This message only applies to users connecting to Dsco via an SFTP integration. We encourage all users to regularly update software clients to their latest versions. If you have any questions reach out to support@dsco.io.

Discontinued:

To maintain our data infrastructure and security, Dsco will discontinue support for these outdated cipher suites on October 1, 2019:

Host-key: ecdsa-sha2-nistp256, ssh-dss

Ciphers: arcfour128, aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,cast128-cbc,arcfour256

KexAlgorithms: diffie-hellman-group1-sha1, diffie-hellman-group-exchange-sha1, ecdh-sha2-nistp521,ecdh-sha2-nistp384, ecdh-sha2-nistp256

Macs: hmac-md5-etm@openssh.com, hmac-ripemd160-etm@openssh.com, hmac-ripemd160@openssh.com, hmac-ripemd160, hmac-sha1-96-etm@openssh.com, hmac-sha1-etm@openssh.com, hmac-sha1-96, hmac-sha1, umac-64-etm@openssh.com, umac-64@openssh.com

Supported:

Dsco will continue to support the following suites:

Host-key: ssh-ed25519, ssh-rsa

Ciphers: chacha20-poly1305@openssh.com, aes256-gcm@openssh.com, aes128-gcm@openssh.com, aes256-ctr, aes192-ctr, aes128-ctr

Kex Algorithms: curve25519-sha256@libssh.org, diffie-hellman-group-exchange-sha256

Macs: hmac-sha2-512-etm@openssh.com, hmac-sha2-256-etm@openssh.com, umac-128-etm@openssh.com, hmac-sha2-512, hmac-sha2-256, umac-128@openssh.com



Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.