Supported SSH algorithms

Buru SFTP Server supports the SSH algorithms listed below. Algorithm selection can be configured via the ssh section in config.yaml.

Key exchange algorithms

__MODERN (secure)
mlkem768x25519-sha256256 bits2.18.0 Hybrid post-quantum key exchange combining ML-KEM-768 with X25519 and SHA-256
mlkem768nistp256-sha256256 bits2.18.0 Hybrid post-quantum key exchange combining ML-KEM-768 with NIST P-256 and SHA-256
mlkem1024nistp384-sha384384 bits2.18.0 Hybrid post-quantum key exchange combining ML-KEM-1024 with NIST P-384 and SHA-384
curve25519-sha256256 bitsElliptic Curve Diffie-Hellman on Curve25519 with SHA-256 hash
curve25519-sha256@libssh.org256 bitsElliptic Curve Diffie-Hellman on Curve25519 with SHA-256 hash
ecdh-sha2-nistp521521 bitsElliptic Curve Diffie Hellman with NIST P-521 curve and SHA-512 hash
ecdh-sha2-nistp384384 bitsElliptic Curve Diffie Hellman with NIST P-384 curve and SHA-384 hash
ecdh-sha2-nistp256256 bitsElliptic Curve Diffie Hellman with NIST P-256 curve and SHA-256 hash
ecdh-sha2-1.3.132.0.10256 bits2.11.0 Elliptic Curve Diffie Hellman with secp256k1 curve and SHA-256 hash. Supported on Windows 10+ and Windows Server 2016+.
diffie-hellman-group18-sha5128192 bits2.18.0 Diffie Hellman with MODP Group 18 and SHA-512 hash
diffie-hellman-group17-sha5126144 bits2.18.0 Diffie Hellman with MODP Group 17 and SHA-512 hash
diffie-hellman-group16-sha5124096 bitsDiffie Hellman with MODP Group 16 and SHA-512 hash
diffie-hellman-group15-sha5123072 bitsDiffie Hellman with MODP Group 15 and SHA-512 hash
diffie-hellman-group-exchange-sha256NegotiatedDiffie Hellman with group exchange and SHA-256 hash
__INTERMEDIATE (best compatibility)all of the above, plus:
diffie-hellman-group14-sha2562048 bitsDiffie Hellman with MODP Group 14 and SHA-256 hash
diffie-hellman-group14-sha12048 bitsDiffie Hellman with Oakley/MODP Group 14 and SHA-1 hash
diffie-hellman-group-exchange-sha1NegotiatedDiffie Hellman with group exchange and SHA-1 hash
__ALL (insecure, not recommended)all of the above, plus:
diffie-hellman-group1-sha11024 bitsDiffie Hellman with Oakley Group 2 and SHA-1 hash

Host key algorithms

__MODERN (secure)
ssh-ed25519Ed25519, an Edwards-curve Digital Signature Algorithm (EdDSA)
ecdsa-sha2-nistp521Elliptic Curve Digital Signature Algorithm (ECDSA) on NIST P-521 curve with SHA-512 hash
ecdsa-sha2-nistp384Elliptic Curve Digital Signature Algorithm (ECDSA) on NIST P-384 curve with SHA-384 hash
ecdsa-sha2-nistp256Elliptic Curve Digital Signature Algorithm (ECDSA) on NIST P-256 curve with SHA-256 hash
ecdsa-sha2-1.3.132.0.102.11.0 Elliptic Curve Digital Signature Algorithm (ECDSA) on secp256k1 curve with SHA-256 hash. Supported on Windows 10+ and Windows Server 2016+.
rsa-sha2-512RSA with SHA-512 hash
ssh-rsa-sha256@ssh.comRSA with SHA-256 hash
rsa-sha2-256RSA with SHA-256 hash
x509v3-ecdsa-sha2-nistp5212.10.0 X.509 certificate with ECDSA on NIST P-521 curve and SHA-2 hash
x509v3-ecdsa-sha2-nistp3842.10.0 X.509 certificate with ECDSA on NIST P-384 curve and SHA-2 hash
x509v3-ecdsa-sha2-nistp2562.10.0 X.509 certificate with ECDSA on NIST P-256 curve and SHA-2 hash
x509v3-rsa2048-sha2562.10.0 X.509 certificate with 2048+ bit RSA and SHA-256 hash
x509v3-sign-rsa-sha256@ssh.com2.10.0 X.509 certificate with RSA and SHA-256 hash
__INTERMEDIATE (best compatibility)all of the above, plus:
ssh-dssNIST Digital Signature Algorithm (DSA) with SHA-1 hash
ssh-rsaRSA with SHA-1 hash
x509v3-sign-rsa2.10.0 X.509 certificate with RSA and SHA-1 hash
x509v3-sign-dss2.10.0 X.509 certificate with DSA and SHA-1 hash
__ALL (insecure, not recommended)all of the above

Encryption algorithms

__MODERN (secure)
aes256-gcm@openssh.comAES in GCM mode with 256-bit key
aes128-gcm@openssh.comAES in GCM mode with 128-bit key
aes256-ctrAES in CTR mode with 256-bit key
aes192-ctrAES in CTR mode with 192-bit key
aes128-ctrAES in CTR mode with 128-bit key
chacha20-poly1305@openssh.comChaCha20/Poly1305 AEAD cipher with 256-bit key
twofish256-ctrTwofish in CTR mode with 256-bit key
twofish192-ctrTwofish in CTR mode with 192-bit key
twofish128-ctrTwofish in CTR mode with 128-bit key
__INTERMEDIATE (best compatibility)all of the above, plus:
aes256-cbcAES in CBC mode with 256-bit key
aes192-cbcAES in CBC mode with 192-bit key
aes128-cbcAES in CBC mode with 128-bit key
twofish256-cbcTwofish in CBC mode with 256-bit key
twofish192-cbcTwofish in CBC mode with 192-bit key
twofish128-cbcTwofish in CBC mode with 128-bit key
twofish-cbcTwofish in CBC mode with 256-bit key
3des-ctrTripleDES in CTR mode
3des-cbcTripleDES in CBC mode
__ALL (insecure, not recommended)all of the above, plus:
arcfour256ArcFour (RC4) stream cipher (with discard step) with 256-bit key
arcfour128ArcFour (RC4) stream cipher (with discard step) with 128-bit key
arcfourArcFour (RC4) stream cipher with 128-bit key
blowfish-ctrBlowfish in CTR mode with 256-bit key
blowfish-cbcBlowfish in CBC mode with 128-bit key

MAC algorithms

__MODERN (secure)
hmac-sha2-512-etm@openssh.comSHA-512 (ETM mode)
hmac-sha2-256-etm@openssh.comSHA-256 (ETM mode)
hmac-sha2-512SHA-512
hmac-sha2-256SHA-256
__INTERMEDIATE (best compatibility)all of the above, plus:
hmac-sha1SHA-1
hmac-sha1-96SHA-1 (trimmed to 96 bits)
__ALL (insecure, not recommended)all of the above
hmac-md5MD5
hmac-md5-96MD5 (trimmed to 96 bits)

On this page