T1500G-10PS - SSH connection: weak diffie-hellman-group1-sha1 key exchange algorithm
This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
T1500G-10PS - SSH connection: weak diffie-hellman-group1-sha1 key exchange algorithm
Model :
Hardware Version :
Firmware Version :
ISP :
Hi guys,
i bought a new T1500G-10PS Smart Switch (with actual firmware) for my poe ip cameras. I needed a switch which is configurable via ssh.
Therefore i made a simple
[CODE]ssh admin@[/CODE]
from my macbook which ended in the following error message:
[CODE]Unable to negotiate with port 22: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1[/CODE]
After googling around i found an article where this error is explained with the following sentence:
I'm wondering why TP-Link uses an old, weak key exchange algorithm in such a new product?
Can someone explain?
BTW: I managed to connect to the switch with changing the ssh_config File!
Thx
spooniester
Hardware Version :
Firmware Version :
ISP :
Hi guys,
i bought a new T1500G-10PS Smart Switch (with actual firmware) for my poe ip cameras. I needed a switch which is configurable via ssh.
Therefore i made a simple
[CODE]ssh admin@[/CODE]
from my macbook which ended in the following error message:
[CODE]Unable to negotiate with port 22: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1[/CODE]
After googling around i found an article where this error is explained with the following sentence:
I'm wondering why TP-Link uses an old, weak key exchange algorithm in such a new product?
Can someone explain?
BTW: I managed to connect to the switch with changing the ssh_config File!
Thx
spooniester