SSH Service Fails to start with "extra options" enabled

Description

Recently upgraded from 11.1-U7 to latest 11.2-U3.

SSH service wouldn't initiated on startup. Restarting service errors out with:
root: /usr/local/etc/rc.d/openssh: WARNING: failed precmd routine for openssh

Removed "Extra Options" under SSH service settings:
Ciphers 3des-cbc,aes128-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour,arcfour128,arcfour256,blowfish-cbc,cast128-cbc,chacha20-poly1305@openssh.com
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521

This resolved the issue.

This is a reoccurrance of a bug previous logged during 11.0 pre-release. 25068 was the ID on the previous bug system. Bug tracker link is inactive, but here is the link to the official post:

link title

I believe it would be beneficial to retain this functionality, and even though deprecated ciphers and algorithms may be unsafe for traversal over public internet, it can provide a performance benefit when utilized on internal network infrastructure. With correct hardware and cipher its possible to saturate most networks interfaces. Additionally, replicating/migrating data away from older linux systems (that are no longer maintained) using remote replication is far more convenient than driving over and plugging in a drive.

Thank you.

 

 

Problem/Justification

None

Impact

None

SmartDraw Connector

Katalon Manual Tests (BETA)

Activity

Show:

Jorgen Kruger May 7, 2019 at 3:11 PM

Hi Waqar,

thank you for the feedback. Using the info you provided, I tested each algorithm and it seems all arcfour* and algorithms ending in *cbc have been removed. Updated and service starts successfully with the following Ciphers and Algorithms:

Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521

Appreciate the feedback.

Waqar Ahmed May 6, 2019 at 12:46 PM

Hello , so for some of the ciphers listed, the support has been removed by openssh ( https://github.com/openssh/openssh-portable ). I am afraid this isn't our issue to resolve ( if you want, you can file an issue with them ). Thank you for your time and patience!

Jorgen Kruger May 2, 2019 at 8:51 AM

Hi Jeff,

Uploaded as requested. thumbs up

Jeff Ervin May 1, 2019 at 7:12 PM

Hey Jorgen,

Would you just toss a Debug into the document vault (System->Advanced->Save Debug) please?  Don't know if it's needed, but would rather have it than not.

 

Behaves as Intended
Pinned fields
Click on the next to a field label to start pinning.

Details

Assignee

Reporter

Fix versions

Affects versions

Priority

More fields

Katalon Platform

Created May 1, 2019 at 3:53 PM
Updated May 7, 2019 at 3:11 PM
Resolved July 1, 2022 at 1:30 PM