bugzilla-daemon at mindrot.org
2025-May-19 09:00 UTC
[Bug 3824] New: ssh -Q should also accept a remote hostname to query
https://bugzilla.mindrot.org/show_bug.cgi?id=3824
Bug ID: 3824
Summary: ssh -Q should also accept a remote hostname to query
Product: Portable OpenSSH
Version: 10.0p2
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: martin-eric.racine at iki.fi
In its current form, 'ssh -Q feature' reports what the SSH client
supports. It would be desirable for the command to accept an optional
hostname to be able to query the features of a remote host e.g. 'ssh -Q
kex mailhost.internal' as well.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2025-May-20 08:11 UTC
[Bug 3824] ssh -Q should also accept a remote hostname to query
https://bugzilla.mindrot.org/show_bug.cgi?id=3824
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
--- Comment #1 from Damien Miller <djm at mindrot.org> ---
That wouldn't be the same thing unfortunately. It would be possible
(given a fairly significant amount of effort) to query some of the
option that the remote side has *enabled* but that's more like what
"ssh -G [host]" does rather than what "ssh -Q [option]"
does.
"ssh -Q" shows what the client supports, not what the client has
enabled.
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2025-May-23 07:44 UTC
[Bug 3824] ssh -Q should also accept a remote hostname to query
https://bugzilla.mindrot.org/show_bug.cgi?id=3824 --- Comment #2 from Martin-?ric RACINE <martin-eric.racine at iki.fi> --- Kinda like "ssh -G" indeed but for the remote host, rather than for how the local host is configured to interact with the remote host. I'm asking, because I need to check why authentication suddenly fails for a host and the information provided by -vvv is too abstract. I suspect that the key exchange or host key algorithms might have changed on the remote, and I was hoping for a command option that prints only that i.e. something like "ssh -Q" but able to query the remote, rather than what the local "ssh" binary supports. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2025-Jun-02 03:32 UTC
[Bug 3824] ssh -Q should also accept a remote hostname to query
https://bugzilla.mindrot.org/show_bug.cgi?id=3824
Darren Tucker <dtucker at dtucker.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at dtucker.net
--- Comment #3 from Darren Tucker <dtucker at dtucker.net> ---
(In reply to Martin-?ric RACINE from comment #2)
[...]> I'm asking, because I need to check why authentication suddenly
> fails for a host and the information provided by -vvv is too
> abstract. I suspect that the key exchange or host key algorithms
> might have changed on the remote,
Failure to negotiate key exchange or hostkey algorithms should be
fairly clear:
$ /usr/bin/ssh -o hostkeyalgorithms=ssh-dss localhost
Unable to negotiate with 127.0.0.1 port 22: no matching host key type
found. Their offer:
rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
$ /usr/bin/ssh -o kexalgorithms=diffie-hellman-group1-sha1 localhost
Unable to negotiate with 127.0.0.1 port 22: no matching key exchange
method found. Their offer:
mlkem768x25519-sha256,sntrup761x25519-sha512,sntrup761x25519-sha512 at
openssh.com,curve25519-sha256,curve25519-sha256 at
libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,ext-info-s,kex-strict-s-v00
at openssh.com
> and I was hoping for a command
> option that prints only that i.e. something like "ssh -Q" but
able
> to query the remote, rather than what the local "ssh" binary
> supports.
Mismatches in PubkeyAcceptedAlgorithms on the server side will be less
obvious to the client. As a general rule sshd won't disclose the
reasons for authentication failures to unauthenticated connections, so
generally this kind of thing will only be available in the server-side
debugging.
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2025-Jun-02 03:34 UTC
[Bug 3824] ssh -Q should also accept a remote hostname to query
https://bugzilla.mindrot.org/show_bug.cgi?id=3824
Darren Tucker <dtucker at dtucker.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |INVALID
Status|NEW |RESOLVED
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
Seemingly Similar Threads
- [Bug 3823] New: SSH on same device ignores MAC restrictions
- [Bug 3779] New: SHA1 deprecation
- [Bug 3522] New: Crash with "free(): double free detected" with old clients
- Subsystem sftp invoked even though forced command created
- enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS