What Operating System(s) are you seeing this problem on?
Linux Wayland
Which Wayland compositor or X11 Window manager(s) are you using?
KDE/Wayland
Arch Linux
WezTerm version
20240928-215536-a2f2c07a
Did you try the latest nightly build to see if the issue is better (or worse!) than your current version?
Yes, and I updated the version box above to show the version of the nightly that I tried
Describe the bug
> wezterm ssh -v localhost
21:09:04.379 INFO mux::ssh > Using ssh config: {
"hostname": "localhost",
"identityagent": "/run/user/1000/wezterm/agent.49958",
"identityfile": "/home/me/.ssh/id_dsa /home/me/.ssh/id_ecdsa /home/me/.ssh/id_ed25519 /home/me/.ssh/id_rsa",
"port": "22",
"serveraliveinterval": "60",
"user": "me",
"userknownhostsfile": "/home/me/.ssh/known_hosts /home/me/.ssh/known_hosts2",
"wezterm_ssh_backend": "libssh",
"wezterm_ssh_verbose": "true",
}
21:09:04.380 INFO libssh::ssh_config_parse_file > Reading configuration data from /home/me/.ssh/config
21:09:04.381 INFO libssh::ssh_config_parse_line > Unsupported option: ServerAliveInterval, line: 20
21:09:04.381 INFO libssh::ssh_config_parse_file > Reading configuration data from /etc/ssh/ssh_config
21:09:04.381 INFO libssh::local_parse_file > Cannot find file /etc/ssh/ssh_config.d/*.conf to load
21:09:04.382 INFO wezterm_ssh::sessioninner > resolved localhost:22 -> [::1]:22
21:09:04.382 INFO libssh::ssh_connect > libssh 0.8.90 (c) 2003-2023 Aris Adamantiadis, Andreas Schneider and libssh contributors. Distributed under the LGPL, please refer to COPYING file for information about your rights, using threading threads_pthread
21:09:04.382 INFO libssh::ssh_connect > Socket connecting, now waiting for the callbacks to work
21:09:04.382 INFO libssh::ssh_connect > Actual timeout : 10000
21:09:04.382 INFO libssh::ssh_socket_pollcallback > Received POLLOUT in connecting state
21:09:04.382 INFO libssh::socket_callback_connected > Socket connection callback: 1 (0)
21:09:04.382 INFO libssh::ssh_client_connection_callback > session_state=2
21:09:04.382 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.388 INFO libssh::callback_receive_banner > Received banner: SSH-2.0-OpenSSH_9.9
21:09:04.388 INFO libssh::ssh_client_connection_callback > session_state=3
21:09:04.388 INFO libssh::ssh_client_connection_callback > SSH server banner: SSH-2.0-OpenSSH_9.9
21:09:04.388 INFO libssh::ssh_analyze_banner > Analyzing banner: SSH-2.0-OpenSSH_9.9
21:09:04.388 INFO libssh::ssh_analyze_banner > We are talking to an OpenSSH server version: 9.9 (90900)
21:09:04.389 INFO libssh::ssh_client_select_hostkeys > Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256"
21:09:04.390 INFO libssh::ssh_key_cmp > key types don't match!
21:09:04.390 INFO libssh::ssh_key_cmp > key types don't match!
21:09:04.390 INFO libssh::ssh_key_cmp > key types don't match!
21:09:04.390 INFO libssh::ssh_known_hosts_read_entries > Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory
21:09:04.390 INFO libssh::ssh_client_select_hostkeys > Algorithms found in known_hosts files: "ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256"
21:09:04.390 INFO libssh::ssh_client_select_hostkeys > Changing host key method to "ssh-ed25519,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com"
21:09:04.390 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.390 INFO libssh::packet_send2 > packet: wrote [type=20, len=932, padding_size=6, comp=925, payload=925]
21:09:04.390 INFO libssh::ssh_send_kex > SSH_MSG_KEXINIT sent
21:09:04.390 INFO libssh::ssh_packet_socket_callback > packet: read type 20 [len=1164,padding=10,comp=1153,payload=1153]
21:09:04.390 INFO libssh::ssh_packet_process > Dispatching handler for packet type 20
21:09:04.390 INFO libssh::ssh_packet_kexinit > Server supports strict kex, enabling.
