<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to SSH to iLO2 with OpenSSH 6.2 in Server Management - Remote Server Management</title>
    <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6050967#M7312</link>
    <description>&lt;P&gt;Did you try the option&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;HostKeyAlgorithms=ssh-rsa&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 03 May 2013 16:47:46 GMT</pubDate>
    <dc:creator>Oscar A. Perez</dc:creator>
    <dc:date>2013-05-03T16:47:46Z</dc:date>
    <item>
      <title>Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6050925#M7310</link>
      <description>&lt;P&gt;Howdy-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I initially posted this in reply to the v2.15 release announcement, but I'm starting a separate thread now because I reproduced the issue with another SSH client (the Ruby Net::SSH library from &lt;A href="http://net-ssh.github.io/net-ssh/)." target="_blank"&gt;http://net-ssh.github.io/net-ssh/).&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically, I'm unable to connect to iLO2 via SSH from my Linux workstation.&amp;nbsp; I tried with servers running iLO2 firmware v2.06, v2.12 and the recently released v2.15, all without success.&amp;nbsp; My workstation is running ArchLinux:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ uname -a&lt;/P&gt;&lt;P&gt;Linux arch-sl4mmy 3.7.10-1-ARCH #1 SMP PREEMPT Thu Feb 28 09:50:17 CET 2013 x86_64 GNU/Linux&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is some sample debug output when attempting to connect using OpenSSH 6.2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ ssh -vvv ilo01&lt;/P&gt;&lt;P&gt;OpenSSH_6.2p1, OpenSSL 1.0.1e 11 Feb 2013&lt;BR /&gt;debug1: Reading configuration data /home/sl4mmy/.ssh/config&lt;BR /&gt;debug1: /home/sl4mmy/.ssh/config line 15: Applying options for ilo*&lt;BR /&gt;debug1: /home/sl4mmy/.ssh/config line 24: Applying options for *&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to ilo01 [192.168.254.11] port 22.&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: fd 3 clearing O_NONBLOCK&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug3: timeout: 999 ms remain after connect&lt;BR /&gt;debug3: Incorrect RSA1 identifier&lt;BR /&gt;debug3: Could not load "/home/sl4mmy/.ssh/deploy-key" as a RSA1 public key&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/deploy-key type 1&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/deploy-key-cert type -1&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_6.2&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version mpSSH_0.1.1&lt;BR /&gt;debug1: no match: mpSSH_0.1.1&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug3: load_hostkeys: loading entries for host "ilo01" from file "/home/sl4mmy/.ssh/known_hosts"&lt;BR /&gt;debug3: load_hostkeys: found key type RSA in file /home/sl4mmy/.ssh/known_hosts:274&lt;BR /&gt;debug3: load_hostkeys: loaded 1 keys&lt;BR /&gt;debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: none&lt;BR /&gt;debug2: kex_parse_kexinit: none&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_setup: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_setup: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 126/256&lt;BR /&gt;debug2: bits set: 503/1024&lt;BR /&gt;debug1: sending SSH2_MSG_KEXDH_INIT&lt;BR /&gt;debug1: expecting SSH2_MSG_KEXDH_REPLY&lt;BR /&gt;Received disconnect from 192.168.254.11: 2: Client Disconnect&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also reproduced what I believe is the same issue using Ruby's Net::SSH library (the output below was captured by setting the :logger option to Logger::DEBUG):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;D, [2013-05-03T10:17:09.222960 #2074] DEBUG -- net.ssh.transport.session[d272c4]: establishing connection to ilo01:22&lt;BR /&gt;D, [2013-05-03T10:17:09.224466 #2074] DEBUG -- net.ssh.transport.session[d272c4]: connection established&lt;BR /&gt;I, [2013-05-03T10:17:09.224580 #2074]&amp;nbsp; INFO -- net.ssh.transport.server_version[d24970]: negotiating protocol version&lt;BR /&gt;D, [2013-05-03T10:17:09.231403 #2074] DEBUG -- net.ssh.transport.server_version[d24970]: remote is `SSH-2.0-mpSSH_0.1.1'&lt;BR /&gt;D, [2013-05-03T10:17:09.231458 #2074] DEBUG -- net.ssh.transport.server_version[d24970]: local is `SSH-2.0-Ruby/Net::SSH_2.6.7 x86_64-linux'&lt;BR /&gt;D, [2013-05-03T10:17:09.485039 #2074] DEBUG -- tcpsocket[d26400]: read 200 bytes&lt;BR /&gt;D, [2013-05-03T10:17:09.485179 #2074] DEBUG -- tcpsocket[d26400]: received packet nr 0 type 20 len 196&lt;BR /&gt;I, [2013-05-03T10:17:09.485255 #2074]&amp;nbsp; INFO -- net.ssh.transport.algorithms[d21a40]: got KEXINIT from server&lt;BR /&gt;I, [2013-05-03T10:17:09.485329 #2074]&amp;nbsp; INFO -- net.ssh.transport.algorithms[d21a40]: sending KEXINIT&lt;BR /&gt;D, [2013-05-03T10:17:09.487958 #2074] DEBUG -- tcpsocket[d26400]: queueing packet nr 0 type 20 len 1620&lt;BR /&gt;D, [2013-05-03T10:17:09.488054 #2074] DEBUG -- tcpsocket[d26400]: sent 1624 bytes&lt;BR /&gt;I, [2013-05-03T10:17:09.488096 #2074]&amp;nbsp; INFO -- net.ssh.transport.algorithms[d21a40]: negotiating algorithms&lt;BR /&gt;D, [2013-05-03T10:17:09.488242 #2074] DEBUG -- net.ssh.transport.algorithms[d21a40]: negotiated:&lt;BR /&gt;* kex: diffie-hellman-group1-sha1&lt;BR /&gt;* host_key: ssh-rsa&lt;BR /&gt;* encryption_server: aes128-cbc&lt;BR /&gt;* encryption_client: aes128-cbc&lt;BR /&gt;* hmac_client: hmac-sha1&lt;BR /&gt;* hmac_server: hmac-sha1&lt;BR /&gt;* compression_client: none&lt;BR /&gt;* compression_server: none&lt;BR /&gt;* language_client:&lt;BR /&gt;* language_server:&lt;BR /&gt;D, [2013-05-03T10:17:09.488321 #2074] DEBUG -- net.ssh.transport.algorithms[d21a40]: exchanging keys&lt;BR /&gt;D, [2013-05-03T10:17:09.489091 #2074] DEBUG -- tcpsocket[d26400]: queueing packet nr 1 type 30 len 140&lt;BR /&gt;D, [2013-05-03T10:17:09.489145 #2074] DEBUG -- tcpsocket[d26400]: sent 144 bytes&lt;BR /&gt;D, [2013-05-03T10:17:09.490307 #2074] DEBUG -- tcpsocket[d26400]: read 40 bytes&lt;BR /&gt;D, [2013-05-03T10:17:09.490411 #2074] DEBUG -- tcpsocket[d26400]: received packet nr 1 type 1 len 36&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And then it disconnects.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ ruby --version&lt;/P&gt;&lt;P&gt;ruby 1.9.3p392 (2013-02-22 revision 39386) [x86_64-linux]&lt;/P&gt;&lt;P&gt;$ gem list | grep net-ssh&lt;/P&gt;&lt;P&gt;net-ssh (2.6.7)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone else encountered similar problems?&amp;nbsp; Please let me know if I can provide any more information to help identify and fix this issue.&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2013 16:02:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6050925#M7310</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-03T16:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6050931#M7311</link>
      <description>&lt;P&gt;I came across this thread from two years ago &lt;A target="_blank" href="http://www.gossamer-threads.com/lists/openssh/dev/51909"&gt;http://www.gossamer-threads.com/lists/openssh/dev/51909&lt;/A&gt; that describes a similar issue with OpenSSH 5.8, but unfortunately the recommended work-arounds no longer seem to work with OpenSSH 6.2.&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2013 16:11:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6050931#M7311</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-03T16:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6050967#M7312</link>
      <description>&lt;P&gt;Did you try the option&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;HostKeyAlgorithms=ssh-rsa&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2013 16:47:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6050967#M7312</guid>
      <dc:creator>Oscar A. Perez</dc:creator>
      <dc:date>2013-05-03T16:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051027#M7315</link>
      <description>&lt;P&gt;Hi, Oscar-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I did try that.&amp;nbsp; Sorry for not being more clear, but that's what I meant about "recommended work-arounds no longer seem to work with OpenSSH 6.2."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you able to successfully to connect to iLO2 via SSH with OpenSSH v6.2 using that option?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the output with that option on my machine:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ ssh -vvv -o HostKeyAlgorithms=ssh-rsa ilo01&lt;/P&gt;&lt;P&gt;OpenSSH_6.2p1, OpenSSL 1.0.1e 11 Feb 2013&lt;BR /&gt;debug1: Reading configuration data /home/sl4mmy/.ssh/config&lt;BR /&gt;debug1: /home/sl4mmy/.ssh/config line 15: Applying options for ilo*&lt;BR /&gt;debug1: /home/sl4mmy/.ssh/config line 24: Applying options for *&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to ilo01 [192.168.254.11] port 22.