User Tools

Site Tools


doc:appunti:linux:sa:debian_upgrade_11_12

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
doc:appunti:linux:sa:debian_upgrade_11_12 [2025/06/24 11:51] – [Configuration with TLS] niccolodoc:appunti:linux:sa:debian_upgrade_11_12 [2025/07/07 15:42] (current) – [Accesso SSH a vecchie installazioni] niccolo
Line 145: Line 145:
  
 <code> <code>
-The --cipher option should not be used any longer with OpenVPN 2.6 in TLS mode.+The --cipher option should not be used any longer with OpenVPN 2.6 in TLS mode.
 #cipher AES-256-CBC #cipher AES-256-CBC
-# Use --data-ciphers including AES-256-CBC to the default value e.g. for clients using OpenVPN 2.3. +# Use --data-ciphers adding the AES-256-CBC to the default valuee.g. for OpenVPN 2.3 clients
-data-ciphers AES-256-GCM:AES-128-GCM:AES-256-CBC+data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305:AES-256-CBC
 # Use --data-ciphers-fallback for peers that are old or have negotiation disabled, # Use --data-ciphers-fallback for peers that are old or have negotiation disabled,
 # e.g. peers running OpenVPN 2.3 or older, or some embedded devices. # e.g. peers running OpenVPN 2.3 or older, or some embedded devices.
Line 395: Line 395:
 ssh \ ssh \
     -o KexAlgorithms=+diffie-hellman-group1-sha1 \     -o KexAlgorithms=+diffie-hellman-group1-sha1 \
-    -o HostKeyAlgorithms=+ssh-dss \+    -o HostKeyAlgorithms=+ssh-dss,ssh-rsa \
     -o PubkeyAcceptedKeyTypes=+ssh-rsa \     -o PubkeyAcceptedKeyTypes=+ssh-rsa \
     root@83.149.110.120     root@83.149.110.120
doc/appunti/linux/sa/debian_upgrade_11_12.1750758714.txt.gz · Last modified: by niccolo