21:09:04.390 INFO libssh::ssh_client_connection_callback > session_state=5
21:09:04.390 INFO libssh::ssh_kex_select_methods > Negotiated curve25519-sha256,ssh-ed25519,chacha20-poly1305@openssh.com,chacha20-poly1305@openssh.com,aead-poly1305,aead-poly1305,none,none,,
21:09:04.392 INFO libssh::packet_send2 > packet: wrote [type=30, len=44, padding_size=6, comp=37, payload=37]
21:09:04.392 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.437 INFO libssh::ssh_packet_socket_callback > packet: read type 31 [len=188,padding=8,comp=179,payload=179]
21:09:04.437 INFO libssh::ssh_packet_process > Dispatching handler for packet type 31
21:09:04.439 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.439 INFO libssh::packet_send2 > packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1]
21:09:04.439 INFO libssh::crypt_set_algorithms2 > Set output algorithm to chacha20-poly1305@openssh.com
21:09:04.439 INFO libssh::crypt_set_algorithms2 > Set HMAC output algorithm to aead-poly1305
21:09:04.439 INFO libssh::crypt_set_algorithms2 > Set input algorithm to chacha20-poly1305@openssh.com
21:09:04.439 INFO libssh::crypt_set_algorithms2 > Set HMAC input algorithm to aead-poly1305
21:09:04.440 INFO libssh::ssh_init_rekey_state > Set rekey after 134217728 blocks
21:09:04.440 INFO libssh::ssh_init_rekey_state > Set rekey after 134217728 blocks
21:09:04.440 INFO libssh::ssh_packet_send_newkeys > SSH_MSG_NEWKEYS sent
21:09:04.440 INFO libssh::ssh_packet_socket_callback > Processing 300 bytes left in socket buffer
21:09:04.440 INFO libssh::ssh_packet_socket_callback > packet: read type 21 [len=12,padding=10,comp=1,payload=1]
21:09:04.440 INFO libssh::ssh_packet_process > Dispatching handler for packet type 21
21:09:04.440 INFO libssh::ssh_packet_newkeys > Received SSH_MSG_NEWKEYS
21:09:04.441 INFO libssh::ssh_packet_newkeys > Signature verified and valid
21:09:04.441 INFO libssh::ssh_client_connection_callback > session_state=6
21:09:04.441 INFO libssh::ssh_packet_socket_callback > Processing 284 bytes left in socket buffer
21:09:04.441 INFO libssh::ssh_packet_socket_callback > packet: read type 7 [len=264,padding=11,comp=252,payload=252]
21:09:04.441 INFO libssh::ssh_packet_process > Dispatching handler for packet type 7
21:09:04.441 INFO libssh::ssh_packet_ext_info > Received SSH_MSG_EXT_INFO
21:09:04.442 INFO libssh::ssh_packet_ext_info > Follows 3 extensions
21:09:04.442 INFO libssh::ssh_packet_ext_info > Extension: server-sig-algs=<ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.442 INFO libssh::ssh_packet_ext_info > Unknown extension: publickey-hostbound@openssh.com
21:09:04.442 INFO libssh::ssh_packet_ext_info > Unknown extension: ping@openssh.com
21:09:04.442 INFO libssh::ssh_connect > current state : 7
21:09:04.442 INFO libssh::ssh_key_cmp > key types don't match!
21:09:04.442 INFO libssh::ssh_key_cmp > key types don't match!
21:09:04.442 INFO libssh::ssh_key_cmp > key types don't match!
21:09:04.442 INFO libssh::packet_send2 > packet: wrote [type=5, len=24, padding_size=6, comp=17, payload=17]
21:09:04.442 INFO libssh::ssh_service_request > Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth)
21:09:04.442 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.482 INFO libssh::ssh_packet_socket_callback > packet: read type 6 [len=24,padding=6,comp=17,payload=17]
21:09:04.482 INFO libssh::ssh_packet_process > Dispatching handler for packet type 6
21:09:04.482 INFO libssh::ssh_packet_service_accept > Received SSH_MSG_SERVICE_ACCEPT
21:09:04.482 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.482 INFO libssh::packet_send2 > packet: wrote [type=50, len=48, padding_size=10, comp=37, payload=37]
21:09:04.483 INFO libssh::ssh_packet_socket_callback > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.483 INFO libssh::ssh_packet_process > Dispatching handler for packet type 51
21:09:04.483 INFO libssh::ssh_packet_userauth_failure > Access denied for 'none'. Authentication that can continue: publickey,password
21:09:04.483 INFO libssh::ssh_packet_userauth_failure > Access denied for 'none'. Authentication that can continue: publickey,password
21:09:04.499 INFO libssh::ssh_agent_get_ident_count > Answer type: 12, expected answer: 12
21:09:04.499 INFO libssh::ssh_agent_get_ident_count > Agent count: 5
21:09:04.499 INFO libssh::ssh_userauth_agent > Trying identity /home/me/.ssh/h3.pem
21:09:04.499 INFO libssh::ssh_key_algorithm_allowed > Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.500 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.500 INFO libssh::packet_send2 > packet: wrote [type=50, len=120, padding_size=6, comp=113, payload=113]
21:09:04.506 INFO libssh::ssh_packet_socket_callback > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.506 INFO libssh::ssh_packet_process > Dispatching handler for packet type 51
21:09:04.506 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.506 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.506 INFO libssh::ssh_userauth_agent > Public key of /home/me/.ssh/h3.pem refused by server
21:09:04.507 INFO libssh::ssh_userauth_agent > Trying identity me@spectre
21:09:04.507 INFO libssh::ssh_key_algorithm_allowed > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.507 INFO libssh::ssh_key_algorithm_allowed > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.507 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.507 INFO libssh::packet_send2 > packet: wrote [type=50, len=352, padding_size=9, comp=342, payload=342]
