ECDH_SHA2_NISTP256 (KEX) Algorithm in SSH – Vulnerabilities?
My organization within my company uses this KEX Algorithm in our SSH Implementation.
Another organization within my company won’t connect to our servers as long as this algorithm is implemented as they claim it is “weak and vulnerable”. … Continue reading ECDH_SHA2_NISTP256 (KEX) Algorithm in SSH – Vulnerabilities?