wez / wezterm

A GPU-accelerated cross-platform terminal emulator and multiplexer written by @wez and implemented in Rust
https://wezfurlong.org/wezterm/
Other
18.01k stars 807 forks source link

wezterm ssh fails with "Too many authentication failures" #6216

Open munzirtaha opened 1 month ago

munzirtaha commented 1 month ago

What Operating System(s) are you seeing this problem on?

Linux Wayland

Which Wayland compositor or X11 Window manager(s) are you using?

KDE/Wayland Arch Linux

WezTerm version

20240928-215536-a2f2c07a

Did you try the latest nightly build to see if the issue is better (or worse!) than your current version?

Yes, and I updated the version box above to show the version of the nightly that I tried

Describe the bug

> wezterm ssh -v localhost
21:09:04.379  INFO   mux::ssh > Using ssh config: {
    "hostname": "localhost",
    "identityagent": "/run/user/1000/wezterm/agent.49958",
    "identityfile": "/home/me/.ssh/id_dsa /home/me/.ssh/id_ecdsa /home/me/.ssh/id_ed25519 /home/me/.ssh/id_rsa",
    "port": "22",
    "serveraliveinterval": "60",
    "user": "me",
    "userknownhostsfile": "/home/me/.ssh/known_hosts /home/me/.ssh/known_hosts2",
    "wezterm_ssh_backend": "libssh",
    "wezterm_ssh_verbose": "true",
}
21:09:04.380  INFO   libssh::ssh_config_parse_file > Reading configuration data from /home/me/.ssh/config
21:09:04.381  INFO   libssh::ssh_config_parse_line > Unsupported option: ServerAliveInterval, line: 20
21:09:04.381  INFO   libssh::ssh_config_parse_file > Reading configuration data from /etc/ssh/ssh_config
21:09:04.381  INFO   libssh::local_parse_file      > Cannot find file /etc/ssh/ssh_config.d/*.conf to load
21:09:04.382  INFO   wezterm_ssh::sessioninner     > resolved localhost:22 -> [::1]:22
21:09:04.382  INFO   libssh::ssh_connect           > libssh 0.8.90 (c) 2003-2023 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_pthread
21:09:04.382  INFO   libssh::ssh_connect           > Socket connecting, now waiting for the callbacks to work
21:09:04.382  INFO   libssh::ssh_connect           > Actual timeout : 10000
21:09:04.382  INFO   libssh::ssh_socket_pollcallback > Received POLLOUT in connecting state
21:09:04.382  INFO   libssh::socket_callback_connected > Socket connection callback: 1 (0)
21:09:04.382  INFO   libssh::ssh_client_connection_callback > session_state=2
21:09:04.382  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.388  INFO   libssh::callback_receive_banner        > Received banner: SSH-2.0-OpenSSH_9.9
21:09:04.388  INFO   libssh::ssh_client_connection_callback > session_state=3
21:09:04.388  INFO   libssh::ssh_client_connection_callback > SSH server banner: SSH-2.0-OpenSSH_9.9
21:09:04.388  INFO   libssh::ssh_analyze_banner             > Analyzing banner: SSH-2.0-OpenSSH_9.9
21:09:04.388  INFO   libssh::ssh_analyze_banner             > We are talking to an OpenSSH server version: 9.9 (90900)
21:09:04.389  INFO   libssh::ssh_client_select_hostkeys     > Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256"
21:09:04.390  INFO   libssh::ssh_key_cmp                    > key types don't match!
21:09:04.390  INFO   libssh::ssh_key_cmp                    > key types don't match!
21:09:04.390  INFO   libssh::ssh_key_cmp                    > key types don't match!
21:09:04.390  INFO   libssh::ssh_known_hosts_read_entries   > Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory
21:09:04.390  INFO   libssh::ssh_client_select_hostkeys     > Algorithms found in known_hosts files: "ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256"
21:09:04.390  INFO   libssh::ssh_client_select_hostkeys     > Changing host key method to "ssh-ed25519,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com"
21:09:04.390  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.390  INFO   libssh::packet_send2                   > packet: wrote [type=20, len=932, padding_size=6, comp=925, payload=925]
21:09:04.390  INFO   libssh::ssh_send_kex                   > SSH_MSG_KEXINIT sent
21:09:04.390  INFO   libssh::ssh_packet_socket_callback     > packet: read type 20 [len=1164,padding=10,comp=1153,payload=1153]
21:09:04.390  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 20
21:09:04.390  INFO   libssh::ssh_packet_kexinit             > Server supports strict kex, enabling.
21:09:04.390  INFO   libssh::ssh_client_connection_callback > session_state=5
21:09:04.390  INFO   libssh::ssh_kex_select_methods         > Negotiated curve25519-sha256,ssh-ed25519,chacha20-poly1305@openssh.com,chacha20-poly1305@openssh.com,aead-poly1305,aead-poly1305,none,none,,
21:09:04.392  INFO   libssh::packet_send2                   > packet: wrote [type=30, len=44, padding_size=6, comp=37, payload=37]
21:09:04.392  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.437  INFO   libssh::ssh_packet_socket_callback     > packet: read type 31 [len=188,padding=8,comp=179,payload=179]
21:09:04.437  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 31
