π ~1 min read
Table of contents
Symptom & Impact
SSH clients fail to connect, blocking remote administration and automation tasks.
Environment & Reproduction
Happens when legacy RSA/SHA1 policies conflict with modern OpenSSH defaults on Debian 12.
Root Cause Analysis
Server and client share no acceptable host key or signature algorithm set.
Quick Triage
Collect verbose negotiation logs from client and inspect sshd effective config.
Step-by-Step Diagnosis
Run client: ssh -vvv user@host; run server: sudo sshd -T | egrep ‘hostkey|pubkeyacceptedalgorithms|kexalgorithms’.

Solution – Primary Fix
Generate modern keys and reload sshd: sudo ssh-keygen -A; edit /etc/ssh/sshd_config for ed25519/rsa-sha2; sudo systemctl reload ssh.
Still having issues? Our IT Solutions & Services team can diagnose and resolve this for you. Get in touch for a free consultation.

Solution – Alternative Approaches
Use per-host client overrides for legacy equipment while planning permanent key/cipher modernization.
Verification & Acceptance Criteria
SSH login succeeds without deprecated algorithm warnings in verbose output.
Rollback Plan
Restore backed-up sshd_config and restart ssh service if access compatibility drops unexpectedly.
Prevention & Hardening
Standardize OpenSSH policy templates and continuously scan for weak algorithm usage.
Related Errors & Cross-Refs
Related to no matching key exchange method and host key type not accepted errors.
Related tutorial: View the step-by-step tutorial for Debian 11.
View all Debian 11 tutorials on the Tutorials Hub β
Browse all common problems & solutions on the Tutorials Hub.
References & Further Reading
OpenSSH release notes and Debian OpenSSH server hardening recommendations.
Need Expert Help?
If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today β we respond within one business day.