1. show ciphers

1.1. on the server

sshd -T | grep ciphers
ciphers 3des-cbc,aes128-cbc,aes128-ctr,aes128-gcm@openssh.com,aes192-cbc,
aes192-ctr,aes256-cbc,aes256-ctr,aes256-gcm@openssh.com,
arcfour,arcfour128,arcfour256,blowfish-cbc,cast128-cbc,
chacha20-poly1305@openssh.com,rijndael-cbc@lysator.liu.se

1.2. on the client

ssh -Q cipher
 3des-cbc
aes128-cbc
aes192-cbc
aes256-cbc
rijndael-cbc@lysator.liu.se
aes128-ctr
aes192-ctr
aes256-ctr
aes128-gcm@openssh.com
aes256-gcm@openssh.com
chacha20-poly1305@openssh.com

2. speedtest

yes | pv | ssh d03srv002 "cat >/dev/null"
22.7MiB 0:00:36 [1,70MiB/s]

3. xforwarding

to fix following warning

Warning: No xauth data; using fake authentication data for X11 forwarding.

on the SSH Linux client:

touch ~/.Xauthority
xauth add :0 . $(mcookie)

on the SSH mac client:

vi ~/.ssh/config
XAuthLocation   /opt/X11/bin/xauth
Note to fix following warning

X11 forwarding request failed on channel 0

on the SSH server:

echo "X11UseLocalhost no" >> /etc/ssh/sshd_config
systemctl restart sshd.service

4. sshdo