21:09:04.439  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.439  INFO   libssh::packet_send2                   > packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1]
21:09:04.439  INFO   libssh::crypt_set_algorithms2          > Set output algorithm to chacha20-poly1305@openssh.com
21:09:04.439  INFO   libssh::crypt_set_algorithms2          > Set HMAC output algorithm to aead-poly1305
21:09:04.439  INFO   libssh::crypt_set_algorithms2          > Set input algorithm to chacha20-poly1305@openssh.com
21:09:04.439  INFO   libssh::crypt_set_algorithms2          > Set HMAC input algorithm to aead-poly1305
21:09:04.440  INFO   libssh::ssh_init_rekey_state           > Set rekey after 134217728 blocks
21:09:04.440  INFO   libssh::ssh_init_rekey_state           > Set rekey after 134217728 blocks
21:09:04.440  INFO   libssh::ssh_packet_send_newkeys        > SSH_MSG_NEWKEYS sent
21:09:04.440  INFO   libssh::ssh_packet_socket_callback     > Processing 300 bytes left in socket buffer
21:09:04.440  INFO   libssh::ssh_packet_socket_callback     > packet: read type 21 [len=12,padding=10,comp=1,payload=1]
21:09:04.440  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 21
21:09:04.440  INFO   libssh::ssh_packet_newkeys             > Received SSH_MSG_NEWKEYS
21:09:04.441  INFO   libssh::ssh_packet_newkeys             > Signature verified and valid
21:09:04.441  INFO   libssh::ssh_client_connection_callback > session_state=6
21:09:04.441  INFO   libssh::ssh_packet_socket_callback     > Processing 284 bytes left in socket buffer
21:09:04.441  INFO   libssh::ssh_packet_socket_callback     > packet: read type 7 [len=264,padding=11,comp=252,payload=252]
21:09:04.441  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 7
21:09:04.441  INFO   libssh::ssh_packet_ext_info            > Received SSH_MSG_EXT_INFO
21:09:04.442  INFO   libssh::ssh_packet_ext_info            > Follows 3 extensions
21:09:04.442  INFO   libssh::ssh_packet_ext_info            > Extension: server-sig-algs=<ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.442  INFO   libssh::ssh_packet_ext_info            > Unknown extension: publickey-hostbound@openssh.com
21:09:04.442  INFO   libssh::ssh_packet_ext_info            > Unknown extension: ping@openssh.com
21:09:04.442  INFO   libssh::ssh_connect                    > current state : 7
21:09:04.442  INFO   libssh::ssh_key_cmp                    > key types don't match!
21:09:04.442  INFO   libssh::ssh_key_cmp                    > key types don't match!
21:09:04.442  INFO   libssh::ssh_key_cmp                    > key types don't match!
21:09:04.442  INFO   libssh::packet_send2                   > packet: wrote [type=5, len=24, padding_size=6, comp=17, payload=17]
21:09:04.442  INFO   libssh::ssh_service_request            > Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth)
21:09:04.442  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.482  INFO   libssh::ssh_packet_socket_callback     > packet: read type 6 [len=24,padding=6,comp=17,payload=17]
21:09:04.482  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 6
21:09:04.482  INFO   libssh::ssh_packet_service_accept      > Received SSH_MSG_SERVICE_ACCEPT
21:09:04.482  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.482  INFO   libssh::packet_send2                   > packet: wrote [type=50, len=48, padding_size=10, comp=37, payload=37]
21:09:04.483  INFO   libssh::ssh_packet_socket_callback     > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.483  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 51
21:09:04.483  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'none'. Authentication that can continue: publickey,password
21:09:04.483  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'none'. Authentication that can continue: publickey,password
21:09:04.499  INFO   libssh::ssh_agent_get_ident_count      > Answer type: 12, expected answer: 12
21:09:04.499  INFO   libssh::ssh_agent_get_ident_count      > Agent count: 5
21:09:04.499  INFO   libssh::ssh_userauth_agent             > Trying identity /home/me/.ssh/h3.pem
21:09:04.499  INFO   libssh::ssh_key_algorithm_allowed      > Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.500  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.500  INFO   libssh::packet_send2                   > packet: wrote [type=50, len=120, padding_size=6, comp=113, payload=113]
21:09:04.506  INFO   libssh::ssh_packet_socket_callback     > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.506  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 51
21:09:04.506  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.506  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.506  INFO   libssh::ssh_userauth_agent             > Public key of /home/me/.ssh/h3.pem refused by server
21:09:04.507  INFO   libssh::ssh_userauth_agent             > Trying identity me@spectre
