128-cbc
  • aes128-ctr
  • aes128-gcm@openssh.com
  • aes192-cbc
  • aes192-ctr
  • aes192-gcm

So for example default KEX algorithms (expanded by DEFAULT):

  • curve25519-sha256
  • curve25519-sha256@libssh.org
  • diffie-hellman-group-exchange-sha256
  • diffie-hellman-group14-sha1
  • diffie-hellman-group14-sha256
  • diffie-hellman-group16-sha512
  • ecdh-sha2-nistp256
  • ecdh-sha2-nistp384
  • ecdh-sha2-nistp521

Where insecure Algorithms (included when using ALL; enable at your own risk):

  • diffie-hellman-group1-sha1

It’s important to note that some legacy algorithms, such as diffie-hellman-group1-sha1, are considered insecure and are disabled by default in modern configurations. Administrators should exercise caution when enabling these algorithms, as they may expose the system to security vulnerabilities.