Hi Dave On Fri, Nov 27, 2015 at 3:01 PM, Dave Page <dp...@pgadmin.org> wrote:
> On Fri, Nov 27, 2015 at 9:23 AM, Sven <svoop_6cedifw...@delirium.ch> > wrote: > >> The key exchange methods offered when opening an SSH tunnel are all > >> SHA1 and therefore too weak: > >> > >> [sshd] fatal: Unable to negotiate with xxx.xxx.xxx.xxx: no matching > >> key exchange method found. Their offer: > >> diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1, > >> diffie-hellman-group1-sha1 [preauth] > > > > Any news on this? If there's no easy way to add safer kexes, I suggest > > you disable the SSH feature altogether. SHA1 is dead and IMO nobody > > should trust a connection established with SHA1 kexes in order to talk > > to databases. > > Akshay, you know that code best of all. How do we enable safer kexes? > Today I'll look into it on priority and update accordingly. > > -- > Dave Page > Blog: http://pgsnake.blogspot.com > Twitter: @pgsnake > > EnterpriseDB UK: http://www.enterprisedb.com > The Enterprise PostgreSQL Company > -- *Akshay Joshi* *Principal Software Engineer * *Phone: +91 20-3058-9517Mobile: +91 976-788-8246*