Hi Dave,

thanks for your reply. It turns out that the with the upgrade from 14.2-RELEASE
to 14.3-RELEASE something went wrong. 'file' told my that on the 14.3-RELEASE
system was 'for FreeBSD 14.2', while my local VM is 'for FreeBSD 14.3'.

After fiddling around with the BEs I had left after the update, I was able to
get a working 14.2-RELEASE booted. Deleted the leftover BEs and did 
a fresh the upgrade to 14.3-RELEASE. After that the problem disappeared.

--Gordon

On Thu, Jul 17, 2025 at 02:17:26PM +0000, Dave Cottlehuber wrote:
> On Thu, 17 Jul 2025, at 11:21, Gordon Bergling wrote:
> > Hi,
> >
> > I have two FreeBSD externaly hosted, one at Hetzner and one on Azure.
> >
> > Both systems running latest 14.3-RELEASE, but I can't no long connect to 
> > them,
> > wether from a local 14.2-RELEASE, or the latest macOS. Nothing has changed 
> > in
> > terms of configuration. All systems use public-key authentication. The error
> > I am getting is the following:
> >
> > sshd[10965]: error: Fssh_kex_input_kexinit: unknown kex type 10 [preauth]
> >
> > Has anyone an idea whould could cause this?
> >
> > Seeking out in forums about trying different KexAlgorithms options didn't
> > solved the problem.
> >
> > Any help is much appreciated!
> >
> > --Gordon
> >
> > Attachments:
> > * signature.asc
> 
> Odd. I have no issue from a 14.2 client -> 14.3 server connecting,
> with defaults, and ed25519 private key.
> 
> My best guess is that your sshd binary (or config) isn't correctly
> upgraded for some reason. What does file(1) report on server & client?
> 
> On 14.2-RELEASE:
> 
> root@picard:/ # file /usr/sbin/sshd
> /usr/sbin/sshd: ELF 64-bit LSB pie executable, x86-64, version 1 (FreeBSD), 
> dynamically linked, interpreter /libexec/ld-elf.so.1, for FreeBSD 14.2, 
> FreeBSD-style, stripped
> 
> root@picard:/ # file /usr/bin/ssh
> /usr/bin/ssh: ELF 64-bit LSB pie executable, x86-64, version 1 (FreeBSD), 
> dynamically linked, interpreter /libexec/ld-elf.so.1, for FreeBSD 14.2, 
> FreeBSD-style, stripped
> root@picard:/ #
> 
> If this is not correct, it's worth checking with `freebsd-update IDS` on 
> server & client, for what else is incorrect.
> 
> Are there any non-default settings in /etc/ssh/ssh_config for client,
> and /etc/ssh/sshd_config for server?
> 
> Assuming that's sorted, please post output of `ssh -vv ...`, so we can see 
> the negotiation, forcing key exchange algorithm on the client:
> 
> ssh -vv -o 
> KexAlgorithms=curve25519-sha256,curve25519-sha...@libssh.org,diffie-hellman-group-exchange-sha256
>  you@there
> 
> BTW I assume the kex list comes from crypto/openssh/kex.h, so #10 would be 
> KEX_KEM_SNTRUP761X25519_SHA512
> 
> enum kex_exchange {
>       KEX_DH_GRP1_SHA1 = 1,
>       KEX_DH_GRP14_SHA1,
>       KEX_DH_GRP14_SHA256,
>       KEX_DH_GRP16_SHA512,
>       KEX_DH_GRP18_SHA512,
>       KEX_DH_GEX_SHA1,
>       KEX_DH_GEX_SHA256,
>       KEX_ECDH_SHA2,
>       KEX_C25519_SHA256,
>       KEX_KEM_SNTRUP761X25519_SHA512,   <----
>       KEX_KEM_MLKEM768X25519_SHA256,
>       KEX_MAX
> };
> 
> A+
> Dave

Attachment: signature.asc
Description: PGP signature

Reply via email to