I am sorry, but the solution I presented in my earlier post seems to work only for older OpenSSH servers.
For Ubuntu 16.04 LTS (with OpenSSH 7.2.) I also had to add:
HostKeyAlgorithms ssh-dss
to /etc/ssh/sshd_config because ssh-dss seems to have been deactivated by default since OpenSSH 6.9.
But in the end SSH2DOS was still not able to connect to OpenSSH 7.2.
Perhaps someone has an idea?
At the moment SSH2DOS can only be used to connect to older servers, running f.i. Debian Wheezy (OpenSSH 6.0) or Jessie (OpenSSH 6.7). So soon there will be no functioning SSH client anymore for DOS. :-(
On the server, Ubuntu 16.04 LTS (with OpenSSH 7.2.), /var/log/auth.log says:
Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: error: kex protocol error: type 30 seq 1 [preauth]
Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: error: Received disconnect from 192.168.1.110 port 564:3: Expected KEX_DH_GEX_GROUP [preauth]
Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: Disconnected from 192.168.1.110 port 564 [preauth]
C:> ssh2d386 -d username 192.168.1.131
wrote the following output in C:\SSH2DOS\DEBUG.PKT:
Then, make use of the -g option - it goes BEFORE your username in ssh2dos. You should now be able to connect.
I do not know why simply adding +diffie-hellman-group1-sha1 doesn't work, it seems it should. Also, I was in a rush - I may be excluding some newer options - report back if you find/add them with success.
You may need to regenerate your keys with "ssh-keygen -A" after modifying the server.
Last edit: UliHansen 2017-01-27
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Hi folks,
I am not hosting my own server, but using the ssh2d386 client to reach our
office shell with dreamhost. Unfortunately on 29 June they stopped
supporting a number of keys. I am unsure why the -g option is not
working. I need to create a log file for them, but cannot figure out how
the -l option works for this?
Thanks,
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
EDIT Finally I got it to work. Please jump forward to my most recent reply...
Took some time to solve this one... :-)
Hope it helps! Good luck with DOS networking!
Ulrich
The solution:
Add the following lines to /etc/ssh/sshd_config on the server:
Ciphers aes128-cbc
KexAlgorithms diffie-hellman-group-exchange-sha1
It wasn't necessary, but it might not hurt to also add:
MACs hmac-sha1
The problem:
SSH2DOS works fine with a Debian Wheezy machine with OpenSSH 6.0.
But it does not connect to a Debian 8 machine with OpenSSH 6.7.
It also does not connect to a Ubuntu 16.04 server with OpenSSH 7.2.
SSH2DOS gives the following error code:
C:> ssh2d386 username 192.168.1.136
SSH2DOS v0.2.1. 386+ version
Remote host closed connection
DH key exchange failed
Socket write error. File: transprt.c, line:698
Remote reset connection
On the server /var/log/auth.log says:
