<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is this correct cipher for accessing router via ansible in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532019#M1086455</link>
    <description>&lt;P&gt;Hi I am trying to setup ansible at Ubuntu sitting at a PC to send commands to routers/switches, but failed. Then I found the issue is these routers rufuse the client(Ubuntu) connection. Accessing to a router (7200/ver15/192.168.1.16) from Ubuntu via ssh failed as below. It looks like there is no matching cipher. After several changing different cipher as below, ssh still cannot access the router. Anyone can help to resolve the issue? Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin1@DESKTOP-935CS:~$&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ssh admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;Unable to negotiate with 192.168.1.16 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;&lt;BR /&gt;admin1@DESKTOP-935CS:~$&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ssh -Q cipher&lt;/STRONG&gt;&lt;BR /&gt;3des-cbc&lt;BR /&gt;aes128-cbc&lt;BR /&gt;aes192-cbc&lt;BR /&gt;aes256-cbc&lt;BR /&gt;rijndael-cbc@lysator.liu.se&lt;BR /&gt;aes128-ctr&lt;BR /&gt;aes192-ctr&lt;BR /&gt;aes256-ctr&lt;BR /&gt;aes128-gcm@openssh.com&lt;BR /&gt;aes256-gcm@openssh.com&lt;BR /&gt;chacha20-poly1305@openssh.com&lt;BR /&gt;&lt;BR /&gt;admin1@DESKTOP-935CS:~$&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ssh -c aes256-cbc admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;Unable to negotiate with 192.168.1.16 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;admin1@DESKTOP-935CS:~$&lt;/P&gt;</description>
    <pubDate>Sat, 15 Jan 2022 17:20:10 GMT</pubDate>
    <dc:creator>interfacedy</dc:creator>
    <dc:date>2022-01-15T17:20:10Z</dc:date>
    <item>
      <title>What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528512#M1086274</link>
      <description>&lt;P&gt;Hi Accessing to a router (7200/ios15/192.168.1.16) from Ubuntu via ssh failed as below. It looks like there is no matching cipher. After several tries changing different cipher as below, ssh still cannot access the router. Anyone can share some solutions? Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin1@DESKTOP-935CSD2:~$ &lt;STRONG&gt;ssh admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;Unable to negotiate with 192.168.1.16 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;&lt;BR /&gt;admin1@DESKTOP-935CSD2:~$ &lt;STRONG&gt;ssh -Q cipher&lt;/STRONG&gt;&lt;BR /&gt;3des-cbc&lt;BR /&gt;aes128-cbc&lt;BR /&gt;aes192-cbc&lt;BR /&gt;aes256-cbc&lt;BR /&gt;rijndael-cbc@lysator.liu.se&lt;BR /&gt;aes128-ctr&lt;BR /&gt;aes192-ctr&lt;BR /&gt;aes256-ctr&lt;BR /&gt;aes128-gcm@openssh.com&lt;BR /&gt;aes256-gcm@openssh.com&lt;BR /&gt;chacha20-poly1305@openssh.com&lt;BR /&gt;&lt;BR /&gt;admin1@DESKTOP-935CSD2:~$&lt;STRONG&gt; ssh -c aes256-cbc admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;Unable to negotiate with 192.168.1.16 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;admin1@DESKTOP-935CSD2:~$&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jan 2022 16:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528512#M1086274</guid>
      <dc:creator>interfacedy</dc:creator>
      <dc:date>2022-01-09T16:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528515#M1086275</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1186640"&gt;@interfacedy&lt;/a&gt; The 7200 is old, so might not actually support the latest and most secure ciphers that ubuntu does. Run "show ip ssh" to determine what the 7200 supports.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jan 2022 16:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528515#M1086275</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-09T16:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528537#M1086278</link>
      <description>&lt;P&gt;Try&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;$&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ssh -c&amp;nbsp; &lt;SPAN&gt;diffie-hellman-group1-sha1&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:admin@192.168.1.16" target="_blank"&gt;admin@192.168.1.16&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Legacy support :&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://www.openssh.com/legacy.html" target="_blank"&gt;https://www.openssh.com/legacy.html&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jan 2022 18:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528537#M1086278</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-09T18:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528549#M1086283</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/20046"&gt;@rob&lt;/a&gt;, &lt;/SPAN&gt;&lt;SPAN&gt;What model can we can try instead of 7200? but the 7200 has new ios version 15&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R7200#&lt;STRONG&gt;sh ip ssh&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;SSH Enabled - version 2.