This article applies as of PRTG 22.2.76
The default SSH connection mode supports:
Cipher | • aes128-ctr • aes128-gcm@openssh.com • aes192-ctr • aes256-ctr • aes256-gcm@openssh.com |
Mac | • hmac-sha2-256 • hmac-sha2-256-etm@openssh.com • hmac-sha2-512 • hmac-sha2-512-etm@openssh.com • umac-128@openssh.com • umac-128-etm@openssh.com • umac-64@openssh.com • umac-64-etm@openssh.com |
Kex | • curve25519-sha256 • curve25519-sha256@libssh.org • diffie-hellman-group14-sha256 • diffie-hellman-group16-sha512 • diffie-hellman-group18-sha512 • diffie-hellman-group-exchange-sha256 • ecdh-sha2-nistp256 • ecdh-sha2-nistp384 • ecdh-sha2-nistp521 • sntrup761x25519-sha512@openssh.com |
Host Keys | • ecdsa-sha2-nistp256 • ecdsa-sha2-nistp256-cert-v01@openssh.com • ecdsa-sha2-nistp384 • ecdsa-sha2-nistp384-cert-v01@openssh.com • ecdsa-sha2-nistp521 • ecdsa-sha2-nistp521-cert-v01@openssh.com • rsa-sha2-256 • rsa-sha2-256-cert-v01@openssh.com • rsa-sha2-512 • rsa-sha2-512-cert-v01@openssh.com • sk-ecdsa-sha2-nistp256@openssh.com • sk-ecdsa-sha2-nistp256-cert-v01@openssh.com • sk-ssh-ed25519@openssh.com • sk-ssh-ed25519-cert-v01@openssh.com • ssh-ed25519 • ssh-ed25519-cert-v01@openssh.com • ssh-rsa • ssh-rsa-cert-v01@openssh.com |
The compatibility SSH connection mode is only listed for reference, since it's already deprecated and will be removed in the future:
Cipher | • aes192-cbc • aes256-cbc |
Mac | • hmac-sha1 |
Kex | • diffie-hellman-group1-sha1 • diffie-hellman-group14-sha1 |
Host Keys | • ssh-rsa • ssh-dss |
Additional Notes:
- Always ensure that you use the matching SSH-Key. DSS-Keys do not work.
- The SSH Sensors use a fallback to SHA1/SSH-RSA if the modern algorithms do not work. Just if you see an error in your logs pointing to these older ones.
In case you have any questions or concerns, reach out to support@paessler.com.
Add comment