ProLiant Servers (ML,DL,SL)
1823472 Members
2357 Online
109660 Solutions
New Discussion

HELP - How to access ILO4 using MAC ssh ?

 
iparanoid
Occasional Visitor

HELP - How to access ILO4 using MAC ssh ?

iLO Firmware Version
2.81 Jul 27 2022

Product Name
ProLiant ML350 Gen9

Client 
MAC Ventura 13.0.1

I've tried several methods, but can't log in

 ssh  root@192.168.X.X
Unable to negotiate with 192.168.X.X port 22: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

 

 ssh -vvv -oHostKeyAlgorithms=ssh-dss root@192.168.X.X
OpenSSH_9.0p1, LibreSSL 3.3.6
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 21: include /etc/ssh/ssh_config.d/* matched no files
debug1: /etc/ssh/ssh_config line 54: Applying options for *
debug2: resolve_canonicalize: hostname 192.168.X.X is address
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' -> '/Users/iparanoid/.ssh/known_hosts'
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' -> '/Users/iparanoid/.ssh/known_hosts2'
debug1: Authenticator provider $SSH_SK_PROVIDER did not resolve; disabling
debug3: ssh_connect_direct: entering
debug1: Connecting to 192.168.X.X [192.168.X.X] port 22.
debug3: set_sock_tos: set socket 3 IP_TOS 0x48
debug1: Connection established.
debug1: identity file /Users/iparanoid/.ssh/id_rsa type 0
debug1: identity file /Users/iparanoid/.ssh/id_rsa-cert type -1
debug1: identity file /Users/iparanoid/.ssh/id_ecdsa type -1
debug1: identity file /Users/iparanoid/.ssh/id_ecdsa-cert type -1
debug1: identity file /Users/iparanoid/.ssh/id_ecdsa_sk type -1
debug1: identity file /Users/iparanoid/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /Users/iparanoid/.ssh/id_ed25519 type -1
debug1: identity file /Users/iparanoid/.ssh/id_ed25519-cert type -1
debug1: identity file /Users/iparanoid/.ssh/id_ed25519_sk type -1
debug1: identity file /Users/iparanoid/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /Users/iparanoid/.ssh/id_xmss type -1
debug1: identity file /Users/iparanoid/.ssh/id_xmss-cert type -1
debug1: identity file /Users/iparanoid/.ssh/id_dsa type -1
debug1: identity file /Users/iparanoid/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.0
debug1: Remote protocol version 2.0, remote software version mpSSH_0.2.1
debug1: compat_banner: no match: mpSSH_0.2.1
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to 192.168.X.X:22 as 'root'
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c
debug2: host key algorithms: ssh-dss
debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib@openssh.com,zlib
debug2: compression stoc: none,zlib@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
debug2: host key algorithms: ssh-rsa,ssh-dss
debug2: ciphers ctos: aes256-ctr,aes256-cbc,aes128-cbc,3des-cbc
debug2: ciphers stoc: aes256-ctr,aes256-cbc,aes128-cbc,3des-cbc
debug2: MACs ctos: hmac-sha1,hmac-sha2-256,hmac-md5
debug2: MACs stoc: hmac-sha1,hmac-sha2-256,hmac-md5
debug2: compression ctos: none
debug2: compression stoc: none
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug1: kex: algorithm: (no match)
Unable to negotiate with 192.168.X.X port 22: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

 

How should I log in?

Thanks

 

2 REPLIES 2
Bunsol
HPE Pro

Re: HELP - How to access ILO4 using MAC ssh ?

First make sure that the ILO IP is pingable and also check for firewall. If the ILO is pingable but only facing issues when trying to access via putty then this possibly is a Putty issue only. Please do refer to below link:-

https://support.hpe.com/hpesc/public/docDisplay?docId=a00046197en_us&docLocale=en_US


If you feel this was helpful please click the KUDOS! Thumbs below!

I work at HPE
HPE Support Center offers support for your HPE services and products when and how you need it. Get started with HPE Support Center today.
[Any personal opinions expressed are mine, and not official statements on behalf of Hewlett Packard Enterprise]
Accept or Kudo
MBDave
Occasional Visitor

Re: HELP - How to access ILO4 using MAC ssh ?

Hy!

I know it's quite old post from you, and you probably already find your sollution.
But here is the additional option that you need to connect to your ilo:
ssh -o KexAlgorithms=diffie-hellman-group1-sha1 root@192.168.X.X

Also sometimes, the hostkey algortihm is different:
-o HostKeyAlgorithms=ssh-rsa,ssh-dss

So someone who visit this forum

Best regards
David