&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: fd 3 clearing O_NONBLOCK&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug3: timeout: 999 ms remain after connect&lt;BR /&gt;debug3: Incorrect RSA1 identifier&lt;BR /&gt;debug3: Could not load "/home/sl4mmy/.ssh/deploy-key" as a RSA1 public key&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/deploy-key type 1&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/deploy-key-cert type -1&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_6.2&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version mpSSH_0.1.1&lt;BR /&gt;debug1: no match: mpSSH_0.1.1&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: none&lt;BR /&gt;debug2: kex_parse_kexinit: none&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_setup: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_setup: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 129/256&lt;BR /&gt;debug2: bits set: 506/1024&lt;BR /&gt;debug1: sending SSH2_MSG_KEXDH_INIT&lt;BR /&gt;debug1: expecting SSH2_MSG_KEXDH_REPLY&lt;BR /&gt;Received disconnect from 192.168.254.11: 2: Client Disconnect&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2013 17:29:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051027#M7315</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-03T17:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051043#M7316</link>
      <description>&lt;P&gt;Ok, I'll debug it and hopefully it is an easy fix. &amp;nbsp;I'm getting tired of fixing iLO2 SSH server everytime a new OpenSSH version is released.&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2013 17:50:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051043#M7316</guid>
      <dc:creator>Oscar A. Perez</dc:creator>
      <dc:date>2013-05-03T17:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051125#M7317</link>
      <description>&lt;P&gt;Hi, Oscar-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Great, thanks for offering to look into the issue further!&amp;nbsp; Let me know if there are any further options you'd like me to try or other tests you'd like me to run.&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2013 19:22:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051125#M7317</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-03T19:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051149#M7318</link>
      <description>&lt;P&gt;I know many years ago when there was an issues with iLO&amp;nbsp;and openSSH not working together the workaround was to add "-o ForwardAgent=no&amp;nbsp;-o ForwardX11=no " The issue I had at the time was the ssh client wouldn't use the "-o" options properly from the command line. I had to put them in a file and launch ssh with the "-F configfile" option to read the options correctly. Not saying that is the issue here, but you might give it a try creating a file with "HostKeyAlgorithms=ssh-rsa" and see if it changes anything&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2013 19:52:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051149#M7318</guid>
      <dc:creator>Jimmy Vance</dc:creator>
      <dc:date>2013-05-03T19:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051157#M7319</link>
      <description>&lt;P&gt;Hi, Jimmy-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your suggestion, unfortunately I'm still unable to connect:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ cat ssh_config&lt;/P&gt;&lt;P&gt;Host *&lt;BR /&gt;&amp;nbsp; KexAlgorithms diffie-hellman-group1-sha1&lt;BR /&gt;&amp;nbsp; HostKeyAlgorithms ssh-rsa&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;$ ssh -vvv -F ssh_config ilo01&lt;/P&gt;&lt;P&gt;OpenSSH_6.2p1, OpenSSL 1.0.1e 11 Feb 2013&lt;BR /&gt;debug1: Reading configuration data ssh_config&lt;BR /&gt;debug1: ssh_config line 1: Applying options for *&lt;BR /&gt;debug3: kex names ok: [diffie-hellman-group1-sha1]&lt;BR /&gt;debug3: key names ok: [ssh-rsa]&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to ilo01 [192.168.254.11] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/id_rsa-cert type -1&lt;BR /&gt;debug3: Incorrect RSA1 identifier&lt;BR /&gt;debug3: Could not load "/home/sl4mmy/.ssh/id_dsa" as a RSA1 public key&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/id_dsa type 2&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/id_dsa-cert type -1&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/id_ecdsa type -1&lt;BR /&gt;debug1: identity file /home/sl4mmy/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_6.2&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version mpSSH_0.1.1&lt;BR /&gt;debug1: no match: mpSSH_0.1.1&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: none&lt;BR /&gt;debug2: kex_parse_kexinit: none&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_setup: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_setup: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 136/256&lt;BR /&gt;debug2: bits set: 531/1024&lt;BR /&gt;debug1: sending SSH2_MSG_KEXDH_INIT&lt;BR /&gt;debug1: expecting SSH2_MSG_KEXDH_REPLY&lt;BR /&gt;Received disconnect from 192.168.254.11: 2: Client Disconnect&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2013 20:12:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6051157#M7319</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-03T20:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6055771#M7322</link>
