<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: issues with ssh access from macos/ linux in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/542669#M111144</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;DIV class="slds-form-element__control slds-grid itemBody" data-aura-rendered-by="13842:0"&gt;
&lt;DIV class="slds-rich-text-editor__output uiOutputRichText forceOutputRichText forceKnowledgeOutputRichTextForKnowledge" dir="ltr" data-aura-rendered-by="13834:0" data-aura-class="uiOutputRichText forceOutputRichText forceKnowledgeOutputRichTextForKnowledge"&gt;
&lt;P data-aura-rendered-by="13835:0"&gt;For a successful ssh connection at least one mutually-supported choice for each parameter, OpenSSH considers SSH-RSA as a weak algorithm and it has been deprecated since OpenSSH 8.8, it is still supported but disabled by default. &lt;BR /&gt;Can you try to connect to the FW by adding the following to your command line: -oHostKeyAlgorithms=+ssh-rsa&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;DIV data-aura-rendered-by="13864:0"&gt;Eg;&lt;BR /&gt;ssh -oHostKeyAlgorithms=+ssh-rsa&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:username@x.x.x.x" rel="noopener" target="_blank"&gt;username@x.x.x.x&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 19 May 2023 01:45:56 GMT</pubDate>
    <dc:creator>akuzhuppilly</dc:creator>
    <dc:date>2023-05-19T01:45:56Z</dc:date>
    <item>
      <title>issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/541307#M110963</link>
      <description>&lt;P&gt;Hi folks I am having issues with access via ssh from macos/ linux pcs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;pc ~ % ssh admin@10.10.10.1&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Unable to negotiate with 10.10.10.1 port 22: no matching host key type found. Their offer: ssh-rsa &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;I can access it using this modified command:&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;ssh -oHostKeyAlgorithms=+ssh-rsa &lt;A href="mailto:admin@10.10.10.1" target="_blank"&gt;admin@10.10.10.1&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;I have added these options to ssh profile, restarted ssh server/ rebooted as well for testing, but still getting same results&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Unable to negotiate with 10.10.10.1 port 22: no matching host key type found. Their offer: ssh-rs&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-05-06 at 10.49.13 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/50022i2B7F51FB753C9254/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-05-06 at 10.49.13 AM.png" alt="Screenshot 2023-05-06 at 10.49.13 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;Does anyone know what needs to be configured on the palo alto to resolve ssh compatibility issues?&lt;/P&gt;
&lt;P class="p1"&gt;thank you&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 23:44:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/541307#M110963</guid>
      <dc:creator>nevolex</dc:creator>
      <dc:date>2023-05-05T23:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/541351#M110969</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/280122"&gt;@nevolex&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this a VM-Series FW hosted in the public cloud?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2023 01:13:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/541351#M110969</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2023-05-08T01:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/542587#M111132</link>
      <description>&lt;P&gt;Did you select the SSH Service Profile you just made on Device\Setup\Management\SSH Management Profile Settings? And then restart the ssh server. (it will tell you to do so after commit)&lt;/P&gt;
&lt;P&gt;I've just made the same setting for the same reason and missed this step.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 09:52:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/542587#M111132</guid>
      <dc:creator>TorokAdam</dc:creator>
      <dc:date>2023-05-18T09:52:32Z</dc:date>
    </item>
    <item>
      <title>Re: issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/542669#M111144</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;DIV class="slds-form-element__control slds-grid itemBody" data-aura-rendered-by="13842:0"&gt;
&lt;DIV class="slds-rich-text-editor__output uiOutputRichText forceOutputRichText forceKnowledgeOutputRichTextForKnowledge" dir="ltr" data-aura-rendered-by="13834:0" data-aura-class="uiOutputRichText forceOutputRichText forceKnowledgeOutputRichTextForKnowledge"&gt;
&lt;P data-aura-rendered-by="13835:0"&gt;For a successful ssh connection at least one mutually-supported choice for each parameter, OpenSSH considers SSH-RSA as a weak algorithm and it has been deprecated since OpenSSH 8.8, it is still supported but disabled by default. &lt;BR /&gt;Can you try to connect to the FW by adding the following to your command line: -oHostKeyAlgorithms=+ssh-rsa&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;DIV data-aura-rendered-by="13864:0"&gt;Eg;&lt;BR /&gt;ssh -oHostKeyAlgorithms=+ssh-rsa&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:username@x.x.x.x" rel="noopener" target="_blank"&gt;username@x.x.x.x&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 19 May 2023 01:45:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/542669#M111144</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2023-05-19T01:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/550071#M112184</link>
