-
Notifications
You must be signed in to change notification settings - Fork 10k
Description
Hello folks,
I'm in the middle of doing an infrastructure deployment via Terrraform on a private cloud (OpenStack) and part of this deployment I'm creating resources (virtual routers). I have configuration steps for this virtual router that uses a ssh connection but there is an issue with the connection provisioner and here is the error:
ssh: handshake failed: ssh: no common algorithm for client to server cipher; client offered: [aes128-ctr aes192-ctr aes256-ctr [email protected] arcfour256 arcfour128], server offered: [aes128-cbc 3des-cbc blowfish-cbc cast128-cbc arcfour aes192-cbc aes256-cbc [email protected]]
The virtual router has *-cbc cipher enabled and I cannot disabled it nor update it with *-ctr ciphers because it's virtual embedded appliance with a strip down proprietary OS. Was/is anyone was/is able to add option flag to use less secure cipher for ssh session from Terraform source code to include this option. I understand that Go crypto/ssh does not by default support *-cbc cipher but there are some legacy network gears that are using these old versions. All of these are in a private behind firewall secure datacenter and I'm less concerned about this security matter until the virtual router os is updated with better ciphers.
Thank you in advance,
Abdi