      <description>&lt;P&gt;I had to make lots of changes to the mpSSH server code to get it to work with the new OpenSSH 6.2p1. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this is the last time we have to make changes like this one. iLO2 memory is very limited and already full so, &amp;nbsp;we won't be able to spin new firmware releases, every time the OpenSSH folks decide to increase the size of the payload during Key Exchange.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2013 16:56:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6055771#M7322</guid>
      <dc:creator>Oscar A. Perez</dc:creator>
      <dc:date>2013-05-07T16:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6055795#M7323</link>
      <description>&lt;P&gt;Hi, Oscar-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's great, I'm glad you were able to fix the problem.&amp;nbsp; I'm not sure what can be done about futureproofing, but I appreciate your time and effort on this!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Kent&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2013 17:06:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6055795#M7323</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-07T17:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6055891#M7324</link>
      <description>&lt;P&gt;Hi, Oscar-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I posted a general question on the OpenSSH dev list about compatibility with memory constrained embedded SSH implementations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, after taking a look at some of the relevant standards I don't think this can be fairly called an OpenSSH problem.&amp;nbsp; Reading RFC 4253 sections 6.2 - 6.5 it seems the standard allows for additional compression algorithms, encryption algorithms, key exchange methods, etc. in the future.&amp;nbsp; Also, section 7 doesn't say anything further about maximum payload size during key exchange so I assume only the requirements from section 6.1 apply.&amp;nbsp; Looking at the conversation between my OpenSSH client and an iLO2 interface running firmware v2.15 it looks like the largest packet is only 1.4k, far short of the 35k max size that implementations must support.&amp;nbsp; So while I realize there is limited memory for iLO2, it really sounds like mpSSH's responsibility to handle large payloads and ignore unknown algorithms, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope that doesn't come across as too snarky.&amp;nbsp; Thanks again for your help with this issue!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Kent&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2013 18:39:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6055891#M7324</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-07T18:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6059183#M7325</link>
      <description>&lt;P&gt;Thanks for that info.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;mpSSH in iLO2 v2.15 would only handle 1280 bytes payload during key exchange. I increased that to 2Kb in version 2.20 (ETA later this month) and there isn't an easy way I could prevent mpSSH from disconnecting on packets larger than 2Kb without making significant changes to the code.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I forgot to debug why the workaround of using the option&amp;nbsp;“HostKeyAlgorithms=ssh-rsa” isn't working anymore. Not sure if the option got broken in OpenSSH 6.2p1 or there is something else going on within mpSSH. I will take a look because, looking forward this option might be the only way to connect to iLO2, if OpenSSH increases the payload beyond 2Kb&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2013 18:22:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6059183#M7325</guid>
      <dc:creator>Oscar A. Perez</dc:creator>
      <dc:date>2013-05-09T18:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6059271#M7326</link>
      <description>&lt;P&gt;Hi, Oscar-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ah-ha!&amp;nbsp; Your message just triggered an idea, and sure enough: it works!&amp;nbsp; :)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The -o HostKeyAlgorithms=ssh-rsa option doesn't work anymore with OpenSSH 6.2p1 because it's insufficient to keep the key exchange payload small enough for mpSSH to handle.&amp;nbsp; Some other value during key exchange has grown enough that the payload is still over the 1280 byte limit.