19Mar
ECDH_SHA2_NISTP256 (KEX) Algorithm in SSH – Vulnerabilities?
My organization within my company uses this KEX Algorithm in our SSH Implementation.
Another organization within my company won’t connect to our servers as long as this algorithm is implemented as they claim it is “weak and vulnerable”. …