https://forum.opnsense.org/index.php?topic=43585.msg216925o ports: openssh 9.9.p1[11][11] https://www.openssh.com/txt/release-9.9
root@opnsense ~# ssh -Q kex | grep mlkemmlkem768x25519-sha256
- Key exchange algorithms - mlkem768x25519-sha256 - sntrup761x25519-sha512 - sntrup761x25519-sha512@openssh.com - Ciphers - aes256-gcm@openssh.com - chacha2020-poly1305@openssh.com- MACs - hmac-sha2-256-etm - hmac-sha2-512-etm- Host Key Algotythms - ssh-ed25519 - ssh-ed25519-cert-v01@openssh.com- Rekey Limit - System Defaults - otherwise if in a highly regulated environment adjust as needed.
root@localhost ~# ssh -v -oKexAlgorithms=sntrup761x25519-sha512 192.168.1.1OpenSSH_9.9p1, OpenSSL 3.1.4 24 Oct 2023debug1: Reading configuration data /usr/etc/ssh/ssh_configdebug1: Reading configuration data /etc/ssh/ssh_config.d/50-suse.confdebug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.configdebug1: /usr/etc/ssh/ssh_config line 33: Applying options for *debug1: Connecting to 192.168.1.1 [192.168.1.1] port 22.debug1: Connection established.debug1: Local version string SSH-2.0-OpenSSH_9.9debug1: Remote protocol version 2.0, remote software version OpenSSH_9.9 FreeBSD-openssh-portable-9.9.p1,1debug1: compat_banner: match: OpenSSH_9.9 FreeBSD-openssh-portable-9.9.p1,1 pat OpenSSH* compat 0x04000000debug1: Authenticating to 192.168.1.1:22 as 'root'debug1: SSH2_MSG_KEXINIT sentdebug1: SSH2_MSG_KEXINIT receiveddebug1: kex: algorithm: (no match)Unable to negotiate with 192.168.1.1 port 22: no matching key exchange method found. Their offer: mlkem768x25519-sha256,ext-info-s,kex-strict-s-v00@openssh.com
root@localhost ~ [255]# ssh -v -oKexAlgorithms=mlkem768x25519-sha256 192.168.1.1OpenSSH_9.9p1, OpenSSL 3.1.4 24 Oct 2023debug1: Reading configuration data /usr/etc/ssh/ssh_configdebug1: Reading configuration data /etc/ssh/ssh_config.d/50-suse.confdebug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.configdebug1: /usr/etc/ssh/ssh_config line 31: include /usr/etc/ssh/ssh_config.d/*.conf matched no filesdebug1: /usr/etc/ssh/ssh_config line 33: Applying options for *debug1: configuration requests final Match passdebug1: re-parsing configurationdebug1: Reading configuration data /usr/etc/ssh/ssh_configdebug1: Reading configuration data /etc/ssh/ssh_config.d/50-suse.confdebug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.configdebug1: /usr/etc/ssh/ssh_config line 31: include /usr/etc/ssh/ssh_config.d/*.conf matched no filesdebug1: /usr/etc/ssh/ssh_config line 33: Applying options for *debug1: Connecting to 192.168.1.1 [192.168.1.1] port 22.debug1: Connection established.debug1: Local version string SSH-2.0-OpenSSH_9.9debug1: Remote protocol version 2.0, remote software version OpenSSH_9.9 FreeBSD-openssh-portable-9.9.p1,1debug1: compat_banner: match: OpenSSH_9.9 FreeBSD-openssh-portable-9.9.p1,1 pat OpenSSH* compat 0x04000000debug1: Authenticating to 192.168.1.1:22 as 'root'debug1: SSH2_MSG_KEXINIT sentdebug1: SSH2_MSG_KEXINIT receiveddebug1: kex: algorithm: mlkem768x25519-sha256debug1: kex: host key algorithm: ssh-ed25519debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: <implicit> compression: nonedebug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: <implicit> compression: nonedebug1: kex: mlkem768x25519-sha256 need=32 dh_need=32debug1: kex: mlkem768x25519-sha256 need=32 dh_need=32debug1: expecting SSH2_MSG_KEX_ECDH_REPLYdebug1: SSH2_MSG_KEX_ECDH_REPLY receiveddebug1: Server host key: ssh-ed25519 SHA256:qLYOvRRjxmMxvH7O76j7Ib/+Y6lK7oLThe authenticity of host '192.168.1.1 (192.168.1.1)' can't be established.ED25519 key fingerprint is SHA256:qLYOvRRjxmMxvH7O76j7Ib/+Y6lK7oL