Jan 23 00:17:25 debian8 sshd [1883]: fatal: Unable to negotiate a key exchange method [preauth]
And SSH2D386 with the -d option writes the following information into DEBUG.PKT:
RECEIVED packet:
14 19 D1 34 D8 10 BA DE 87 62 E4 CF 70 8D 52 78
AF 00 00 00 96 63 75 72 76 65 32 35 35 31 39 2D
73 68 61 32 35 36 40 6C 69 62 73 73 68 2E 6F 72
67 2C 65 63 64 68 2D 73 68 61 32 2D 6E 69 73 74
70 32 35 36 2C 65 63 64 68 2D 73 68 61 32 2D 6E
69 73 74 70 33 38 34 2C 65 63 64 68 2D 73 68 61
32 2D 6E 69 73 74 70 35 32 31 2C 64 69 66 66 69
65 2D 68 65 6C 6C 6D 61 6E 2D 67 72 6F 75 70 2D
65 78 63 68 61 6E 67 65 2D 73 68 61 32 35 36 2C
64 69 66 66 69 65 2D 68 65 6C 6C 6D 61 6E 2D 67
72 6F 75 70 31 34 2D 73 68 61 31 00 00 00 2F 73
73 68 2D 72 73 61 2C 73 73 68 2D 64 73 73 2C 65
63 64 73 61 2D 73 68 61 32 2D 6E 69 73 74 70 32
35 36 2C 73 73 68 2D 65 64 32 35 35 31 39 00 00
00 E9 33 64 65 73 2D 63 62 63 2C 62 6C 6F 77 66
69 73 68 2D 63 62 63 2C 63 61 73 74 31 32 38 2D
63 62 63 2C 61 72 63 66 6F 75 72 2C 61 72 63 66
6F 75 72 31 32 38 2C 61 72 63 66 6F 75 72 32 35
36 2C 61 65 73 31 32 38 2D 63 62 63 2C 61 65 73
31 39 32 2D 63 62 63 2C 61 65 73 32 35 36 2D 63
62 63 2C 72 69 6A 6E 64 61 65 6C 2D 63 62 63 40
6C 79 73 61 74 6F 72 2E 6C 69 75 2E 73 65 2C 61
65 73 31 32 38 2D 63 74 72 2C 61 65 73 31 39 32
2D 63 74 72 2C 61 65 73 32 35 36 2D 63 74 72 2C
61 65 73 31 32 38 2D 67 63 6D 40 6F 70 65 6E 73
73 68 2E 63 6F 6D 2C 61 65 73 32 35 36 2D 67 63
6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 63 68
61 63 68 61 32 30 2D 70 6F 6C 79 31 33 30 35 40
6F 70 65 6E 73 73 68 2E 63 6F 6D 00 00 00 E9 33
64 65 73 2D 63 62 63 2C 62 6C 6F 77 66 69 73 68
2D 63 62 63 2C 63 61 73 74 31 32 38 2D 63 62 63
2C 61 72 63 66 6F 75 72 2C 61 72 63 66 6F 75 72
31 32 38 2C 61 72 63 66 6F 75 72 32 35 36 2C 61
65 73 31 32 38 2D 63 62 63 2C 61 65 73 31 39 32
2D 63 62 63 2C 61 65 73 32 35 36 2D 63 62 63 2C
72 69 6A 6E 64 61 65 6C 2D 63 62 63 40 6C 79 73
61 74 6F 72 2E 6C 69 75 2E 73 65 2C 61 65 73 31
32 38 2D 63 74 72 2C 61 65 73 31 39 32 2D 63 74
72 2C 61 65 73 32 35 36 2D 63 74 72 2C 61 65 73
31 32 38 2D 67 63 6D 40 6F 70 65 6E 73 73 68 2E
63 6F 6D 2C 61 65 73 32 35 36 2D 67 63 6D 40 6F
70 65 6E 73 73 68 2E 63 6F 6D 2C 63 68 61 63 68
61 32 30 2D 70 6F 6C 79 31 33 30 35 40 6F 70 65
6E 73 73 68 2E 63 6F 6D 00 00 01 92 68 6D 61 63
2D 73 68 61 31 2C 68 6D 61 63 2D 73 68 61 31 2D
39 36 2C 68 6D 61 63 2D 73 68 61 32 2D 32 35 36
2C 68 6D 61 63 2D 73 68 61 32 2D 35 31 32 2C 68
6D 61 63 2D 6D 64 35 2C 68 6D 61 63 2D 6D 64 35
2D 39 36 2C 68 6D 61 63 2D 72 69 70 65 6D 64 31
36 30 2C 68 6D 61 63 2D 72 69 70 65 6D 64 31 36
30 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 75 6D
61 63 2D 36 34 40 6F 70 65 6E 73 73 68 2E 63 6F
6D 2C 75 6D 61 63 2D 31 32 38 40 6F 70 65 6E 73
73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 73 68 61 31
2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D
2C 68 6D 61 63 2D 73 68 61 31 2D 39 36 2D 65 74
