Carlos Perez
Carlos Perez
https://www.powershellgallery.com/packages/Posh-SSH/2.3.0-Beta1
What is the “device”? Cisco? H3C?
Any way to change the host key on it to one of the supported algorithms by the library (list is in the readme.md)? Seems it upgraded to ciphers that are...
The host keys supported are ssh-ed25519 ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 ssh-rsa ssh-dss
Is there any error logged on the device? Sent from my iPhone > On Jan 25, 2022, at 8:48 AM, SleeperCZ ***@***.***> wrote: > > > Hello, I am...
Sadly no because I dont have the gear to reproduce or test this. Sent from my iPhone > On Feb 14, 2022, at 12:33 PM, SleeperCZ ***@***.***> wrote: > >...
Can you check what is the algorithms set on the device and what are the ones used for the hose key? Could be it moved to a version of AES...
Noticed something interesting on Mac OS it is not able to negotiate a channel to validate the key using OpenSSH debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX...
I think it could be the chaca cipher or this problem https://github.com/sshnet/SSH.NET/pull/841
Do you know if the target has compression disabled? Since Posh-SSH does not support it Sent from my iPhone > On Mar 24, 2022, at 2:11 PM, SleeperCZ ***@***.***> wrote:...