Your browser does not allow storing cookies. We recommend enabling them.
To enable Elliptic Curve Diffie–Hellman (ECDH) key exchange algorithms for Tectia Client, add the ECDH KEX names within the
<kexs> element in your
<kex name="diffie-hellman-group14-sha1" />
<kex name="email@example.com" />
<kex name="diffie-hellman-group-exchange-sha1" />
<kex name="diffie-hellman-group-exchange-sha256" />
<kex name="ecdh-sha2-nistp256" />
<kex name="ecdh-sha2-nistp384" />
<kex name="ecdh-sha2-nistp521" />
Reduce Secure Shell risk. Get to know the NIST 7966.
The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
ISACA Practitioner Guide for SSH
With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.