|
Doc Text:
|
OpenSSH upstream removes several ciphers with questionable security from the release. This update is trying to follow this trend while leaving most of the backward compatibility.
Since last update we removed from Server&Client proposal:
* Hostkey algorithms: ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com (deprecated)
* Ciphers: arcfour256,arcfour128,arcfour,rijndael-cbc@lysator.liu.se (RC4 is broken, rijndael-cbc quite much unused alias for AES)
* MACs: hmac-md5,hmac-md5-96,hmac-md5-96-etm@openssh.com,hmac-md5-etm@openssh.com,hmac-ripemd160,hmac-ripemd160-etm@openssh.com,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-sha1-96-etm@openssh.com (MD5, truncated SHA-1, RIPEMD160)
Since last update we removed from client proposal:
* Ciphers: blowfish-cbc,cast128-cbc,3des-cbc (in addition to the above)
- non-essential and possibly broken. |