Harry Putnam:
>
> harry-on-REMOTE-sol > ssh REMOTE-deb
>
> no common kex alg: client
> 'diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1',
> server
> 'curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1'
This means client and server couldn't agree on a key exchange
algorithm. If you compare the client's and the server's list you will
notice they have nothing in common.
What flavor if Debian is the remote host running? The package
openssh-server from unstable has this more or less recent changelog
entry:
openssh (1:6.7p1-1) unstable; urgency=medium
* New upstream release (http://www.openssh.com/txt/release-6.7):
- sshd(8): The default set of ciphers and MACs has been altered to
remove unsafe algorithms. In particular, CBC ciphers and arcfour* are
disabled by default. The full set of algorithms remains available if
configured explicitly via the Ciphers and MACs sshd_config options.
…
-- Colin Watson <cjwatson@debian.org> Thu, 09 Oct 2014 14:05:56 +0100
J.
--
When driving at night I find the headlights of oncoming vehicles very
attractive.
[Agree] [Disagree]
<http://www.slowlydownward.com/NODATA/data_enter2.html>
Attachment:
signature.asc
Description: Digital signature