This article describes a known issue with SSH connections between CentOS9 and CentOS 6.6 environments. The issue is caused by the end-of-life (EOS) status of CentOS 6.6, which no longer receives security updates, and the default security configuration of CentOS9.
- SSH connections between CentOS9 and CentOS 6.6 environments fail with the error message: "ssh_dispatch_run_fatal: Connection to [IP address] port 22: error in libcrypto Connection closed"
- SCP (Secure Copy) transfers between the two environments also fail
IGA Virtual Appliance 14.5, 14.5.1 and 14.5.1 CHF01
External Legacy CentOS 6.6 used as File Server between Virtual Appliance and network using scp command
- CentOS 6 is end-of-life (EOS) since 2020 and no longer receives security updates, making it incompatible with the default security configuration of CentOS9.
- The update-crypto-policies configuration on CentOS9 is set to DEFAULT, which enforces stricter security protocols that are not compatible with CentOS 6.6.
- The customer implemented a solution in their CentOS 6.6 environment to resolve the issue. This solution is not documented here as it is specific to the customer's environment and not related to our product.
- IGA Virtual Appliance 14.5, running on CentOS9, cannot be configured to relax its security settings to allow SSH connections with CentOS 6.6, as this would compromise the security of our product.
*Recommendation: Customers running CentOS 6.6 as external File Server should consider upgrading to a more recent and secure version of CentOS, such as CentOS 7 or CentOS 8.