I get this warning when I push to Wikimedia Gitlab with OpenSSH 10.2p1:
$ ssh gitlab ** WARNING: connection is not using a post-quantum key exchange algorithm. ** This session may be vulnerable to "store now, decrypt later" attacks. ** The server may need to be upgraded. See https://openssh.com/pq.html PTY allocation request failed on channel 0 Welcome to GitLab, @lucaswerkmeister! Connection to gitlab.wikimedia.org closed.
The algorithms supported by my client are:
debug2: KEX algorithms: mlkem768x25519-sha256,sntrup761x25519-sha512,sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-grou p18-sha512,diffie-hellman-group14-sha256,ext-info-c,kex-strict-c-v00@openssh.com
And the algorithms supported by the server are apparently:
$ nmap --script ssh2-enum-algos -sV -p 22 gitlab.wikimedia.org Starting Nmap 7.98 ( https://nmap.org ) at 2025-10-16 21:41 +0200 Nmap scan report for gitlab.wikimedia.org (208.80.154.145) Host is up (0.12s latency). Other addresses for gitlab.wikimedia.org (not scanned): 2620:0:861:2:208:80:154:145 PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 9.2p1 Debian 2+deb12u7 (protocol 2.0) | ssh2-enum-algos: | kex_algorithms: (3) | curve25519-sha256@libssh.org | diffie-hellman-group-exchange-sha256 | kex-strict-s-v00@openssh.com | server_host_key_algorithms: (4) | ecdsa-sha2-nistp256 | ssh-ed25519 | rsa-sha2-512 | rsa-sha2-256 | encryption_algorithms: (6) | chacha20-poly1305@openssh.com | aes256-gcm@openssh.com | aes128-gcm@openssh.com | aes256-ctr | aes192-ctr | aes128-ctr | mac_algorithms: (6) | hmac-sha2-512-etm@openssh.com | hmac-sha2-256-etm@openssh.com | umac-128-etm@openssh.com | hmac-sha2-512 | hmac-sha2-256 | umac-128@openssh.com | compression_algorithms: (2) | none |_ zlib@openssh.com Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 1.23 seconds
According to https://www.openssh.com/pq.html, “OpenSSH has offered post-quantum key agreement (KexAlgorithms) by default since release 9.0 (April 2022)”, and nmap reports remote version 9.2; are we disabling post-quantum kex algorithms explicitly? (Or maybe it’s Debian?)