SFTP Proxy Encryption and Key Exchange Algorithms
SSH (also SFTP), or secure shell, provides a mechanism to establish a cryptographically secured connection between two parties, authenticating each side to the other, and passing commands and output back and forth. In order to secure the transmission of information, SSH employs a number of different types of data manipulation techniques, at various points during the transaction.
System admins can configure the SFTP Proxy to enable or disable the key exchange and authentication algorithms used between the user and the SFTP Proxy. To configure the SFTP Proxy to enable key exchange and authentication algorithms:
- Connect to the Kron PAM server CLI interface as a Kron PAM admin user.
- Set the required parameters in /u01/sftp-proxy/conf/nsso.properties. Multiple values can be used by separating the values with a comma “,”.
Parameter | Available Values |
---|---|
nsso.server.encryption.algorithms | aes128-cbc,3des-cbc,blowfish-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr |
nsso.server.host.key.algorithms | ssh-rsa,ssh-dsa |
nsso.server.kex.algorithms | diffie-hellman-group14-sha1 |
nsso.server.mac.algorithms | hmac-md5,hmac-sha1,hmac-md5-96,hmac-sha1-96,hmac-sha-256,hmac-sha-512 |
- Restart the SFTP Proxy service on the CLI Terminal with the command: systemctl restart pam-sftp