6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D
61 63 2D 73 68 61 32 2D 32 35 36 2D 65 74 6D 40
6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63
2D 73 68 61 32 2D 35 31 32 2D 65 74 6D 40 6F 70
65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 6D
64 35 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63
6F 6D 2C 68 6D 61 63 2D 6D 64 35 2D 39 36 2D 65
74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68
6D 61 63 2D 72 69 70 65 6D 64 31 36 30 2D 65 74
6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 75 6D
61 63 2D 36 34 2D 65 74 6D 40 6F 70 65 6E 73 73
68 2E 63 6F 6D 2C 75 6D 61 63 2D 31 32 38 2D 65
74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 00 00
01 92 68 6D 61 63 2D 73 68 61 31 2C 68 6D 61 63
2D 73 68 61 31 2D 39 36 2C 68 6D 61 63 2D 73 68
61 32 2D 32 35 36 2C 68 6D 61 63 2D 73 68 61 32
2D 35 31 32 2C 68 6D 61 63 2D 6D 64 35 2C 68 6D
61 63 2D 6D 64 35 2D 39 36 2C 68 6D 61 63 2D 72
69 70 65 6D 64 31 36 30 2C 68 6D 61 63 2D 72 69
70 65 6D 64 31 36 30 40 6F 70 65 6E 73 73 68 2E
63 6F 6D 2C 75 6D 61 63 2D 36 34 40 6F 70 65 6E
73 73 68 2E 63 6F 6D 2C 75 6D 61 63 2D 31 32 38
40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61
63 2D 73 68 61 31 2D 65 74 6D 40 6F 70 65 6E 73
73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 73 68 61 31
2D 39 36 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E
63 6F 6D 2C 68 6D 61 63 2D 73 68 61 32 2D 32 35
36 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F
6D 2C 68 6D 61 63 2D 73 68 61 32 2D 35 31 32 2D
65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C
68 6D 61 63 2D 6D 64 35 2D 65 74 6D 40 6F 70 65
6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 6D 64
35 2D 39 36 2D 65 74 6D 40 6F 70 65 6E 73 73 68
2E 63 6F 6D 2C 68 6D 61 63 2D 72 69 70 65 6D 64
31 36 30 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E
63 6F 6D 2C 75 6D 61 63 2D 36 34 2D 65 74 6D 40
6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 75 6D 61 63
2D 31 32 38 2D 65 74 6D 40 6F 70 65 6E 73 73 68
2E 63 6F 6D 00 00 00 15 6E 6F 6E 65 2C 7A 6C 69
62 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 00 00 00
15 6E 6F 6E 65 2C 7A 6C 69 62 40 6F 70 65 6E 73
73 68 2E 63 6F 6D 00 00 00 00 00 00 00 00 00 00
00 00 00
...4.....b..p.Rx
.....curve25519-
sha256@libssh.or
g,ecdh-sha2-nist
p256,ecdh-sha2-n
istp384,ecdh-sha
2-nistp521,diffi
e-hellman-group-
exchange-sha256,
diffie-hellman-g
roup14-sha1.../s
sh-rsa,ssh-dss,e
cdsa-sha2-nistp2
56,ssh-ed25519..
..3des-cbc,blowf
ish-cbc,cast128-
cbc,arcfour,arcf
our128,arcfour25
6,aes128-cbc,aes
192-cbc,aes256-c
bc,rijndael-cbc@
lysator.liu.se,a
es128-ctr,aes192
-ctr,aes256-ctr,
aes128-gcm@opens
sh.com,aes256-gc
m@openssh.com,ch
acha20-poly1305@
openssh.com....3
des-cbc,blowfish
-cbc,cast128-cbc
,arcfour,arcfour
128,arcfour256,a
es128-cbc,aes192
-cbc,aes256-cbc,
rijndael-cbc@lys
ator.liu.se,aes1
28-ctr,aes192-ct
r,aes256-ctr,aes
128-gcm@openssh.