&amp;nbsp; Looking at the output from a failed connection attempt the list of MAC algorithms sent by the client is the largest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sure enough, OpenSSH 6.2 is able to connect successfully when configured to only offer hmac-sha1:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ ssh -vvv -o MACs=hmac-sha1 ilo01&lt;/P&gt;&lt;P&gt;OpenSSH_6.2p1, OpenSSL 1.0.1e 11 Feb 2013&lt;BR /&gt;debug1: Reading configuration data /home/sl4mmy/.ssh/config&lt;BR /&gt;debug1: /home/sl4mmy/.ssh/config line 15: Applying options for ilo*&lt;BR /&gt;debug1: /home/sl4mmy/.ssh/config line 24: Applying options for *&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to ilo01 [192.168.254.11] port 22.&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: fd 3 clearing O_NONBLOCK&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug3: timeout: 999 ms remain after connect&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_6.2&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version mpSSH_0.1.1&lt;BR /&gt;debug1: no match: mpSSH_0.1.1&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug3: load_hostkeys: loading entries for host "ilo01" from file "/home/sl4mmy/.ssh/known_hosts"&lt;BR /&gt;debug3: load_hostkeys: found key type RSA in file /home/sl4mmy/.ssh/known_hosts:274&lt;BR /&gt;debug3: load_hostkeys: loaded 1 keys&lt;BR /&gt;debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@open&lt;BR /&gt;ssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: none&lt;BR /&gt;debug2: kex_parse_kexinit: none&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_setup: found hmac-sha1&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-sha1 none&lt;BR /&gt;debug2: mac_setup: found hmac-sha1&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-sha1 none&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 168/320&lt;BR /&gt;debug2: bits set: 557/1024&lt;BR /&gt;debug1: sending SSH2_MSG_KEXDH_INIT&lt;BR /&gt;debug1: expecting SSH2_MSG_KEXDH_REPLY&lt;BR /&gt;debug1: Server host key: RSA 84:ee:9f:9c:2e:46:8f:10:2d:30:07:5c:eb:94:a8:b4&lt;BR /&gt;debug3: load_hostkeys: loading entries for host "ilo01" from file "/home/sl4mmy/.ssh/known_hosts"&lt;BR /&gt;debug3: load_hostkeys: found key type RSA in file /home/sl4mmy/.ssh/known_hosts:274&lt;BR /&gt;debug3: load_hostkeys: loaded 1 keys&lt;BR /&gt;debug3: load_hostkeys: loading entries for host "192.168.254.11" from file "/home/sl4mmy/.ssh/known_hosts"&lt;BR /&gt;debug3: load_hostkeys: found key type RSA in file /home/sl4mmy/.ssh/known_hosts:278&lt;BR /&gt;debug3: load_hostkeys: loaded 1 keys&lt;BR /&gt;debug1: Host 'ilo01' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /home/sl4mmy/.ssh/known_hosts:274&lt;BR /&gt;debug2: bits set: 523/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: Roaming not allowed by server&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, long story short, I still believe the long term fix is to figure out how to make mpSSH handle larger payloads during key exchange more gracefully, but as a work-around it seems that whenever OpenSSH adds support for new algorithms users should explicitly use a subset of the algorithms that are known to work with mpSSH.&amp;nbsp; Perhaps you can recommend a canonical set of algorithms for each type that will always be guaranteed to work, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$ ssh -o HostKeyAlgorithms=ssh-rsa,ssh-dss -o KexAlgorithms=diffie-hellman-group1-sha1 -o Ciphers=aes128-cbc,3des-cbc -o MACs=hmac-md5,hmac-sha1 username@ilo-hostname&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2013 16:48:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6059271#M7326</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-08T16:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6059401#M7327</link>
      <description>&lt;P&gt;Awesome!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You're pretty much showing all what is supported by mpSSH:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;HostKeyAlgorithms: ssh-rsa, ssh-dss &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;KexAlgorithms: diffie-hellman-group1-sha1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ciphers: aes128-cbc, 3des-cbc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;MACs: hmac-md5, hmac-sha1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will add this info to the Customer Advisory. :)&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2013 17:50:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6059401#M7327</guid>
      <dc:creator>Oscar A. Perez</dc:creator>
      <dc:date>2013-05-08T17:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6067317#M7329</link>
      <description>Fixed in iLO2 version 2.20&lt;BR /&gt;&lt;BR /&gt;&lt;A target="_blank" href="http://h30499.www3.hp.com/t5/ITRC-Remote-Lights-Out-Mgmt-iLO/iLO-2-Firmware-version-2-20-released/td-p/6067313"&gt;http://h30499.www3.hp.com/t5/ITRC-Remote-Lights-Out-Mgmt-iLO/iLO-2-Firmware-version-2-20-released/td-p/6067313&lt;/A&gt;</description>
