I’m a bit of a newbie at this but I’ve previously been able to ssh into my HAOS system but recently it comes up with the error:
Unable to negotiate with 192.168.68.108 port 22: no matching key exchange method found. Their offer: mlkem768x25519-sha256,sntrup761x25519-sha512,[email protected],ext-info-s,[email protected]
HAOS is running on a laptop that is connected via Wi-Fi. I can access home assistant and have the Advanced SSH & web terminal Add on installed so I can access the terminal. But I cannot figure out why it wont let me connect from my windows command line on the same network.
I have a RaspberryPi and an OrangePi on the same network and I can SSH into both of those just fine.
Any help or suggestions would be greatly appreciated.
It is yelling you that none of the encryption methods used on the client match the ones used on the server, so they can not agree to on one to talk through.
No reason to raise an issue on GitHub.
The change is intended and working as it should.
Over time some encryption algorithms will be too weak due to increases in general computing power or due to discovered security holes and these will therefore be disabled in updates.
This got me too. I used to be able to ssh as hassio, but I updated the Advanced SSH & Web terminal add on, and now that my SSL certificate has expired my TrueNAS cron script that fetches a new cert can’t ssh copy it over to Home Assistant.
Now I have no way to manually update the certificate because SSH does not work and Home Assistant is refusing local access too.
WAF is plummeting, thanks a lot Advanced SSH & Web terminal add on. Maybe I forgot to read “Breaking” in the release notes.
It appears to break many common ssh configurations according to comments on that issue.
The applied pull request that added Key Exchange limitations to disable weaker KEX, and change the moduli primes filter in the docker build from >=3071 bits to >=3072 bits,
So this means those of us who were living on the edge of secure will be updating the ssh tools and keys on the various devices to comply - at least until the next security audit.
It is like that with every move on this subject and the terms is set by the OpenSSH team, which do not back down.
SSH is a security app, so security will be first priority.
It is simply checkbox security. They want to get a green audit and, I am not against that but, they have removed cyphers that would not have prevented this.
It is not optimized for putty users.
Putty just happens to follow the same standards released by OpenSSL, which many other vendors does.
If your client does not have these algorithms installed, then it is outdated, even though it might be the newest from the vendor. The vendor have just not followed up with his algorithm libraries.
I have no idea why curve25519-sha256 is not in the list anymore, if it have been in the past.
I could only find an issue with an implementation that had a security hole, but if that implementation was use so widespread that it warranted a removal, I do not know.