it makes sense but when i tried to enable the cipers in the config file ssh
refused to start and stayed in maintainence mode.  It took me 20 minutes 2
reboots and 20 commands to get it to start back up....this is really
frustrating.
I'd rather just have OpenSSH....
oh well
I'll try again i guess


On Sun, Feb 7, 2010 at 12:02 PM, Dennis Clarke <dcla...@blastwave.org>wrote:

>
> > I normally use JellyFiSSH as my ssh tool on osx, and with every other os,
> > it has no problems with any of the ssh encryption protocols.  The default
> > is 3des but it has many to chose from (blowfish, 3des-cbc, cast128-cbc,
> > blowfish-cbc, arcfour, aes256-cbc)
> >
> > OpenSolaris doesn't allow me to use ANY of these, the only ciper i can
> > chose is des, but when i actually connect i get this (error/warning?)
> >
> >
> > No valid ciphers for protocol version 2 given, using defaults.
> >
> > how do i fix this?
> >
> > i looked in the config but it all looks correct
>
> Get onto the console of the server and enable the ciphers you want in the
> sshd_config file.  Be sure to shut down ssh services before making
> changes.
>
> look for a line like this :
>
>    Ciphers aes128-cbc,aes128-ctr,arcfour,aes256-cbc
>
> While you are there , look at these lines :
>
>    HostKey /etc/ssh/ssh_host_rsa_key
>    HostKey /etc/ssh/ssh_host_dsa_key
>
> You can increase the bit-length of your host keys with ssh-keygen :
>
>   http://www.blastwave.org/man/ssh-keygen_1.ftd
>
> On Solaris 8 ( and even 9 and 10 sometimes ) I tend to use OpenSSH
>
>   CSWossh         openssh - OpenSSH Secure Shell
>                   (i386) 5.3,REV=2009.12.27_rev=p1
>
> When that installs you see the host keys get generated for you :
>
> ## Executing postinstall script.
> Starting Blastwave OpenSSH...
> Creating new RSA public/private host key pair
> Generating public/private rsa key pair.
> Your identification has been saved in /etc/opt/csw/ssh/ssh_host_rsa_key.
> Your public key has been saved in /etc/opt/csw/ssh/ssh_host_rsa_key.pub.
> The key fingerprint is:
> 4f:e9:25:2b:24:01:9d:64:eb:f8:18:18:e3:73:9a:d9 r...@titan
> The key's randomart image is:
> +--[ RSA 2048]----+
> |    .oo.         |
> |     oo.         |
> |  o   o          |
> | . + o .   .     |
> |  + + o S + .    |
> |   B + o + +     |
> |  + E . . +      |
> |         .       |
> |                 |
> +-----------------+
> Creating new DSA public/private host key pair
> Generating public/private dsa key pair.
> Your identification has been saved in /etc/opt/csw/ssh/ssh_host_dsa_key.
> Your public key has been saved in /etc/opt/csw/ssh/ssh_host_dsa_key.pub.
> The key fingerprint is:
> 69:c9:46:08:f0:b6:0a:61:2c:c2:0e:ed:5f:eb:9e:55 r...@titan
> The key's randomart image is:
> +--[ DSA 1024]----+
> |  ...            |
> |o. . . .         |
> |=+. o . .        |
> |*o . . o o       |
> |... . . S E      |
> | . o . + .       |
> |  . . . .        |
> |     . o         |
> |     .+          |
> +-----------------+
>
> Installation of <CSWossh> was successful.
> #
>
> You can do this manually when you are in there on OpenSolaris with
> ssh-keygen. I figure since you like to use aes256-cbc you may as well
> increase your RSA and DSA bit length on the server host keys.
>
> # ssh-keygen -f ssh_host_rsa_key -t rsa -b 4096 -N ''
>
> Then do the same thing for DSA with "-t dsa" and then restart ssh services.
>
> That will take care of most of the important thing for you.
>
> Does this make sense ?
>
> --
> Dennis Clarke
> dcla...@opensolaris.ca  <- Email related to the open source Solaris
> dcla...@blastwave.org   <- Email related to open source for Solaris
>
>
>
_______________________________________________
opensolaris-discuss mailing list
opensolaris-discuss@opensolaris.org

Reply via email to