If you move a lot of data using rsync/scp/ssh you probably found out by now that arcfour or blowfish ciphers are a lot faster than others. A comparison is found in this thread. (TL;DR arcfou256 is the fastest cipher).
Today I updated openssh on my slackware servers only to be greeted by this error from scripts doing rsync to my backup server:
no matching cipher found: client arcfour server aes128-ctr,aes192-ctr,aes256-ctr,email@example.com,firstname.lastname@example.org,email@example.com
rsync: connection unexpectedly closed (0 bytes received so far) [Receiver]
rsync error: unexplained error (code 255) at io.c(226) [Receiver=3.1.0]
The openssh release notes are clear about this:
* sshd(8): The default set of ciphers and MACs has been altered to remove unsafe algorithms. In particular, CBC ciphers and arcfour* are disabled by default.
I added arcfour256 besides the default ciphers in /etc/ssh/sshd_config in order to fix this:
Warning as I understand it arcfour is not as secure as aes ciphers. On modern machines that support hw based aes instructions in theory you shouldn’t see differences. But I do. For example at home the machine that pushes the most data is an I7 and arcfour is still twice as fast (maybe the windows version of ssh doesn’t use hw aes acceleration). Since access to the servers where I push this data is limited to the local LAN and VPN I considered acceptable to use a lower quality cipher. It might not be the same for you.