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Authentication timeout: 120 secs; Authentication retries: 3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Minimum expected Diffie Hellman key size : 1024 bits&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IOS Keys in SECSH format(ssh-rsa, base64 encoded):&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAAAgQC4O7wAiNzdD2WG4Efq+loV5GQVhxsfJCVFjejNG6Y2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;3WmEt80EPtLoB8AhcmYuvV/1SPc9z9jQ532D9ri2tO7SACBXtBiTzMYpnp9Y/CZLtnNOWEB5sgEMH2ri&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;PfyBr5Pksfc4KC0NcUZZnieC5hBRZRZtuLqPDUjjeWDGj8kt6Q==&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;R7200#&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;R7200#&lt;STRONG&gt;sh run | i ssh&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip ssh version 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;transport input telnet ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;admin1@DESKTOP-935CSD2:~$ &lt;STRONG&gt;ssh -c diffie-hellman-group1-sha1 admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;Unknown cipher type 'diffie-hellman-group1-sha1'&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jan 2022 20:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528549#M1086283</guid>
      <dc:creator>interfacedy</dc:creator>
      <dc:date>2022-01-09T20:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528565#M1086284</link>
      <description>&lt;P&gt;have replied other post try below guide&amp;nbsp;@&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/guide-to-better-ssh-security/ta-p/3133344" target="_blank"&gt;https://community.cisco.com/t5/security-documents/guide-to-better-ssh-security/ta-p/3133344&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jan 2022 01:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4528565#M1086284</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-10T01:05:10Z</dc:date>
    </item>
    <item>
      <title>Is this correct cipher for accessing router via ansible</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532019#M1086455</link>
      <description>&lt;P&gt;Hi I am trying to setup ansible at Ubuntu sitting at a PC to send commands to routers/switches, but failed. Then I found the issue is these routers rufuse the client(Ubuntu) connection. Accessing to a router (7200/ver15/192.168.1.16) from Ubuntu via ssh failed as below. It looks like there is no matching cipher. After several changing different cipher as below, ssh still cannot access the router. Anyone can help to resolve the issue? Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin1@DESKTOP-935CS:~$&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ssh admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;Unable to negotiate with 192.168.1.16 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;&lt;BR /&gt;admin1@DESKTOP-935CS:~$&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ssh -Q cipher&lt;/STRONG&gt;&lt;BR /&gt;3des-cbc&lt;BR /&gt;aes128-cbc&lt;BR /&gt;aes192-cbc&lt;BR /&gt;aes256-cbc&lt;BR /&gt;rijndael-cbc@lysator.liu.se&lt;BR /&gt;aes128-ctr&lt;BR /&gt;aes192-ctr&lt;BR /&gt;aes256-ctr&lt;BR /&gt;aes128-gcm@openssh.com&lt;BR /&gt;aes256-gcm@openssh.com&lt;BR /&gt;chacha20-poly1305@openssh.com&lt;BR /&gt;&lt;BR /&gt;admin1@DESKTOP-935CS:~$&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;ssh -c aes256-cbc admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;Unable to negotiate with 192.168.1.16 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;admin1@DESKTOP-935CS:~$&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jan 2022 17:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532019#M1086455</guid>
      <dc:creator>interfacedy</dc:creator>
      <dc:date>2022-01-15T17:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Is this correct cipher for accessing router via ansible</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532035#M1086458</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1186640"&gt;@interfacedy&lt;/a&gt; the 7200 is so old is does not support the stronger DH algorithms the ubuntu server is attempting to connect with. You can modify the ubuntu server configuration to use DH group 1 or 14 as per the error message. On the ubuntu server modify &lt;STRONG&gt;/etc/ssh/ssh_config &lt;/STRONG&gt;file and add the following at the end of the file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;KexAlgorithms &lt;STRONG&gt;diffie-hellman-group1-sha1&lt;/STRONG&gt;,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,&lt;STRONG&gt;diffie-hellman-group14-sha1&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;Save the file, restart the service using &lt;STRONG&gt;service ssh restart&lt;/STRONG&gt; and connect again.&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jan 2022 18:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532035#M1086458</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-01-15T18:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532091#M1086461</link>
