networking:ssh
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| networking:ssh [2022/11/23 12:49] – external edit 127.0.0.1 | networking:ssh [2024/07/29 09:28] (current) – [ByPass Legacy Ciphers] bstafford | ||
|---|---|---|---|
| Line 40: | Line 40: | ||
| To list the key in the format shown by PuTTY, use | To list the key in the format shown by PuTTY, use | ||
| < | < | ||
| + | Show all | ||
| + | < | ||
| + | |||
| + | Determine the fingerprint of the RSA host key | ||
| + | < | ||
| + | |||
| + | Determine the fingerprint of the ED25519 host key | ||
| + | < | ||
| + | |||
| + | Determine the fingerprint of the ECDSA host key | ||
| + | < | ||
| =====Fix SSH Key Generation Problem in CentOS 6===== | =====Fix SSH Key Generation Problem in CentOS 6===== | ||
| Line 66: | Line 77: | ||
| < | < | ||
| + | ===== Copy over Public Key ===== | ||
| + | To enable passwordless login, you must copy over your public key to the other sever | ||
| + | < | ||
| + | ===== Ignore Warning ===== | ||
| + | < | ||
| + | ===== ByPass Legacy Ciphers ===== | ||
| + | I had to do this to access a Cisco switch. | ||
| + | |||
| + | Add the following to the SSH command. | ||
| + | |||
| + | < | ||
| + | |||
| + | You can also add the following to '' | ||
| + | < | ||
| + | KexAlgorithms +diffie-hellman-group1-sha1</ | ||
| + | | ||
| + | =====Unable to Negotiate | ||
| + | I found the following when trying to SSH from Ubuntu 22.04.4 to Palo Alto Networks Firewall running PAN-OS 11.0.0 | ||
| + | < | ||
| + | |||
| + | To make it work, I had to add the following at the end of the SSH command in Ubuntu | ||
| + | < | ||
networking/ssh.1669207782.txt.gz · Last modified: by 127.0.0.1
