Created on
05-07-2025
09:16 AM
Edited on
05-12-2025
01:20 AM
By
Anthony_E
Description | This article describes an SFTP scheduled remote backup failure after FortiMail upgrade to v7.2.5, v7.4.2, and higher. |
Scope | FortiMail v7.2.5, v7.4.2, and higher. |
Solution |
As of FortiMail v7.2.5GA and 7.4.2GA, 'ssh-rsa' is removed from the 'strong-crypto' list for sshd. If FortiMail and the SFTP server were using 'ssh-rsa' to establish an SSH tunnel, after upgrading FortiMail to v7.2.5GA and 7.4.2GA, the SFTP scheduled remote backup will fail.
config global set strong-crypto disable end
As a secure and long-term solution, configure the SFTP server to use the following algorithms and enable the 'strong-crypto' on FortiMail:
fml # print gzfile /etc/ssh/ssh_config
Also, when 'strong-crypto' is enabled, some Key Exchange Algorithms (KexAlgorithms) are disabled, which could also cause SFTP connection failure. To check exchanged keys between the SSH/SFTP client and server, capture a PCAP file:
===== SSH1 ====== # prepare a packet sniffer: diagnose sniffer packet any "x.x.x.x" 6 0 a # <----- x.x.x.x is the address of the sftp server.
===== SSH2 ====== # trigger a remote backup: execute backup full-config scp data/backup/fortimail/FML_SN/test_fml.conf x.x.x.x username password" |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.