Disable SSH weak ciphers/algorithms on OpenShift 4.12 or older

Solution Verified - Updated -

Issue

  • Security requirements impose disabling weak ciphers in the SSH server on the OCP 4 cluster.
  • Security requirements impose disabling weak key exchange algorithms in the SSH server on the OpenShift 4 cluster.
  • OpenShift 4 cluster requires specific customization of the SSH server.

Environment

  • Red Hat OpenShift Container Platform (RHOCP)
    • 4.12 or older versions
  • SSH

Note: In RHOCP 4.13 the SSH Server changed the organization of the configuration files. For a 4.13 solution please refer to Disable SSH weak ciphers/algorithms on OpenShift 4.13 or newer

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content