On Tue, Nov 8, 2016 at 3:30 PM, Harry Putnam <reader@xxxxxxxxxxx> wrote: [...] > After having 7.3p1 & 6.8p1 fail with same wording... I tried 6.7p1 and > find it fails with what looks like the same problem but has slightly > different wording. I set up the same versions (server:OpenSSH_6.6p1, OpenSSL 1.0.1s 1 Mar 2016, client: OpenSSH_7.3p1, OpenSSL 1.0.1s 1 Mar 2016) on Linux to try to reproduce it but failed. ./ssh -p 2022 -vvv -o ciphers=chacha20-poly1305@xxxxxxxxxxx -o kexalgorithms=diffie-hellman-group-exchange-sha256 localhost [...] debug1: kex: algorithm: diffie-hellman-group-exchange-sha256 debug1: kex: host key algorithm: ssh-ed25519 debug1: kex: server->client cipher: chacha20-poly1305@xxxxxxxxxxx MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305@xxxxxxxxxxx MAC: <implicit> compression: none Can you tell me more about the server? You said it's Solaris, but is it SPARC or x86? What OpenSSL version is it? -- Darren Tucker (dtucker at zip.com.au) GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA (new) Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement. _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev