Re: SSH tunnel key exchange methods - Mailing list pgadmin-support

From Sven
Subject Re: SSH tunnel key exchange methods
Date
Msg-id loom.20151127T101921-647@post.gmane.org
Whole thread Raw
In response to SSH tunnel key exchange methods  (Sven <svoop_6cedifwf9e@delirium.ch>)
Responses Re: SSH tunnel key exchange methods  (Dave Page <dpage@pgadmin.org>)
List pgadmin-support
> The key exchange methods offered when opening an SSH tunnel are all 
> SHA1 and therefore too weak:
>
> [sshd] fatal: Unable to negotiate with xxx.xxx.xxx.xxx: no matching 
> key exchange method found. Their offer:
> diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,
> diffie-hellman-group1-sha1 [preauth]

Any news on this? If there's no easy way to add safer kexes, I suggest 
you disable the SSH feature altogether. SHA1 is dead and IMO nobody 
should trust a connection established with SHA1 kexes in order to talk 
to databases.




pgadmin-support by date:

Previous
From: Nikolai Zhubr
Date:
Subject: Re: Setof-returning function create script bug
Next
From: Dave Page
Date:
Subject: Re: SSH tunnel key exchange methods