      <description>&lt;P&gt;This is a problem for us as well. Is there a way to have the PA appliance generate keys using SHA2+? I've tried setting the server profile to use ECDSA 256+ and the connection still fails,.. likely because the SSH server is still trying to present the RSA version... I would have expected this to use ECDSA only, and not try and present ssh-rsa keys to the client... eg.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;debug2: reserved 0&lt;BR /&gt;debug1: kex: algorithm: ecdh-sha2-nistp384&lt;BR /&gt;debug1: kex: host key algorithm: (no match)&lt;BR /&gt;Unable to negotiate with &amp;lt;redacted&amp;gt; port 22: no matching host key type found. Their offer: ssh-rsa&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ssh {&lt;BR /&gt;profiles {&lt;BR /&gt;mgmt-profiles {&lt;BR /&gt;server-profiles {&lt;BR /&gt;default_high_security {&lt;BR /&gt;ciphers [ aes256-cbc aes256-gcm aes256-ctr];&lt;BR /&gt;kex [ ecdh-sha2-nistp384 ecdh-sha2-nistp521];&lt;BR /&gt;mac [ hmac-sha2-256 hmac-sha2-512];&lt;BR /&gt;session-rekey {&lt;BR /&gt;data default;&lt;BR /&gt;interval default;&lt;BR /&gt;packets default;&lt;BR /&gt;}&lt;BR /&gt;default-hostkey {&lt;BR /&gt;key-type {&lt;BR /&gt;ECDSA 384;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;regenerate-hostkeys {&lt;BR /&gt;mgmt {&lt;BR /&gt;key-type {&lt;BR /&gt;ECDSA {&lt;BR /&gt;key-length 256;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;mgmt {&lt;BR /&gt;server-profile default_high_security;&lt;BR /&gt;}&lt;BR /&gt;}&lt;BR /&gt;[edit deviceconfig system ssh]&lt;/PRE&gt;</description>
      <pubDate>Wed, 19 Jul 2023 21:32:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/550071#M112184</guid>
      <dc:creator>pgfarvour</dc:creator>
      <dc:date>2023-07-19T21:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/559145#M113405</link>
      <description>&lt;P&gt;This worked. Thank you!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 11:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/559145#M113405</guid>
      <dc:creator>DGutierrez</dc:creator>
      <dc:date>2023-09-22T11:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/571655#M115086</link>
      <description>&lt;P&gt;This changed in PanOS 10.2 and higher, you can verify using "&lt;SPAN&gt;nmap --script ssh2-enum-algos -sV -p 22 192.168.1.1"&lt;/SPAN&gt; you will find that:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;PanOS 10.1 had&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;SPAN&gt;|&amp;nbsp;&amp;nbsp;&amp;nbsp;server_host_key_&lt;WBR /&gt;algorithms: (3)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;|&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;ssh-rsa&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;|&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;rsa-sha2-512&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;|&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;rsa-sha2-256&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="times new roman, serif"&gt;But PanOS 10.2 only has&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;|&amp;nbsp;&amp;nbsp;&amp;nbsp;server_host_key_&lt;WBR /&gt;algorithms: (1)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;|&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;ssh-rsa&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you need to tell your ssh client to use the larger key size algorithm&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;&lt;U&gt;&lt;STRONG&gt;The temporary fix is to use:&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="monospace"&gt;ssh -oHostKeyAlgorithms=+ssh-rsa&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="mailto:admin@192.168.1.1" target="_blank" rel="noopener"&gt;admin@192.168.1.1&lt;/A&gt;&lt;/FONT&gt;&lt;FONT face="times new roman, serif"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;&lt;U&gt;&lt;STRONG&gt;While the permanent&amp;nbsp;fix is to:&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;&lt;STRONG&gt;&lt;U&gt;EITHER&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;1) Create a Shell alias like this that modifies the command ssh and adds support for ssh-rsa host key algorithm evreytime you run ssh&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;alias ssh='ssh -oHostKeyAlgorithms=+ssh-rsa'&lt;FONT face="times new roman, serif"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;&lt;STRONG&gt;&lt;U&gt;OR&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="times new roman, serif"&gt;2) modify your SSH Config File (requires sudo) to&amp;nbsp;&lt;/FONT&gt;&lt;SPAN&gt;add support for ssh-rsa host key algorithm&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;FONT face="monospace"&gt;sudo nano ~/.ssh/config&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;FONT face="times new roman, serif"&gt;and then add the line&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;&lt;FONT face="monospace"&gt;HostKeyAlgorithms +ssh-rsa&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 23:02:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/571655#M115086</guid>
      <dc:creator>mghazzi</dc:creator>
      <dc:date>2024-01-03T23:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/571657#M115087</link>
      <description>&lt;P&gt;adjusting the HOSTKEY to ALL doesn't help, because ALL=ECDSA or RSA, but the only RSA Hostkey Algorithms in PanOS 10.2 and higher are RSA 2048, 3072, or 4096 (known as ssh-rsa) The only way to connect is to tell the SSH client to step up to rsa 2048 or more, or go with ECDSA.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 23:11:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/571657#M115087</guid>
      <dc:creator>mghazzi</dc:creator>
      <dc:date>2024-01-03T23:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: issues with ssh access from macos/ linux</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/620365#M122037</link>
      <description>&lt;P&gt;Make sure to restart ssh service, this will not work without it:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="mailto:admin@whatever&amp;gt;" target="_blank"&gt;admin@whatever&amp;gt;&lt;/A&gt;&amp;nbsp;&lt;SPAN class="ph userinput"&gt;set ssh service-restart mgmt&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="ph userinput"&gt;Here's the rest of my config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[edit deviceconfig system ssh]
admin@whatever# show
ssh {
  profiles {
    mgmt-profiles {
      server-profiles {
        management {
          ciphers aes256-gcm;
          kex ecdh-sha2-nistp256;
          mac hmac-sha2-256;
          default-hostkey {
            key-type {
              all;
            }
          }
        }
      }
    }
  }
  mgmt {
    server-profile management;
  }
}&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tested this in version 11.1.4-h&lt;/P&gt;</description>
      <pubDate>Sat, 16 Nov 2024 04:47:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-ssh-access-from-macos-linux/m-p/620365#M122037</guid>
      <dc:creator>YounosN1</dc:creator>
      <dc:date>2024-11-16T04:47:17Z</dc:date>
    </item>
  </channel>
</rss>

