[0;36m# general[0m
[0;32m(gen) software: TinySSH noversion[0m
[0;32m(gen) compatibility: OpenSSH 8.0-8.4, Dropbear SSH 2018.76+[0m
[0;32m(gen) compression: disabled[0m

[0;36m# key exchange algorithms[0m
[0;32m(kex) curve25519-sha256                       -- [info] available since OpenSSH 7.4, Dropbear SSH 2018.76[0m
[0;32m                                              `- [info] default key exchange since OpenSSH 6.4[0m
[0;32m(kex) curve25519-sha256@libssh.org            -- [info] available since OpenSSH 6.4, Dropbear SSH 2013.62[0m
[0;32m                                              `- [info] default key exchange since OpenSSH 6.4[0m
[0;33m(kex) sntrup4591761x25519-sha512@tinyssh.org  -- [warn] using experimental algorithm[0m
                                              `- [info] available since OpenSSH 8.0
                                              `- [info] the sntrup4591761 algorithm was withdrawn, as it may not provide strong post-quantum security

[0;36m# host-key algorithms[0m
[0;32m(key) ssh-ed25519                             -- [info] available since OpenSSH 6.5[0m

[0;36m# encryption algorithms (ciphers)[0m
[0;33m(enc) chacha20-poly1305@openssh.com           -- [warn] vulnerable to the Terrapin attack (CVE-2023-48795), allowing message prefix truncation[0m
                                              `- [info] available since OpenSSH 6.5
                                              `- [info] default cipher since OpenSSH 6.9

[0;36m# message authentication code algorithms[0m
[0;33m(mac) hmac-sha2-256                           -- [warn] using encrypt-and-MAC mode[0m
                                              `- [info] available since OpenSSH 5.9, Dropbear SSH 2013.56

[0;36m# fingerprints[0m
[0;32m(fin) ssh-ed25519: SHA256:89ocln1x7KNqnMgWffGoYtD70ksJ4FrH7BMJHa7SrwU[0m

