<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Qlik Talend Studio: Expanding your SFTP security algorithms in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Talend-Studio-Expanding-your-SFTP-security-algorithms/ta-p/2150919</link>
    <description>&lt;P&gt;After the R2022-07 release, the &lt;STRONG&gt;tFTPConnection &lt;/STRONG&gt;component behavior changed slightly. Jobs and components created before R2022-07 can still connect to SFTP servers; however, new connections and components can fail.&lt;/P&gt;
&lt;P&gt;This release updated the underlying library to support more secure algorithms. However, along with expanding the security algorithms, it disabled some of the older ones that were considered insecure.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Resolution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Upgrade the server to support more secure algorithms.&lt;/P&gt;
&lt;P&gt;Use &lt;STRONG&gt;Log4j&lt;/STRONG&gt; debug logs to analyze the communications between the client and the server. Your Log4j debug log may contain the following lines:&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;kex: server: ssh-dss,ssh-rsa
kex: client: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256&lt;/PRE&gt;
&lt;BLOCKQUOTE class="quote"&gt;You must enable the server's algorithm if you don't have it.&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The newer version of the library displays the following exception message:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;com.jcraft.jsch.JSchAlgoNegoFailException: Algorithm negotiation fail: algorithmName="server_host_key" jschProposal="ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256" serverProposal="ssh-dss,ssh-rsa"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;To override the existing library with the new version, follow the &lt;A href="https://help.talend.com/en-US/studio-user-guide/8.0-R2024-07/upgrading-database-jdbc-driver-by-customizing-mvn-uri" target="_blank" rel="noopener"&gt;Overriding a database driver by customizing the Maven URI&lt;/A&gt; instructions available in the Talend Help Center. Upgrading the library adds either ssh-dss or ssh-rsa to the server_host_key parameter, making the error message more readable and interpretable.&lt;/P&gt;
&lt;P&gt;During the upgrade, the following code is configured to meet maximum backward compatibility:&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;kex    ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,curve25519-sha256,curve25519-sha256@libssh.org,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
server_host_key    ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256
cipher.s2c    aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes256-gcm@openssh.com
cipher.c2s    aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes256-gcm@openssh.com
mac.s2c    hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-512
mac.c2s    hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-512&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;To enable the missing insecure algorithms in the &lt;STRONG&gt;tFTPConnection &lt;/STRONG&gt;component, configure the &lt;STRONG&gt;Advanced Settings&lt;/STRONG&gt; tab by adding the code under the &lt;STRONG&gt;Config client&lt;/STRONG&gt; check box. Verify that the code looks similar to the screenshot:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="0EM5b000008grXy.png"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/124376i94C99F5F262D044E/image-size/large?v=v2&amp;amp;px=999" role="button" title="0EM5b000008grXy.png" alt="0EM5b000008grXy.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If you are using a public key, you may also need to add the following additional parameter:&lt;BR /&gt;&lt;BR /&gt;Client Parameter: "PubkeyAcceptedKeyTypes"&lt;BR /&gt;Value: "ssh-rsa"&lt;BR /&gt;or&lt;BR /&gt;Value: "ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521"&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Talend Studio" id="qlik_TalendStudio"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Aug 2024 07:50:29 GMT</pubDate>
    <dc:creator>TalendSolutionExpert</dc:creator>
    <dc:date>2024-08-29T07:50:29Z</dc:date>
    <item>
      <title>Qlik Talend Studio: Expanding your SFTP security algorithms</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Talend-Studio-Expanding-your-SFTP-security-algorithms/ta-p/2150919</link>
      <description>&lt;P&gt;After the R2022-07 release, the &lt;STRONG&gt;tFTPConnection &lt;/STRONG&gt;component behavior changed slightly. Jobs and components created before R2022-07 can still connect to SFTP servers; however, new connections and components can fail.&lt;/P&gt;
&lt;P&gt;This release updated the underlying library to support more secure algorithms. However, along with expanding the security algorithms, it disabled some of the older ones that were considered insecure.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;Resolution&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Upgrade the server to support more secure algorithms.&lt;/P&gt;
&lt;P&gt;Use &lt;STRONG&gt;Log4j&lt;/STRONG&gt; debug logs to analyze the communications between the client and the server. Your Log4j debug log may contain the following lines:&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;kex: server: ssh-dss,ssh-rsa
kex: client: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256&lt;/PRE&gt;
&lt;BLOCKQUOTE class="quote"&gt;You must enable the server's algorithm if you don't have it.&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The newer version of the library displays the following exception message:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;com.jcraft.jsch.JSchAlgoNegoFailException: Algorithm negotiation fail: algorithmName="server_host_key" jschProposal="ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256" serverProposal="ssh-dss,ssh-rsa"&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;To override the existing library with the new version, follow the &lt;A href="https://help.talend.com/en-US/studio-user-guide/8.0-R2024-07/upgrading-database-jdbc-driver-by-customizing-mvn-uri" target="_blank" rel="noopener"&gt;Overriding a database driver by customizing the Maven URI&lt;/A&gt; instructions available in the Talend Help Center. Upgrading the library adds either ssh-dss or ssh-rsa to the server_host_key parameter, making the error message more readable and interpretable.&lt;/P&gt;
&lt;P&gt;During the upgrade, the following code is configured to meet maximum backward compatibility:&lt;/P&gt;
&lt;PRE class="ckeditor_codeblock"&gt;kex    ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,curve25519-sha256,curve25519-sha256@libssh.org,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256
server_host_key    ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256
cipher.s2c    aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes256-gcm@openssh.com
cipher.c2s    aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc,aes128-gcm@openssh.com,aes256-gcm@openssh.com
mac.s2c    hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-512
mac.c2s    hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-512&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;To enable the missing insecure algorithms in the &lt;STRONG&gt;tFTPConnection &lt;/STRONG&gt;component, configure the &lt;STRONG&gt;Advanced Settings&lt;/STRONG&gt; tab by adding the code under the &lt;STRONG&gt;Config client&lt;/STRONG&gt; check box. Verify that the code looks similar to the screenshot:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="0EM5b000008grXy.png"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/124376i94C99F5F262D044E/image-size/large?v=v2&amp;amp;px=999" role="button" title="0EM5b000008grXy.png" alt="0EM5b000008grXy.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If you are using a public key, you may also need to add the following additional parameter:&lt;BR /&gt;&lt;BR /&gt;Client Parameter: "PubkeyAcceptedKeyTypes"&lt;BR /&gt;Value: "ssh-rsa"&lt;BR /&gt;or&lt;BR /&gt;Value: "ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521"&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Talend Studio" id="qlik_TalendStudio"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 07:50:29 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Qlik-Talend-Studio-Expanding-your-SFTP-security-algorithms/ta-p/2150919</guid>
      <dc:creator>TalendSolutionExpert</dc:creator>
      <dc:date>2024-08-29T07:50:29Z</dc:date>
    </item>
  </channel>
</rss>