21:09:04.507  INFO   libssh::ssh_key_algorithm_allowed      > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.507  INFO   libssh::ssh_key_algorithm_allowed      > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.507  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.507  INFO   libssh::packet_send2                   > packet: wrote [type=50, len=352, padding_size=9, comp=342, payload=342]
21:09:04.520  INFO   libssh::ssh_packet_socket_callback     > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.520  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 51
21:09:04.520  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.520  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.520  INFO   libssh::ssh_userauth_agent             > Public key of me@spectre refused by server
21:09:04.520  INFO   libssh::ssh_userauth_agent             > Trying identity me@lenovo
21:09:04.521  INFO   libssh::ssh_key_algorithm_allowed      > Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.521  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.521  INFO   libssh::packet_send2                   > packet: wrote [type=50, len=120, padding_size=6, comp=113, payload=113]
21:09:04.533  INFO   libssh::ssh_packet_socket_callback     > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.533  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 51
21:09:04.533  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.534  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.534  INFO   libssh::ssh_userauth_agent             > Public key of me@lenovo refused by server
21:09:04.534  INFO   libssh::ssh_userauth_agent             > Trying identity me@lenovo
21:09:04.534  INFO   libssh::ssh_key_algorithm_allowed      > Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.534  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.534  INFO   libssh::packet_send2                   > packet: wrote [type=50, len=120, padding_size=6, comp=113, payload=113]
21:09:04.546  INFO   libssh::ssh_packet_socket_callback     > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.546  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 51
21:09:04.547  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.547  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.547  INFO   libssh::ssh_userauth_agent             > Public key of me@lenovo refused by server
21:09:04.547  INFO   libssh::ssh_userauth_agent             > Trying identity me@spectre
21:09:04.547  INFO   libssh::ssh_key_algorithm_allowed      > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.547  INFO   libssh::ssh_key_algorithm_allowed      > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.547  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.547  INFO   libssh::packet_send2                   > packet: wrote [type=50, len=352, padding_size=9, comp=342, payload=342]
21:09:04.560  INFO   libssh::ssh_packet_socket_callback     > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.560  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 51
21:09:04.560  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.560  INFO   libssh::ssh_packet_userauth_failure    > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.560  INFO   libssh::ssh_userauth_agent             > Public key of me@spectre refused by server
21:09:04.560  INFO   libssh::ssh_userauth_publickey_auto    > Trying to authenticate with /home/me/.ssh/id_rsa
21:09:04.560  INFO   libssh::ssh_key_algorithm_allowed      > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.560  INFO   libssh::ssh_key_algorithm_allowed      > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.560  INFO   libssh::ssh_socket_unbuffered_write    > Enabling POLLOUT for socket
21:09:04.560  INFO   libssh::packet_send2                   > packet: wrote [type=50, len=352, padding_size=9, comp=342, payload=342]
21:09:04.573  INFO   libssh::ssh_packet_socket_callback     > packet: read type 1 [len=56,padding=10,comp=45,payload=45]
21:09:04.573  INFO   libssh::ssh_packet_process             > Dispatching handler for packet type 1
21:09:04.573  INFO   libssh::ssh_packet_disconnect_callback > Received SSH_MSG_DISCONNECT 2:Too many authentication failures
21:09:04.573  INFO   libssh::ssh_packet_disconnect_callback > Received SSH_MSG_DISCONNECT: 2:Too many authentication failures
> journactl
sshd-session[50041]: error: maximum authentication attempts exceeded for me from ::1 port 54312 ssh2 [preauth]

Wezterm won't prompt for the password because it would try the keys and fail due to too many authentication failures. I tried to mitigate the issue using PreferredAuthentications in .ssh/config but it didn't help and by checking https://wezfurlong.org/wezterm/ssh.html I guess it's not supported

To Reproduce

Make sure you have multiple keys in your .ssh folder

> ls .ssh/*.pub |wc -l
5
wezterm ssh -v localhost

Configuration

no config

Expected Behavior

wezterm ssh should behave as plain ssh as much as it makes sense

Logs

No response

Anything else?

No response

nalakawula commented 1 month ago

I have exact same issue.