To correct this issue, modify or restore the Ciphers line in /etc/ssh/sshd_config, or revert the file to its default parameters, as found in your running release of ESXi server.
To modify the Ciphers line in /etc/ssh/sshd_config:
- Log into the ESXi server's shell using the DCUI. For additional instructions, see https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-94F0C54F-05E3-4E16-8027-0280B9ED1009.html
- Navigate to /etc/ssh
- Make a backup copy of the sshd_config file: cp sshd_config sshd_config.bak
- Open the sshd_config file with vi editor.
- Correct the Ciphers line in sshd_config:
Ciphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc
- Note: This line's default contents varies between major ESXi releases. For ESXi 7.0 GA:
Ciphers aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr
- When finished, restart the SSH service: /etc/init.d/ssh restart
Alternatively, if you have another ESXi server of the same update level that is not producing errors upon connecting, you can compare its /etc/ssh/sshd_config configuration file contents with the impacted server's, and make adjustments, accordingly, or even copy the working configuration file to a shared datastore for eventual overwriting on the affected ESXi server(s).