How to find cipher keywords in ssh_config(5)












-1















I see in the man page for ssh that I can find the cipher listings in "ssh_config(5)"



Where can I find this?



Context:
I'm attempting to ssh sftp into a company's sftp account that they provided me. What I receive back is the following message:



"Unable to negotiate with XXX.XXX.XXX.XXX port XX: no matching cipher found. Their offer: aes256-cbc,3des-cbc,aes128-cbc"



I'm assuming changing my cipher to aes 256-cbc will solve my issue.



Kind regards :)










share|improve this question



























    -1















    I see in the man page for ssh that I can find the cipher listings in "ssh_config(5)"



    Where can I find this?



    Context:
    I'm attempting to ssh sftp into a company's sftp account that they provided me. What I receive back is the following message:



    "Unable to negotiate with XXX.XXX.XXX.XXX port XX: no matching cipher found. Their offer: aes256-cbc,3des-cbc,aes128-cbc"



    I'm assuming changing my cipher to aes 256-cbc will solve my issue.



    Kind regards :)










    share|improve this question

























      -1












      -1








      -1








      I see in the man page for ssh that I can find the cipher listings in "ssh_config(5)"



      Where can I find this?



      Context:
      I'm attempting to ssh sftp into a company's sftp account that they provided me. What I receive back is the following message:



      "Unable to negotiate with XXX.XXX.XXX.XXX port XX: no matching cipher found. Their offer: aes256-cbc,3des-cbc,aes128-cbc"



      I'm assuming changing my cipher to aes 256-cbc will solve my issue.



      Kind regards :)










      share|improve this question














      I see in the man page for ssh that I can find the cipher listings in "ssh_config(5)"



      Where can I find this?



      Context:
      I'm attempting to ssh sftp into a company's sftp account that they provided me. What I receive back is the following message:



      "Unable to negotiate with XXX.XXX.XXX.XXX port XX: no matching cipher found. Their offer: aes256-cbc,3des-cbc,aes128-cbc"



      I'm assuming changing my cipher to aes 256-cbc will solve my issue.



      Kind regards :)







      ssh sftp manpage






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked Jan 3 at 18:21









      Trevor BagleyTrevor Bagley

      31




      31






















          1 Answer
          1






          active

          oldest

          votes


















          1














          It's telling you to look for the ssh_config pages, in section 5 of the online manual i.e. man 5 ssh_config:




           Ciphers
          Specifies the ciphers allowed for protocol version 2 in order of
          preference. Multiple ciphers must be comma-separated. If the
          specified value begins with a ‘+’ character, then the specified
          ciphers will be appended to the default set instead of replacing
          them.

          The supported ciphers are:

          3des-cbc
          aes128-cbc
          aes192-cbc
          aes256-cbc
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          arcfour
          arcfour128
          arcfour256
          blowfish-cbc
          cast128-cbc
          chacha20-poly1305@openssh.com

          The default is:

          chacha20-poly1305@openssh.com,
          aes128-ctr,aes192-ctr,aes256-ctr,
          aes128-gcm@openssh.com,aes256-gcm@openssh.com,
          aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc

          The list of available ciphers may also be obtained using the -Q
          option of ssh(1) with an argument of “cipher”.



          As noted therein, you could also use ssh -Q cipher:



          $ ssh -Q cipher
          3des-cbc
          blowfish-cbc
          cast128-cbc
          arcfour
          arcfour128
          arcfour256
          aes128-cbc
          aes192-cbc
          aes256-cbc
          rijndael-cbc@lysator.liu.se
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          chacha20-poly1305@openssh.com





          share|improve this answer
























          • Perfect! Thank you so much! Also it worked perfect. I was able to access the sftp. Cheers mate!!

            – Trevor Bagley
            Jan 3 at 18:27













          Your Answer








          StackExchange.ready(function() {
          var channelOptions = {
          tags: "".split(" "),
          id: "89"
          };
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function() {
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled) {
          StackExchange.using("snippets", function() {
          createEditor();
          });
          }
          else {
          createEditor();
          }
          });

          function createEditor() {
          StackExchange.prepareEditor({
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader: {
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          },
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          });


          }
          });














          draft saved

          draft discarded


















          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1106669%2fhow-to-find-cipher-keywords-in-ssh-config5%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          1














          It's telling you to look for the ssh_config pages, in section 5 of the online manual i.e. man 5 ssh_config:




           Ciphers
          Specifies the ciphers allowed for protocol version 2 in order of
          preference. Multiple ciphers must be comma-separated. If the
          specified value begins with a ‘+’ character, then the specified
          ciphers will be appended to the default set instead of replacing
          them.

          The supported ciphers are:

          3des-cbc
          aes128-cbc
          aes192-cbc
          aes256-cbc
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          arcfour
          arcfour128
          arcfour256
          blowfish-cbc
          cast128-cbc
          chacha20-poly1305@openssh.com

          The default is:

          chacha20-poly1305@openssh.com,
          aes128-ctr,aes192-ctr,aes256-ctr,
          aes128-gcm@openssh.com,aes256-gcm@openssh.com,
          aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc

          The list of available ciphers may also be obtained using the -Q
          option of ssh(1) with an argument of “cipher”.



          As noted therein, you could also use ssh -Q cipher:



          $ ssh -Q cipher
          3des-cbc
          blowfish-cbc
          cast128-cbc
          arcfour
          arcfour128
          arcfour256
          aes128-cbc
          aes192-cbc
          aes256-cbc
          rijndael-cbc@lysator.liu.se
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          chacha20-poly1305@openssh.com





          share|improve this answer
























          • Perfect! Thank you so much! Also it worked perfect. I was able to access the sftp. Cheers mate!!