com,aes256-gcm@o
penssh.com,chach
a20-poly1305@ope
nssh.com....hmac
-sha1,hmac-sha1-
96,hmac-sha2-256
,hmac-sha2-512,h
mac-md5,hmac-md5
-96,hmac-ripemd1
60,hmac-ripemd16
0@openssh.com,um
ac-64@openssh.co
m,umac-128@opens
sh.com,hmac-sha1
-etm@openssh.com
,hmac-sha1-96-et
m@openssh.com,hm
ac-sha2-256-etm@
openssh.com,hmac
-sha2-512-etm@op
enssh.com,hmac-m
d5-etm@openssh.c
om,hmac-md5-96-e
tm@openssh.com,h
mac-ripemd160-et
m@openssh.com,um
ac-64-etm@openss
h.com,umac-128-e
tm@openssh.com..
..hmac-sha1,hmac
-sha1-96,hmac-sh
a2-256,hmac-sha2
-512,hmac-md5,hm
ac-md5-96,hmac-r
ipemd160,hmac-ri
pemd160@openssh.
com,umac-64@open
ssh.com,umac-128
@openssh.com,hma
c-sha1-etm@opens
sh.com,hmac-sha1
-96-etm@openssh.
com,hmac-sha2-25
6-etm@openssh.co
m,hmac-sha2-512-
etm@openssh.com,
hmac-md5-etm@ope
nssh.com,hmac-md
5-96-etm@openssh
.com,hmac-ripemd
160-etm@openssh.
com,umac-64-etm@
openssh.com,umac
-128-etm@openssh
.com....none,zli
b@openssh.com...
.none,zlib@opens
sh.com..........
...
SENT packet:
14 97 51 49 CA 09 AA 92 BB C0 25 D3 4C C9 30 D1
E1 00 00 00 22 64 69 66 66 69 65 2D 68 65 6C 6C
6D 61 6E 2D 67 72 6F 75 70 2D 65 78 63 68 61 6E
67 65 2D 73 68 61 31 00 00 00 07 73 73 68 2D 64
73 73 00 00 00 0A 61 65 73 31 32 38 2D 63 62 63
00 00 00 0A 61 65 73 31 32 38 2D 63 62 63 00 00
00 09 68 6D 61 63 2D 73 68 61 31 00 00 00 09 68
6D 61 63 2D 73 68 61 31 00 00 00 09 6E 6F 6E 65
2C 7A 6C 69 62 00 00 00 09 6E 6F 6E 65 2C 7A 6C
69 62 00 00 00 00 00 00 00 00 00 00 00 00 00
..QI......%.L.0.
...."diffie-hell
man-group-exchan
ge-sha1....ssh-d
ss....aes128-cbc
....aes128-cbc..
..hmac-sha1....h
mac-sha1....none
,zlib....none,zl
ib.............
SENT packet:
1E 00 00 04 00
.....
SENT packet:
62 00 00 00 00 00 00 00 07 70 74 79 2D 72 65 71
01 00 00 00 05 78 74 65 72 6D 00 00 00 50 00 00
00 18 00 00 00 00 00 00 00 00 00 00 00 00
b........pty-req
.....xterm...P..
..............
Last edit: UliHansen 2017-01-27
I am sorry, but the solution I presented in my earlier post seems to work only for older OpenSSH servers.
For Ubuntu 16.04 LTS (with OpenSSH 7.2.) I also had to add:
HostKeyAlgorithms ssh-dss
to /etc/ssh/sshd_config because ssh-dss seems to have been deactivated by default since OpenSSH 6.9.
But in the end SSH2DOS was still not able to connect to OpenSSH 7.2.
Perhaps someone has an idea?
