Domino on Linux/Unix, Troubleshooting, Best Practices, Tips and more ...

alt

Daniel Nashed

Update to a current OpenSSH client & server to be post quantum crypto safe

Daniel Nashed – 18 February 2026 00:37:55

Today I got an interesting warning. This was on Windows -- not on Linux.
The log message took me to this OpenSSH info page
-> https://www.openssh.org/pq.html
This isn't OpenSSL. This is about OpenSSH.


OpenSSH decided to add a security warning in the latest versions to warn for sessions connecting to older OpenSSH server versions with the following warning.


** WARNING: connection is not using a post-quantum key exchange algorithm.

** This session may be vulnerable to "store now, decrypt later" attacks.

** The server may need to be upgraded. See
https://openssh.com/pq.html

If you are running for example on Ubuntu 24.04 LTS you are on the safe side.

The version in use is currently version 9.6


ssh -V

OpenSSH_9.6p1 Ubuntu-3ubuntu13.14, OpenSSL 3.0.13 30 Jan 2024


The next LTS version 26.04 -- which is planned for April 2026 -- will bring at least


ssh -V

OpenSSH_10.2p1 Ubuntu-2ubuntu1, OpenSSL 3.5.3 16 Sep 2025 (I am running it already for testing)


The interesting part are those two two key exchange algorithm
  1. sntrup761x25519-sha512@openssh.com
     
  2. mlkem768x25519-sha256  (in OpenSSH 10.x and higher)

The first key exchange algorithm is already in OpenSSH 9.6.
It's an hybrid algorithm which is regarded as quantum computing safe.

But OpenSSH switched to a newer algorithm in 10.x.


Even if you are not getting this warning, if you don't have any client with OpenSSH version which prints this warning, it makes sense to look at your version and make sure you are running the latest version supported by your OS.

This also includes OpenSSH servers for Windows!


The link above has more details about why this is important today. It would be a major concern if you are a normal customer.
But it makes sense to update OpenSSH versions anyhow.

This would be a client and server requirement! And it also affects clients like MobaXterm which might use embedded libs.

There are ways to use external SSH versions. I would not be too concerned. But looking into the latest versions for your SSH client/server software and installing the latest OpenSSL version is always a good idea.


ssh -Q kex

diffie-hellman-group1-sha1

diffie-hellman-group14-sha1

diffie-hellman-group14-sha256

diffie-hellman-group16-sha512

diffie-hellman-group18-sha512

diffie-hellman-group-exchange-sha1

diffie-hellman-group-exchange-sha256

ecdh-sha2-nistp256

ecdh-sha2-nistp384

ecdh-sha2-nistp521

curve25519-sha256

curve25519-sha256@libssh.org

sntrup761x25519-sha512

sntrup761x25519-sha512@openssh.com

mlkem768x25519-sha256


Links

    Archives


    • [HCL Domino]
    • [Domino on Linux]
    • [Nash!Com]
    • [Daniel Nashed]