Skip to main content

Optional Support for Legacy Insecure Ciphers for SFTP

Files.com supports modern, secure SFTP encryption algorithms by default, requiring all inbound SFTP connections to use only secure ciphers. Enabling insecure SFTP ciphers allows clients to negotiate legacy algorithms with known weaknesses.

This setting applies to all inbound SFTP connections; you cannot limit this setting to specific users or ciphers.

This feature exists only for legacy compatibility. Do not enable it for general use. Enable it only when a required client cannot negotiate modern ciphers.

Avoiding Use of This Setting

We strongly recommend not using this setting. Use of known insecure and weak ciphers is dangerous because users can mistakenly assume the connection is strongly encrypted.

Use of these settings will make your site ineligible for our HIPAA BAA program.

The best way to avoid the need for these settings is to ask all your clients, vendors, or counterparties to upgrade to the latest version of any app they are using.

Another course of action is to have users try to switch between FTPS (FTP with TLS encryption) instead of SFTP. In many systems, support for TLS-based security is stronger than SFTP-based security.

When You Would Use This Setting

Enable legacy cipher support when a third-party SFTP client fails to connect because it only supports deprecated SSH encryption algorithms. This is common with older embedded systems, legacy enterprise software, and outdated integration tools.

Before enabling this setting, update the client software whenever possible. Upgrading the client is the preferred and safer solution.

Security Implications

Enabling legacy cipher support allows SFTP sessions to negotiate encryption algorithms that are considered cryptographically weak or deprecated. Although encryption remains in place, the strength of that encryption may not meet modern security standards.

When this setting is enabled:

If your organization operates in a regulated environment, you must evaluate the compliance implications before enabling this setting.

Determining Which Ciphers Are Being Used

Before enabling legacy cipher support, determine which encryption algorithms your clients are currently negotiating. Files.com provides reporting that shows which ciphers are being used by SFTP connections to your site.

This report allows you to identify clients that are already using modern secure algorithms and isolate those that rely on legacy ciphers. In many cases, only a small number of outdated systems require legacy support.

Reviewing this report before enabling legacy cipher support helps you make an informed decision and limit unnecessary risk.

How Cipher Negotiation Works

SFTP uses the SSH protocol. Files.com follows RFC4253, section 7.1External LinkThis link leads to an external website and will open in a new tab when negotiating SFTP algorithms. During the initial handshake, the client and server negotiate encryption algorithms before user authentication occurs. At that stage, the server does not know which user is connecting.

Because encryption is negotiated before authentication:

Even when legacy support is enabled, Files.com prioritizes modern secure algorithms if the client supports them. Weaker algorithms are used only when the client does not offer stronger alternatives.

Algorithms Enabled by This Setting

When legacy cipher support is enabled, the following algorithms become available for negotiation.

The list includes both modern secure algorithms and legacy algorithms that are considered weak or deprecated.

TypeAlgorithms
Key Exchange

ecdh-sha2-nistp521

ecdh-sha2-nistp384

ecdh-sha2-nistp256

diffie-hellman-group-exchange-sha256

diffie-hellman-group-exchange-sha1

diffie-hellman-group18-sha512

diffie-hellman-group17-sha512

diffie-hellman-group16-sha512

diffie-hellman-group15-sha512

diffie-hellman-group14-sha256

diffie-hellman-group14-sha1

diffie-hellman-group1-sha1

curve25519-sha256

curve25519-sha256@libssh.org

curve448-sha512

Server Host Key Algorithms

ssh-rsa

rsa-sha2-256

rsa-sha2-512

Encryption

aes128-ctr (a.k.a. AES-128 SDCTR [AES-NI accelerated])

aes192-ctr (a.k.a. AES-192 SDCTR [AES-NI accelerated])

aes256-ctr (a.k.a. AES-256 SDCTR [AES-NI accelerated])

arcfour256

arcfour128

aes128-cbc

3des-cbc

blowfish-cbc

aes192-cbc

aes256-cbc

chacha20-poly1305@openssh.com

aes128-gcm@openssh.com

aes256-gcm@openssh.com

MAC

hmac-md5

hmac-sha1

hmac-sha2-256

hmac-sha2-512

hmac-sha1-96

hmac-md5-96

hmac-sha2-512-etm@openssh.com

hmac-sha2-256-etm@openssh.com

hmac-sha1-etm@openssh.com

Some of the algorithms in this list are widely considered insecure by modern cryptographic standards. Enabling this setting allows clients to request those algorithms during negotiation.

No Per-User or Per-Cipher Controls

Cipher policies cannot be restricted to individual users or specific folders. Because encryption negotiation occurs before authentication, the same policy applies to all SFTP connections to the site.

If you require strict cryptographic controls with no support for legacy algorithms, leave this setting disabled.

Allow Weak Diffie-Hellman Parameters for SFTP

Files.com provides a separate setting named Allow Weak Diffie-Hellman Parameters for SFTP. This setting expands compatibility by permitting weaker Diffie-Hellman key exchange parameters that some legacy clients require.

This option also reduces cryptographic strength and applies sitewide. It exists for compatibility with outdated systems and should only be enabled when necessary.

If you require broad client compatibility for migration purposes but want stronger encryption controls, consider using FTPS (FTP over TLS) instead, where cipher policies can be more tightly managed.

Enable legacy cipher support only when a business-critical integration cannot be upgraded. Document the reason for enabling it, and disable it as soon as the legacy client is replaced.

The preferred long-term configuration is to leave legacy cipher support disabled and require modern secure SFTP algorithms for all connections.

Get The File Orchestration Platform Today

4,000+ organizations trust Files.com for mission-critical file operations. Start your free trial now and build your first flow in 60 seconds.

No credit card required • 7-day free trial • Setup in minutes