Should hashing algorithm used for X.509 certificate’s signing match the algorithm used in the communication

I’ve seen this but the related answers don’t answer my question.
For TLS 1.2 is the hashing algorithm specified in an X.509 certificate’s cipher suite used for the signature inside the certificate or the TLS handshake/communication process… Continue reading Should hashing algorithm used for X.509 certificate’s signing match the algorithm used in the communication

Why can SSH negotiatie two different encryption and authentication algorithms?

I recently found out, that according to the RFC, SSH can negotiate two different cipher (and MAC) algorithms for server-to-client-encryption and for client-to-server-encryption (check section 7.1. for reference).
In section 6.3 this is als… Continue reading Why can SSH negotiatie two different encryption and authentication algorithms?