            – Trevor Bagley
            Jan 3 at 18:27


















          1














          It's telling you to look for the ssh_config pages, in section 5 of the online manual i.e. man 5 ssh_config:




           Ciphers
          Specifies the ciphers allowed for protocol version 2 in order of
          preference. Multiple ciphers must be comma-separated. If the
          specified value begins with a ‘+’ character, then the specified
          ciphers will be appended to the default set instead of replacing
          them.

          The supported ciphers are:

          3des-cbc
          aes128-cbc
          aes192-cbc
          aes256-cbc
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          arcfour
          arcfour128
          arcfour256
          blowfish-cbc
          cast128-cbc
          chacha20-poly1305@openssh.com

          The default is:

          chacha20-poly1305@openssh.com,
          aes128-ctr,aes192-ctr,aes256-ctr,
          aes128-gcm@openssh.com,aes256-gcm@openssh.com,
          aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc

          The list of available ciphers may also be obtained using the -Q
          option of ssh(1) with an argument of “cipher”.



          As noted therein, you could also use ssh -Q cipher:



          $ ssh -Q cipher
          3des-cbc
          blowfish-cbc
          cast128-cbc
          arcfour
          arcfour128
          arcfour256
          aes128-cbc
          aes192-cbc
          aes256-cbc
          rijndael-cbc@lysator.liu.se
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          chacha20-poly1305@openssh.com





          share|improve this answer
























          • Perfect! Thank you so much! Also it worked perfect. I was able to access the sftp. Cheers mate!!

            – Trevor Bagley
            Jan 3 at 18:27
















          1












          1








          1







          It's telling you to look for the ssh_config pages, in section 5 of the online manual i.e. man 5 ssh_config:




           Ciphers
          Specifies the ciphers allowed for protocol version 2 in order of
          preference. Multiple ciphers must be comma-separated. If the
          specified value begins with a ‘+’ character, then the specified
          ciphers will be appended to the default set instead of replacing
          them.

          The supported ciphers are:

          3des-cbc
          aes128-cbc
          aes192-cbc
          aes256-cbc
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          arcfour
          arcfour128
          arcfour256
          blowfish-cbc
          cast128-cbc
          chacha20-poly1305@openssh.com

          The default is:

          chacha20-poly1305@openssh.com,
          aes128-ctr,aes192-ctr,aes256-ctr,
          aes128-gcm@openssh.com,aes256-gcm@openssh.com,
          aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc

          The list of available ciphers may also be obtained using the -Q
          option of ssh(1) with an argument of “cipher”.



          As noted therein, you could also use ssh -Q cipher:



          $ ssh -Q cipher
          3des-cbc
          blowfish-cbc
          cast128-cbc
          arcfour
          arcfour128
          arcfour256
          aes128-cbc
          aes192-cbc
          aes256-cbc
          rijndael-cbc@lysator.liu.se
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          chacha20-poly1305@openssh.com





          share|improve this answer













          It's telling you to look for the ssh_config pages, in section 5 of the online manual i.e. man 5 ssh_config:




           Ciphers
          Specifies the ciphers allowed for protocol version 2 in order of
          preference. Multiple ciphers must be comma-separated. If the
          specified value begins with a ‘+’ character, then the specified
          ciphers will be appended to the default set instead of replacing
          them.

          The supported ciphers are:

          3des-cbc
          aes128-cbc
          aes192-cbc
          aes256-cbc
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          arcfour
          arcfour128
          arcfour256
          blowfish-cbc
          cast128-cbc
          chacha20-poly1305@openssh.com

          The default is:

          chacha20-poly1305@openssh.com,
          aes128-ctr,aes192-ctr,aes256-ctr,
          aes128-gcm@openssh.com,aes256-gcm@openssh.com,
          aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc

          The list of available ciphers may also be obtained using the -Q
          option of ssh(1) with an argument of “cipher”.



          As noted therein, you could also use ssh -Q cipher:



          $ ssh -Q cipher
          3des-cbc
          blowfish-cbc
          cast128-cbc
          arcfour
          arcfour128
          arcfour256
          aes128-cbc
          aes192-cbc
          aes256-cbc
          rijndael-cbc@lysator.liu.se
          aes128-ctr
          aes192-ctr
          aes256-ctr
          aes128-gcm@openssh.com
          aes256-gcm@openssh.com
          chacha20-poly1305@openssh.com






          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Jan 3 at 18:25









          steeldriversteeldriver

          66.2k11106179




          66.2k11106179













          • Perfect! Thank you so much! Also it worked perfect. I was able to access the sftp. Cheers mate!!

            – Trevor Bagley
            Jan 3 at 18:27





















          • Perfect! Thank you so much! Also it worked perfect. I was able to access the sftp. Cheers mate!!

            – Trevor Bagley
            Jan 3 at 18:27



















          Perfect! Thank you so much! Also it worked perfect. I was able to access the sftp. Cheers mate!!

          – Trevor Bagley
          Jan 3 at 18:27







          Perfect! Thank you so much! Also it worked perfect. I was able to access the sftp. Cheers mate!!

          – Trevor Bagley
          Jan 3 at 18:27




















          draft saved

          draft discarded




















































          Thanks for contributing an answer to Ask Ubuntu!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid



          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.


          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function () {
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1106669%2fhow-to-find-cipher-keywords-in-ssh-config5%23new-answer', 'question_page');
          }
          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Human spaceflight

          Can not write log (Is /dev/pts mounted?) - openpty in Ubuntu-on-Windows?

          張江高科駅