SSH algorithms

SSH actions can connect to SSH servers configured with the following algorithms.

Table. SSH algorithms
Ciphers Compression algorithms MAC algorithms Key exchange algorithms Server host key formats
chacha20-poly1305@openssh.com (not available when cluster is FIPS enabled) none hmac-sha2-256-etm@openssh.com curve25519-sha256 (not available when cluster is FIPS enabled) ssh-ed25519 (not available when cluster is FIPS enabled)
aes128-gcm@openssh.com zlib@openssh.com hmac-sha2-512-etm@openssh.com curve25519-sha256@libssh.org (not available when cluster is FIPS enabled) ecdsa-sha2-nistp256
aes256-gcm@openssh.com zlib hmac-sha1-etm@openssh.com (not available when cluster is FIPS enabled) ecdh-sha2-nistp256 ecdsa-sha2-nistp384
aes128-ctr (not available when cluster is FIPS enabled) hmac-sha2-256 ecdh-sha2-nistp384 ecdsa-sha2-nistp521
aes192-ctr (not available when cluster is FIPS enabled) hmac-sha2-512 ecdh-sha2-nistp521 rsa-sha2-512
aes256-ctr (not available when cluster is FIPS enabled) hmac-sha1 (not available when cluster is FIPS enabled) diffie-hellman-group-exchange-sha256 (not available when cluster is FIPS enabled) rsa-sha2-256
diffie-hellman-group14-sha256 ssh-rsa (not available when cluster is FIPS enabled)
diffie-hellman-group15-sha512
diffie-hellman-group16-sha512
diffie-hellman-group17-sha512
diffie-hellman-group18-sha512