      <description>&lt;P&gt;Hi Rob, Thanks for your reply. I have had the issue for so long time and hope to resolve it asap. Now let me reply your reply:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You said "the 7200 is so old is does not support the stronger DH ... " The 7200 that I am using is using ios version15.2. It can be used? or change ios to other ios. If its so old, what kind of ios should I use?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Second, there is not ssh_config folder under ssh folder, but there are two similar ones under ssh folder. I got the below response when I added the commands. Is there an issue in Ubuntu?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 01:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532091#M1086461</guid>
      <dc:creator>interfacedy</dc:creator>
      <dc:date>2022-01-17T01:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532099#M1086462</link>
      <description>&lt;P&gt;No need to go to cd ssh_config&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssh_config is the file&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;get in to sudo&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;follow below steps :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;$sudo su&amp;nbsp; ( trype root password)&lt;/P&gt;
&lt;P&gt;#cd /etc/ssh&lt;/P&gt;
&lt;P&gt;#ls&amp;nbsp; ( you see ssh_config file)&lt;/P&gt;
&lt;P&gt;# vi ssh_config&amp;nbsp; ( use arrow to go end of the files)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Press "i" to insert&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;copy below line as suggested :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;KexAlgorithms &lt;STRONG&gt;diffie-hellman-group1-sha1&lt;/STRONG&gt;,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,&lt;STRONG&gt;diffie-hellman-group14-sha1&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;use mouse to copy and right click to paste (if you using putty)&lt;/P&gt;
&lt;P&gt;once its pasted&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;press ESC key&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;type :wq (write the file)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;restart ssh service -&amp;nbsp;&lt;SPAN&gt;systemctl restart &lt;/SPAN&gt;&lt;SPAN class="token function"&gt;ssh&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;below guide helo you :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://unix.stackexchange.com/questions/340844/how-to-enable-diffie-hellman-group1-sha1-key-exchange-on-debian-8-0/340853" target="_blank"&gt;https://unix.stackexchange.com/questions/340844/how-to-enable-diffie-hellman-group1-sha1-key-exchange-on-debian-8-0/340853&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jan 2022 23:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532099#M1086462</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-15T23:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532130#M1086464</link>
      <description>&lt;P&gt;Hi, I used nano instead of vi to edit it since not that familar with vi. I added that commands to ssh_config sucessfully. but as following, it still cannot reach the router. The link that you showed above is very same as my situation, but my case cannot go through. I tried it several times in case some of typo. I think there are two ways that I still can try: one is change Ubuntu to earlir version or change router to a new version. Is this right direction?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin1@DESKTOP-935CSD2:/etc/ssh$ &lt;STRONG&gt;ssh admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;Unable to negotiate with 192.168.1.16 port 22: no matching cipher found. Their offer: aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc&lt;BR /&gt;admin1@DESKTOP-935CSD2:/etc/ssh$ &lt;STRONG&gt;ssh -o KexAlgorithms=diffie-hellman-group1-sha1 -o Ciphers=aes256-cbc admin@192.168.1.16&lt;/STRONG&gt;&lt;BR /&gt;ssh_dispatch_run_fatal: Connection to 192.168.1.16 port 22: &lt;STRONG&gt;Invalid key length&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Invalid key length" what it mean? How can i correct it?&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------------------- added Cipher:&lt;/P&gt;&lt;P&gt;KexAlgorithms diffie-hellman-group1-sha1,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;&lt;STRONG&gt;Ciphers&lt;/STRONG&gt; 3des-cbc,blowfish-cbc,aes128-cbc,aes128-ctr,aes256-ctr&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin1@DESKTOP-935CSD2:/etc/ssh$&lt;STRONG&gt; ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 admin@192.168.1.15&lt;/STRONG&gt;&lt;BR /&gt;/etc/ssh/ssh_config line 56: Bad SSH2 cipher spec '3des-cbc,blowfish-cbc,aes128-cbc,aes128-ctr,aes256-ctr'.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jan 2022 04:42:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532130#M1086464</guid>
      <dc:creator>interfacedy</dc:creator>
      <dc:date>2022-01-16T04:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532203#M1086466</link>
      <description>&lt;PRE&gt;admin1@DESKTOP-935CSD2:/etc/ssh$ ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 admin@192.168.1.15
/etc/ssh/ssh_config line &lt;FONT color="#FF0000"&gt;56&lt;/FONT&gt;: Bad SSH2 cipher spec '3des-cbc,blowfish-cbc,aes128-cbc,aes128-ctr,aes256-ctr'.&lt;/PRE&gt;
&lt;P&gt;it is giving an error on line 56.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;post output from Linux&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cat&amp;nbsp;/etc/ssh/ssh_config&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jan 2022 10:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532203#M1086466</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-01-16T10:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532265#M1086472</link>
      <description>&lt;P&gt;Please see below:&lt;/P&gt;&lt;P&gt;admin1@DESKTOP-935CSD2:/etc/ssh$ &lt;STRONG&gt;cat /etc/ssh/ssh_config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;# This is the ssh client system-wide configuration file. See&lt;BR /&gt;# ssh_config(5) for more information. This file provides defaults for&lt;BR /&gt;# users, and the values can be changed in per-user configuration files&lt;BR /&gt;# or on the command line.&lt;/P&gt;&lt;P&gt;# Configuration data is parsed as follows:&lt;BR /&gt;# 1. command line options&lt;BR /&gt;# 2. user-specific file&lt;BR /&gt;# 3. system-wide file&lt;BR /&gt;# Any configuration value is only changed the first time it is set.&lt;BR /&gt;# Thus, host-specific definitions should be at the beginning of the&lt;BR /&gt;# configuration file, and defaults at the end.&lt;/P&gt;&lt;P&gt;# Site-wide defaults for some commonly used options. For a comprehensive&lt;BR /&gt;# list of available options, their meanings and defaults, please see the&lt;BR /&gt;# ssh_config(5) man page.&lt;/P&gt;&lt;P&gt;Include /etc/ssh/ssh_config.d/*.conf&lt;/P&gt;&lt;P&gt;Host *&lt;BR /&gt;# ForwardAgent no&lt;BR /&gt;# ForwardX11 no&lt;BR /&gt;# ForwardX11Trusted yes&lt;BR /&gt;# PasswordAuthentication yes&lt;BR /&gt;# HostbasedAuthentication no&lt;BR /&gt;# GSSAPIAuthentication no&lt;BR /&gt;# GSSAPIDelegateCredentials no&lt;BR /&gt;# GSSAPIKeyExchange no&lt;BR /&gt;# GSSAPITrustDNS no&lt;BR /&gt;# BatchMode no&lt;BR /&gt;# CheckHostIP yes&lt;BR /&gt;# AddressFamily any&lt;BR /&gt;# ConnectTimeout 0&lt;BR /&gt;# StrictHostKeyChecking ask&lt;BR /&gt;# IdentityFile ~/.ssh/id_rsa&lt;BR /&gt;# IdentityFile ~/.ssh/id_dsa&lt;BR /&gt;# IdentityFile ~/.ssh/id_ecdsa&lt;BR /&gt;# IdentityFile ~/.ssh/id_ed25519&lt;BR /&gt;# Port 22&lt;BR /&gt;# Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,3des-cbc&lt;BR /&gt;# MACs hmac-md5,hmac-sha1,umac-64@openssh.com&lt;BR /&gt;# EscapeChar ~&lt;BR /&gt;# Tunnel no&lt;BR /&gt;# TunnelDevice any:any&lt;BR /&gt;# PermitLocalCommand no&lt;BR /&gt;# VisualHostKey no&lt;BR /&gt;# ProxyCommand ssh -q -W %h:%p gateway.example.com&lt;BR /&gt;# RekeyLimit 1G 1h&lt;BR /&gt;SendEnv LANG LC_*&lt;BR /&gt;HashKnownHosts yes&lt;BR /&gt;GSSAPIAuthentication yes&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;KexAlgorithms diffie-hellman-group1-sha1,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;Ciphers 3des-cbc,blowfish-cbc,aes128-cbc,aes128-ctr,aes256-ctr&lt;BR /&gt;admin1@DESKTOP-935CSD2:/etc/ssh$&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jan 2022 15:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532265#M1086472</guid>
      <dc:creator>interfacedy</dc:creator>
      <dc:date>2022-01-16T15:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: What kind of cipher should be used when ssh to a router</title>
      <link>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532341#M1086485</link>
      <description>&lt;P&gt;After changing key, finally the issue resolved! Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 00:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-kind-of-cipher-should-be-used-when-ssh-to-a-router/m-p/4532341#M1086485</guid>
      <dc:creator>interfacedy</dc:creator>
      <dc:date>2022-01-17T00:26:34Z</dc:date>
    </item>
  </channel>
</rss>