At the moment SSH2DOS can only be used to connect to older servers, running f.i. Debian Wheezy (OpenSSH 6.0) or Jessie (OpenSSH 6.7). So soon there will be no functioning SSH client anymore for DOS. :-(
Here are the messages:
SSH2DOS error message is:
C:> ssh2d386 username 192.168.1.131
SSH2DOS v0.2.1. 386+ version
Expected KEX_DH_GEX_GROUP
DH key exchange failed
Remote host closed connection
Socket write error. File: transprt.c, line:698
Connection closed by peer
On the server, Ubuntu 16.04 LTS (with OpenSSH 7.2.), /var/log/auth.log says:
Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: error: kex protocol error: type 30 seq 1 [preauth]
Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: error: Received disconnect from 192.168.1.110 port 564:3: Expected KEX_DH_GEX_GROUP [preauth]
Jan 23 09:55:09 ubuntu-VirtualBox sshd[4661]: Disconnected from 192.168.1.110 port 564 [preauth]
C:> ssh2d386 -d username 192.168.1.131
wrote the following output in C:\SSH2DOS\DEBUG.PKT:
RECEIVED packet:
14 BE 6D 01 48 D3 E5 EB 2A C1 81 DE E7 31 AB DB
B2 00 00 00 22 64 69 66 66 69 65 2D 68 65 6C 6C
6D 61 6E 2D 67 72 6F 75 70 2D 65 78 63 68 61 6E
67 65 2D 73 68 61 31 00 00 00 07 73 73 68 2D 64
73 73 00 00 00 0A 61 65 73 31 32 38 2D 63 62 63
00 00 00 0A 61 65 73 31 32 38 2D 63 62 63 00 00
00 D5 75 6D 61 63 2D 36 34 2D 65 74 6D 40 6F 70
65 6E 73 73 68 2E 63 6F 6D 2C 75 6D 61 63 2D 31
32 38 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63
6F 6D 2C 68 6D 61 63 2D 73 68 61 32 2D 32 35 36
2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D
2C 68 6D 61 63 2D 73 68 61 32 2D 35 31 32 2D 65
74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68
6D 61 63 2D 73 68 61 31 2D 65 74 6D 40 6F 70 65
6E 73 73 68 2E 63 6F 6D 2C 75 6D 61 63 2D 36 34
40 6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 75 6D 61
63 2D 31 32 38 40 6F 70 65 6E 73 73 68 2E 63 6F
6D 2C 68 6D 61 63 2D 73 68 61 32 2D 32 35 36 2C
68 6D 61 63 2D 73 68 61 32 2D 35 31 32 2C 68 6D
61 63 2D 73 68 61 31 00 00 00 D5 75 6D 61 63 2D
36 34 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63
6F 6D 2C 75 6D 61 63 2D 31 32 38 2D 65 74 6D 40
6F 70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63
2D 73 68 61 32 2D 32 35 36 2D 65 74 6D 40 6F 70
65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 73
68 61 32 2D 35 31 32 2D 65 74 6D 40 6F 70 65 6E
73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D 73 68 61
31 2D 65 74 6D 40 6F 70 65 6E 73 73 68 2E 63 6F
6D 2C 75 6D 61 63 2D 36 34 40 6F 70 65 6E 73 73
68 2E 63 6F 6D 2C 75 6D 61 63 2D 31 32 38 40 6F
70 65 6E 73 73 68 2E 63 6F 6D 2C 68 6D 61 63 2D
73 68 61 32 2D 32 35 36 2C 68 6D 61 63 2D 73 68
61 32 2D 35 31 32 2C 68 6D 61 63 2D 73 68 61 31
00 00 00 15 6E 6F 6E 65 2C 7A 6C 69 62 40 6F 70
65 6E 73 73 68 2E 63 6F 6D 00 00 00 15 6E 6F 6E
65 2C 7A 6C 69 62 40 6F 70 65 6E 73 73 68 2E 63
6F 6D 00 00 00 00 00 00 00 00 00 00 00 00 00
..m.H...*....1..
...."diffie-hell
man-group-exchan
ge-sha1....ssh-d
ss....aes128-cbc
....aes128-cbc..
..umac-64-etm@op
enssh.com,umac-1
28-etm@openssh.c
om,hmac-sha2-256
-etm@openssh.com
,hmac-sha2-512-e
tm@openssh.com,h
mac-sha1-etm@ope
nssh.com,umac-64
@openssh.com,uma
c-128@openssh.co
m,hmac-sha2-256,
hmac-sha2-512,hm
ac-sha1....umac-
64-etm@openssh.c
om,umac-128-etm@
openssh.com,hmac
-sha2-256-etm@op
enssh.com,hmac-s
ha2-512-etm@open
ssh.com,hmac-sha
1-etm@openssh.co
m,umac-64@openss
h.com,umac-128@o
penssh.com,hmac-
sha2-256,hmac-sh
a2-512,hmac-sha1
....none,zlib@op
enssh.com....non
e,zlib@openssh.c
om.............
SENT packet:
14 25 81 88 A7 CD 90 15 0E 5E 3B 7C B4 0B 1E 9D
CA 00 00 00 22 64 69 66 66 69 65 2D 68 65 6C 6C
6D 61 6E 2D 67 72 6F 75 70 2D 65 78 63 68 61 6E
67 65 2D 73 68 61 31 00 00 00 07 73 73 68 2D 64
73 73 00 00 00 0A 61 65 73 31 32 38 2D 63 62 63
00 00 00 0A 61 65 73 31 32 38 2D 63 62 63 00 00
00 09 68 6D 61 63 2D 73 68 61 31 00 00 00 09 68
6D 61 63 2D 73 68 61 31 00 00 00 09 6E 6F 6E 65
2C 7A 6C 69 62 00 00 00 09 6E 6F 6E 65 2C 7A 6C
69 62 00 00 00 00 00 00 00 00 00 00 00 00 00
.%.......^;|....
...."diffie-hell
man-group-exchan
ge-sha1....ssh-d
ss....aes128-cbc
....aes128-cbc..
..hmac-sha1....h
mac-sha1....none
,zlib....none,zl
ib.............
SENT packet:
1E 00 00 04 00
.....
RECEIVED packet:
03 00 00 00 01
.....
SENT packet:
03 00 00 00 02
.....
SENT packet:
01 00 00 00 03 00 00 00 19 45 78 70 65 63 74 65
64 20 4B 45 58 5F 44 48 5F 47 45 58 5F 47 52 4F
55 50 00 00 00 00
.........Expecte
d KEX_DH_GEX_GRO
UP....
SENT packet:
62 00 00 00 00 00 00 00 07 70 74 79 2D 72 65 71
01 00 00 00 05 78 74 65 72 6D 00 00 00 50 00 00
00 18 00 00 00 00 00 00 00 00 00 00 00 00
b........pty-req
.....xterm...P..
..............
SENT packet:
62 00 00 00 00 00 00 00 05 73 68 65 6C 6C 01
b........shell.
This solved my problem:
https://www.mail-archive.com/freedos-user@lists.sourceforge.net/msg17946.html
I am now able to connect to an Ubuntu 16.04 LTS server running OpenSSH 7.2 with a SS2DOS v.0.2.1 client from FreeDOS 1.2.
I quote the solution here, so maybe it helps others...
Dan Schmidt wrote to the FreeDOS user mailing list:
Firstly, add this to your server's /etc/ssh/sshd_config:
KexAlgorithms diffie-hellman-group1-sha1,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
Ciphers 3des-cbc,blowfish-cbc,aes128-cbc,aes128-ctr,aes256-ctr
HostKeyAlgorithms +ssh-dss
Then, make use of the -g option - it goes BEFORE your username in ssh2dos. You should now be able to connect.
I do not know why simply adding +diffie-hellman-group1-sha1 doesn't work, it seems it should. Also, I was in a rush - I may be excluding some newer options - report back if you find/add them with success.
You may need to regenerate your keys with "ssh-keygen -A" after modifying the server.
Last edit: UliHansen 2017-01-27
Hi folks,
I am not hosting my own server, but using the ssh2d386 client to reach our
office shell with dreamhost. Unfortunately on 29 June they stopped
supporting a number of keys. I am unsure why the -g option is not
working. I need to create a log file for them, but cannot figure out how
the -l option works for this?
Thanks,