Reference Guide
...
SFTP Proxy
SFTP Proxy Encryption and Key Exchange Algorithms
2 min
ssh (also sftp), or secure shell, provides a mechanism to establish a cryptographically secured connection between two parties, authenticating each side to the other, and passing commands and output back and forth in order to secure the transmission of information, ssh employs a number of different types of data manipulation techniques, at various points during the transaction system admins can configure the sftp proxy to enable or disable the key exchange and authentication algorithms used between the user and the sftp proxy to configure the sftp proxy to enable key exchange and authentication algorithms connect to the kron pam server cli interface as a kron pam admin user set the required parameters in /u01/sftp proxy/conf/nsso properties multiple values can be used by separating the values with a comma “,” parameter available values nsso server encryption algorithms aes128 cbc,3des cbc,blowfish cbc,aes192 cbc,aes256 cbc,aes128 ctr,aes192 ctr,aes256 ctr nsso server host key algorithms ssh rsa,ssh dsa nsso server kex algorithms diffie hellman group14 sha1 nsso server mac algorithms hmac md5,hmac sha1,hmac md5 96,hmac sha1 96,hmac sha 256,hmac sha 512 restart the sftp proxy service on the cli terminal with the command systemctl restart pam sftp