Skip to content

Instantly share code, notes, and snippets.

@atiensivu
Last active September 10, 2017 03:55
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save atiensivu/f1cd8f5ea2d3a38e0aec79efe0d5e419 to your computer and use it in GitHub Desktop.
Save atiensivu/f1cd8f5ea2d3a38e0aec79efe0d5e419 to your computer and use it in GitHub Desktop.
OpenSSH client - "better" default cipher orders while still compatible
# Mostly based on https://wiki.mozilla.org/Security/Guidelines/OpenSSH#Modern
Host *
ServerAliveInterval 60
# Ensure KnownHosts are unreadable if leaked - it is otherwise easier to know which hosts your keys have access to.
HashKnownHosts yes
# Host keys the client accepts - order here is honored by OpenSSH - not sure about DropBear
HostKeyAlgorithms ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256
KexAlgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment