Security scans on VIDM Appliance may report the below:
"The SSH server supports cryptographically weak Hash-Based Message Authentication Codes (HMACs)"
The scan report will also list the insecure algorithms that it may have found e.g.
Insecure algorithms in use:
SSH MAC algorithms are used to validate data integrity and authenticity.
The MAC algorithm uses a message and private key to generate the fixed-length MAC.
MAC algorithms may be considered weak for the following reasons: