AW: OpenWRT Dropbear v2020.80: Exit before auth: No matching algo kex

2020-10-23 Thread Walter Harms
This is caused by changes in ssh_config. You can try: ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 USER@TARGET or persistent in ssh_config KexAlgorithms=+diffie-hellman-group1-sha1 your mileage may vary etc. re, wh Von: Dropbear

Re: OpenWRT Dropbear v2020.80: Exit before auth: No matching algo kex

2020-10-23 Thread Matt Johnston
Hi Piotr, Dropbear 2020.79 had some changes to the code that parses algorithms, it now is more strict about its MAX_PROPOSED_ALGO = 20 limit. Not intentionally, but as a side-effect. sshj advertises 30 different ciphers. I've increased the limit to 50 in

Re: OpenWRT Dropbear v2020.80: Exit before auth: No matching algo kex

2020-10-23 Thread Jamie Lokier
Walter Harms wrote: > This is caused by changes in ssh_config. You can try: > ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 USER@TARGET > > or persistent in ssh_config > KexAlgorithms=+diffie-hellman-group1-sha1 > > your mileage may vary etc. > > re, > wh Thanks! This advice has shown

Re: OpenWRT Dropbear v2020.80: Exit before auth: No matching algo kex

2020-10-23 Thread Tang Jiye
Hi Walter, What if I want to use ecdh and ecdsa for kex and signing while diffie-hellman-group1-sha1 is disabled. It should work as well right ? Jiye Walter Harms 于2020年10月23日周五 上午5:24写道: > This is caused by changes in ssh_config. You can try: > ssh

Re: OpenWRT Dropbear v2020.80: Exit before auth: No matching algo kex

2020-10-23 Thread Matt Johnston
Forcing diffie-hellman-group1-sha1 shouldn't usually be necessary. The only case would be for servers prior to 2018.76 that compiled with all other default options disabled. Cheers, Matt > On Fri 23/10/2020, at 9:00 pm, Tang Jiye wrote: > > Hi Walter, > > What if I want to use ecdh and