1. show ciphers
1.1. on the server
sshd -T | grep ciphers
ciphers 3des-cbc,aes128-cbc,aes128-ctr,aes128-gcm@openssh.com,aes192-cbc,
aes192-ctr,aes256-cbc,aes256-ctr,aes256-gcm@openssh.com,
arcfour,arcfour128,arcfour256,blowfish-cbc,cast128-cbc,
chacha20-poly1305@openssh.com,rijndael-cbc@lysator.liu.se
1.2. on the client
ssh -Q cipher
3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
rijndael-cbc@lysator.liu.se
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com
2. speedtest
yes | pv | ssh d03srv002 "cat >/dev/null"
22.7MiB 0:00:36 [1,70MiB/s]
3. xforwarding
to fix following warning
on the SSH Linux client:
touch ~/.Xauthority
xauth add :0 . $(mcookie)
on the SSH mac client:
vi ~/.ssh/config
XAuthLocation /opt/X11/bin/xauth
![]() |
to fix following warning |
on the SSH server:
echo "X11UseLocalhost no" >> /etc/ssh/sshd_config
systemctl restart sshd.service