> Sven, how you have identified the key exchange algorithm used by libssh2, is 
> there any way to identify using fingerprint or key??

I'm looking at what sshd logs on the server end. Or you start sshd with the 
"-d" argument which logs to stdout and prevents sshd from being backgrounded.

You could also harden sshd by adding the following to sshd_config (don't forget 
to restart the deamon afterwards):

KexAlgorithms [email protected],diffie-hellman-group-exchange-sha256
Ciphers 
[email protected],[email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr
MACs 
[email protected],[email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,[email protected]

Since SHA1 is not listed as KexAlgorithms, if the connection is still possible, 
the client must have used SHA256.

Cheers, -sven



-- 
Sent via pgadmin-support mailing list ([email protected])
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgadmin-support

Reply via email to