21:09:04.520 INFO libssh::ssh_packet_socket_callback > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.520 INFO libssh::ssh_packet_process > Dispatching handler for packet type 51
21:09:04.520 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.520 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.520 INFO libssh::ssh_userauth_agent > Public key of me@spectre refused by server
21:09:04.520 INFO libssh::ssh_userauth_agent > Trying identity me@lenovo
21:09:04.521 INFO libssh::ssh_key_algorithm_allowed > Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.521 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.521 INFO libssh::packet_send2 > packet: wrote [type=50, len=120, padding_size=6, comp=113, payload=113]
21:09:04.533 INFO libssh::ssh_packet_socket_callback > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.533 INFO libssh::ssh_packet_process > Dispatching handler for packet type 51
21:09:04.533 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.534 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.534 INFO libssh::ssh_userauth_agent > Public key of me@lenovo refused by server
21:09:04.534 INFO libssh::ssh_userauth_agent > Trying identity me@lenovo
21:09:04.534 INFO libssh::ssh_key_algorithm_allowed > Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.534 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.534 INFO libssh::packet_send2 > packet: wrote [type=50, len=120, padding_size=6, comp=113, payload=113]
21:09:04.546 INFO libssh::ssh_packet_socket_callback > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.546 INFO libssh::ssh_packet_process > Dispatching handler for packet type 51
21:09:04.547 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.547 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.547 INFO libssh::ssh_userauth_agent > Public key of me@lenovo refused by server
21:09:04.547 INFO libssh::ssh_userauth_agent > Trying identity me@spectre
21:09:04.547 INFO libssh::ssh_key_algorithm_allowed > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.547 INFO libssh::ssh_key_algorithm_allowed > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.547 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.547 INFO libssh::packet_send2 > packet: wrote [type=50, len=352, padding_size=9, comp=342, payload=342]
21:09:04.560 INFO libssh::ssh_packet_socket_callback > packet: read type 51 [len=32,padding=7,comp=24,payload=24]
21:09:04.560 INFO libssh::ssh_packet_process > Dispatching handler for packet type 51
21:09:04.560 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.560 INFO libssh::ssh_packet_userauth_failure > Access denied for 'publickey'. Authentication that can continue: publickey,password
21:09:04.560 INFO libssh::ssh_userauth_agent > Public key of me@spectre refused by server
21:09:04.560 INFO libssh::ssh_userauth_publickey_auto > Trying to authenticate with /home/me/.ssh/id_rsa
21:09:04.560 INFO libssh::ssh_key_algorithm_allowed > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.560 INFO libssh::ssh_key_algorithm_allowed > Checking rsa-sha2-512 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256>
21:09:04.560 INFO libssh::ssh_socket_unbuffered_write > Enabling POLLOUT for socket
21:09:04.560 INFO libssh::packet_send2 > packet: wrote [type=50, len=352, padding_size=9, comp=342, payload=342]
21:09:04.573 INFO libssh::ssh_packet_socket_callback > packet: read type 1 [len=56,padding=10,comp=45,payload=45]
21:09:04.573 INFO libssh::ssh_packet_process > Dispatching handler for packet type 1
21:09:04.573 INFO libssh::ssh_packet_disconnect_callback > Received SSH_MSG_DISCONNECT 2:Too many authentication failures
21:09:04.573 INFO libssh::ssh_packet_disconnect_callback > Received SSH_MSG_DISCONNECT: 2:Too many authentication failures
> journactl
sshd-session[50041]: error: maximum authentication attempts exceeded for me from ::1 port 54312 ssh2 [preauth]
Wezterm won't prompt for the password because it would try the keys and fail due to too many authentication failures. I tried to mitigate the issue using PreferredAuthentications in .ssh/config but it didn't help and by checking https://wezfurlong.org/wezterm/ssh.html I guess it's not supported
To Reproduce
Make sure you have multiple keys in your .ssh folder
> ls .ssh/*.pub |wc -l
5
wezterm ssh -v localhost
Configuration
no config
Expected Behavior
wezterm ssh should behave as plain ssh as much as it makes sense
What Operating System(s) are you seeing this problem on?
Linux Wayland
Which Wayland compositor or X11 Window manager(s) are you using?
KDE/Wayland Arch Linux
WezTerm version
20240928-215536-a2f2c07a
Did you try the latest nightly build to see if the issue is better (or worse!) than your current version?
Yes, and I updated the version box above to show the version of the nightly that I tried
Describe the bug
Wezterm won't prompt for the password because it would try the keys and fail due to too many authentication failures. I tried to mitigate the issue using
PreferredAuthentications
in.ssh/config
but it didn't help and by checking https://wezfurlong.org/wezterm/ssh.html I guess it's not supportedTo Reproduce
Make sure you have multiple keys in your
.ssh
folderConfiguration
no config
Expected Behavior
wezterm ssh should behave as plain ssh as much as it makes sense
Logs
No response
Anything else?
No response