Quoting Boris Tassou (2023-07-24 14:11:21)
> Hi Simon,
>
> Thanks for the informations, i just updated the first post with details.
>
> But now, i don't reproduce the problem anymore....
> Same configuration, same packages the only difference is some ciphers :
> before :
> 2022-05-23 12:32:10,510 mod_sftp/1.0.1[733785]: + Session key exchange: <email address hidden>
> 2022-05-23 12:32:10,510 mod_sftp/1.0.1[733785]: + Session server hostkey: ssh-rsa
>
> now :
> 2023-07-24 13:56:23,746 mod_sftp/1.0.1[3272]: + Session key exchange: curve25519-sha256
> 2023-07-24 13:56:23,746 mod_sftp/1.0.1[3272]: + Session server hostkey: rsa-sha2-512
How are you actually testing the sftpd server? Using a ssh client? It
might be that said ssh client changed its key exchange settings. For
instance, from Jammy on, openssh-client disabled SHA1 support for RSA
unless explicitly configured.
Quoting Boris Tassou (2023-07-24 14:11:21) 1.0.1[733785] : + Session key exchange: <email address hidden> 1.0.1[733785] : + Session server hostkey: ssh-rsa 1.0.1[3272] : + Session key exchange: curve25519-sha256 1.0.1[3272] : + Session server hostkey: rsa-sha2-512
> Hi Simon,
>
> Thanks for the informations, i just updated the first post with details.
>
> But now, i don't reproduce the problem anymore....
> Same configuration, same packages the only difference is some ciphers :
> before :
> 2022-05-23 12:32:10,510 mod_sftp/
> 2022-05-23 12:32:10,510 mod_sftp/
>
> now :
> 2023-07-24 13:56:23,746 mod_sftp/
> 2023-07-24 13:56:23,746 mod_sftp/
How are you actually testing the sftpd server? Using a ssh client? It
might be that said ssh client changed its key exchange settings. For
instance, from Jammy on, openssh-client disabled SHA1 support for RSA
unless explicitly configured.