I am not completely sure, but you may want to look at the protocol setting in sshd_config
.
From http://wiki.centos.org/HowTos/Network/SecuringSSH
# Protocol 2,1
Protocol 2
Change Protocol 1 to Protocol 2 and restart. This should already be set to Protocol 2
in Centos 6.5, but you may want to double check.
I found this run down of the different protocol options
http://www.snailbook.com/faq/ssh-1-vs-2.auto.html
Not sure if that is going to be enough to solve your particular issue though.
Do you know what they are using to check the configuration?
UPDATED:
This is from running man sshd_config
on
Ciphers
Specifies the ciphers allowed for protocol version 2 in order of preference. Multiple ciphers must be comma-separated. The supported ciphers are
“3des-cbc”, “aes128-cbc”, “aes192-cbc”, “aes256-cbc”, “aes128-ctr”, “aes192-ctr”, “aes256-ctr”, “arcfour128”, “arcfour256”, “arcfour”,
“blowfish-cbc”, and “cast128-cbc”. The default is:
aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,
aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,
aes256-cbc,arcfour
Also the Macs
option:
MACs Specifies the MAC (message authentication code) algorithms in order of preference. The MAC algorithm is used in protocol version 2 for data
integrity protection. Multiple algorithms must be comma-separated. The default is:
hmac-md5,hmac-sha1,umac-64@openssh.com,
hmac-ripemd160,hmac-sha1-96,hmac-md5-96,
hmac-sha2-256,hmac-sha2-512
So I would take a look through those and set the options in your /etc/ssh/sshd_config
file with the ciphers and macs that you want.