      <pubDate>Tue, 14 May 2013 15:32:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6067317#M7329</guid>
      <dc:creator>Oscar A. Perez</dc:creator>
      <dc:date>2013-05-14T15:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6068789#M7330</link>
      <description>&lt;P&gt;Hi, Oscar-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's great, thanks for releasing the fix so quickly!&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2013 16:10:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6068789#M7330</guid>
      <dc:creator>sl4mmy</dc:creator>
      <dc:date>2013-05-15T16:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6095357#M7333</link>
      <description>&lt;P&gt;What I have done is putting the following in the profile file, and it works with OpenSSH 6.2. You only have to use ilossh instead of ssh to login&lt;/P&gt;&lt;P&gt;I know that the problem is in the server, not the client, but that helps if you need to access older machines for which the ILO patch is not available.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;alias ilossh='ssh -o PasswordAuthentication=yes \&lt;BR /&gt;-o ChallengeResponseAuthentication=no \&lt;BR /&gt;-o GSSAPIAuthentication=no \&lt;BR /&gt;-o HostbasedAuthentication=no \&lt;BR /&gt;-o PubkeyAuthentication=no \&lt;BR /&gt;-o RSAAuthentication=no \&lt;BR /&gt;-o Compression=no \&lt;BR /&gt;-o ForwardAgent=no \&lt;BR /&gt;-o ForwardX11=no \&lt;BR /&gt;-o KexAlgorithms=diffie-hellman-group1-sha1 \&lt;BR /&gt;-o MACs=hmac-md5,hmac-sha1 \&lt;BR /&gt;-o Ciphers=aes128-cbc,3des-cbc \&lt;BR /&gt;-o HostKeyAlgorithms=ssh-rsa,ssh-dss '&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2013 12:03:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6095357#M7333</guid>
      <dc:creator>Renaud_</dc:creator>
      <dc:date>2013-06-07T12:03:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6388513#M7534</link>
      <description>&lt;P&gt;I am currently running a DL380 G5 with iLO2 Advanced License&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Current Firmware:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1.35 &amp;nbsp; 07/16/2007&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I able to upgrade the firmware to the 2.2 to overcome the SSH issue? If yes, do I need to step through the upgrades one by one?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am afraid of ruining my currently working install (minus the ssh issue) to try updating if it is not going to work, and I have no way to bring it back to the current version.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2014 20:43:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6388513#M7534</guid>
      <dc:creator>ben-Nabiy</dc:creator>
      <dc:date>2014-02-24T20:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6388549#M7535</link>
      <description>&lt;P&gt;No, you don't&amp;nbsp;&lt;SPAN&gt;need to step through every upgrade one by one but, since I've never tested upgrading from such old firmware version directly to a version 2.xx, I would advise you to write down all the important iLO2 configurations, including your advanced license key and then upgrade that iLO2 to version 1.82. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If everthing seems fine after upgrading to v1.82 then, upgrading to version 2.23 should go smooth.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2014 21:01:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6388549#M7535</guid>
      <dc:creator>Oscar A. Perez</dc:creator>
      <dc:date>2014-02-24T21:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to SSH to iLO2 with OpenSSH 6.2</title>
      <link>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6390837#M7536</link>
      <description>&lt;P&gt;Thank you for the prompt response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have downloaded the 2.2 firmware, but am unsure how to get the 1.82. The directory structure of&lt;/P&gt;&lt;P&gt;&lt;A href="ftp://ftp.hp.com/pub/softlib2/software1/sc-linux-fw-ilo/p1285463034/v85709/" target="_blank"&gt;ftp://ftp.hp.com/pub/softlib2/software1/sc-linux-fw-ilo/p1285463034/v85709/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;does not make it very evident.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you could link me to the proper firmware for what you would recommend, I would much appreciate it!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2014 21:49:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-remote-server/unable-to-ssh-to-ilo2-with-openssh-6-2/m-p/6390837#M7536</guid>
      <dc:creator>ben-Nabiy</dc:creator>
      <dc:date>2014-02-25T21:49:23Z</dc:date>
    </item>
  </channel>
</rss>

