OK, slight update. It seems that I can enable SSH on the NAS (ironically, it is then hard to connect because of the whole key exchange malarkey).
Once in, I can see the following:
ssh -V
gives OpenSSH_3.7.1p2, SSH protocols 1.5/2.0, OpenSSL 0.9.8ze 15 Jan 2015
adding the line
KexAlgorithms diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1
to /etc/sshd_config
and restarting sshd with /etc/init.d/sshd.sh
locks me out - future attempts to connect are refused.
Thankfully I can run remote commands without ssh enabled via ACP commander, so I could get myself back in with a little bit of sed surgery. I realise that I should probably be regenerating keys, but ssh-keygen -A
returns
-b bits Number of bits in the key to create.
-c Change comment in private and public key files.
-e Convert OpenSSH to IETF SECSH key file.
-f filename Filename of the key file.
-g Use generic DNS resource record format.
-i Convert IETF SECSH to OpenSSH key file.
-l Show fingerprint of key file.
-p Change passphrase of private key file.
-q Quiet.
-y Read private key file and print public key.
-t type Specify type of key to create.
-B Show bubblebabble digest of key file.
-C comment Provide new comment.
-N phrase Provide new passphrase.
-P phrase Provide old passphrase.
-G file Generate candidates for DH-GEX moduli
-T file Screen candidates for DH-GEX moduli
This feels like some sort of blend of archaeology and a tenacity test! Quite honestly I am not sure if this version of SSH supports newer key exchange versions - and although apt is installed, I can’t even run apt-get update
successfully.
Not sure what to try next really - I can’t find anything sensible in /var/log/*
and man
is not even installed, so I can’t easily see whether OpenSSH 3.7 supports something sensible…