> Sven, how you have identified the key exchange algorithm used by libssh2, is > there any way to identify using fingerprint or key??
I'm looking at what sshd logs on the server end. Or you start sshd with the "-d" argument which logs to stdout and prevents sshd from being backgrounded. You could also harden sshd by adding the following to sshd_config (don't forget to restart the deamon afterwards): KexAlgorithms [email protected],diffie-hellman-group-exchange-sha256 Ciphers [email protected],[email protected],[email protected],aes256-ctr,aes192-ctr,aes128-ctr MACs [email protected],[email protected],[email protected],[email protected],hmac-sha2-512,hmac-sha2-256,hmac-ripemd160,[email protected] Since SHA1 is not listed as KexAlgorithms, if the connection is still possible, the client must have used SHA256. Cheers, -sven -- Sent via pgadmin-support mailing list ([email protected]) To make changes to your subscription: http://www.postgresql.org/mailpref/pgadmin-support
