You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
However I noticed the cipher 3des-cbc I used to specify hard-coded for IOS XR is no longer supported by current Go SSH libs. I don't know how to work around this issue to allow old ciphers.
Yes, one could hack jazigo to make it to consider ciphers defined in ~/.ssh/config, however it would not help with the more critical issue that current Go libraries reject many old ciphers.
One thing you might want to try is to use the pseudo model called "runprog".
It allows you to call an external program to collect the configuration for you.
You could point it to a shell script that invokes ssh, for instance.
How can I tell jazigo to use a specific SSH cypher? A lot of our routers have older code that does not support newer protocols.
In my ssh config file, I have enabled these but jazigo is ignoring these settings.
Is there a way to ask jazigo to pay attention to ssh config in user folder ( ~/.ssh/config ) or global settings ( /etc/ssh/ssh_config ) ??
Alternatively, allow the actual ssh command to be specified in the jazigo host config?
Thank you for your help.
The text was updated successfully, but these errors were encountered: