Skip to content

Advanced SSH/SFTP Settings

This section is intended for experts only, as it allows you to configure advanced aspects of your Syncplify Server!'s SSH2 (SFTP/SCP) protocol handler. These settings require a thorough understanding of the SSH2 protocol standard as defined in its various RFCs. Do not modify these settings unless you are intimately familiar with the relevant RFCs and the security implications of your changes.

IMPORTANT

Changes to any of the settings in this page will only take effect after restarting your virtual site.

SSH Advanced

Configurable Details

Allowed Auth Methods

Specify which authentication methods are permitted for SSH2 connections. The possible options are:

  • PKI: Public Key Infrastructure (certificate/key-based authentication)
  • Password: Traditional password-based authentication
  • Keyboard-Interactive: A flexible method that can be used for multi-factor authentication or custom workflows (requires scripting and event-handling to function properly)

NOTE

Enabling or disabling certain authentication methods can significantly impact both security and compatibility with client software.

Allowed MAC Algorithms

Select which Message Authentication Code (MAC) algorithms are allowed for SSH2 connections. MAC algorithms ensure the integrity and authenticity of data exchanged between client and server. Choosing strong, modern MAC algorithms is important for preventing tampering and replay attacks.

Allowed Encryption Algorithms

Choose which encryption (cipher) algorithms are permitted for securing SSH2 sessions. These algorithms protect the confidentiality of data in transit. Disabling weak or outdated ciphers is recommended to maintain a strong security posture.

Key-Exchange Algorithms

Configure which key-exchange algorithms are allowed during the SSH2 handshake. These algorithms are responsible for securely negotiating session keys between client and server. Selecting secure, up-to-date key-exchange methods helps prevent man-in-the-middle and downgrade attacks.

Key Algorithms

Specify which public key algorithms are accepted for authenticating clients and servers. This setting determines which types of cryptographic keys can be used for authentication. Limiting accepted key types to modern, secure algorithms is best practice.

PKI Key Authorization Algorithms

Define which algorithms are accepted for authorizing public keys in PKI-based authentication. This setting controls how the server validates client certificates or public keys. Using secure, standards-compliant algorithms is essential for robust authentication.

Diffie-Hellman Group Exchange Bitness

Set the minimum and maximum bit length for Diffie-Hellman group exchange during key negotiation. Larger bit lengths provide stronger security but may impact performance. Adjust these values according to your organization's security requirements and compatibility needs.