Harry Putnam: > > harry-on-REMOTE-sol > ssh REMOTE-deb > > no common kex alg: client > 'diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1', > server > > 'curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1'
This means client and server couldn't agree on a key exchange algorithm. If you compare the client's and the server's list you will notice they have nothing in common. What flavor if Debian is the remote host running? The package openssh-server from unstable has this more or less recent changelog entry: openssh (1:6.7p1-1) unstable; urgency=medium * New upstream release (http://www.openssh.com/txt/release-6.7): - sshd(8): The default set of ciphers and MACs has been altered to remove unsafe algorithms. In particular, CBC ciphers and arcfour* are disabled by default. The full set of algorithms remains available if configured explicitly via the Ciphers and MACs sshd_config options. … -- Colin Watson <cjwat...@debian.org> Thu, 09 Oct 2014 14:05:56 +0100 J. -- When driving at night I find the headlights of oncoming vehicles very attractive. [Agree] [Disagree] <http://www.slowlydownward.com/NODATA/data_enter2.html>
signature.asc
Description: Digital signature