User Tools

Site Tools


networking:ssh

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
networking:ssh [2023/02/15 14:07] – [List SSH Fingerprint] bstaffordnetworking:ssh [2024/07/29 09:28] (current) – [ByPass Legacy Ciphers] bstafford
Line 77: Line 77:
 <code>ssh-keygen -f private.pem -y > public.pub</code> <code>ssh-keygen -f private.pem -y > public.pub</code>
  
 +===== Copy over Public Key =====
 +To enable passwordless login, you must copy over your public key to the other sever
 +<code>ssh-copy-id remote_username@server_ip_address</code>
 +===== Ignore Warning =====
 +<code>ssh -q -o "StrictHostKeyChecking no" admin@192.168.1.1</code>
 +===== ByPass Legacy Ciphers =====
 +I had to do this to access a Cisco switch.
 +
 +Add the following to the SSH command.
 +
 +<code>-oKexAlgorithms=+diffie-hellman-group1-sha1</code>
 +
 +You can also add the following to ''.ssh/config''
 +<code>Host x.x.x.x
 +    KexAlgorithms +diffie-hellman-group1-sha1</code>
 +    
 +=====Unable to Negotiate  =====
 +I found the following when trying to SSH from Ubuntu 22.04.4 to Palo Alto Networks Firewall running PAN-OS 11.0.0
 +<code>Unable to negotiate with <IP> port 22: no matching host key type found. Their offer: ssh-rsa,ssh-rsa,ssh-rsa</code>
 +
 +To make it work, I had to add the following at the end of the SSH command in Ubuntu
 +<code>-o HostKeyAlgorithms=+ssh-rsa -o PubkeyAcceptedAlgorithms=+ssh-rsa</code>
networking/ssh.1676470065.txt.gz · Last modified: by bstafford