Came across an interesting article on configuring SSH to only use the strongest cryptographic functions available. Worth reading.

https://stribika.github.io/2015/01/04/secure-secure-shell.html