Perhaps the following is helpful in tracing the problem. It is an excerpt from /var/log/auth.log covering the ssh login from the iPad on the server (srv01) in the situation described earlier, logged at LogLevel DEBUG3:
Mar 23 08:33:14 srv01 sshd[1782]: Connection from ***.***.***.66 port 59484 on ***.***.***.34 port ***22 Mar 23 08:33:14 srv01 sshd[1782]: debug1: Client protocol version 2.0; client software version OpenSSH_5.4 Mar 23 08:33:14 srv01 sshd[1782]: debug1: match: OpenSSH_5.4 pat OpenSSH_5* compat 0x0c000000 Mar 23 08:33:14 srv01 sshd[1782]: debug1: Enabling compatibility mode for protocol 2.0 Mar 23 08:33:14 srv01 sshd[1782]: debug1: Local version string SSH-2.0-OpenSSH_6.9p1 Ubuntu-2ubuntu0.1 Mar 23 08:33:14 srv01 sshd[1782]: debug2: fd 3 setting O_NONBLOCK Mar 23 08:33:14 srv01 sshd[1782]: debug2: Network child is on pid 1783 Mar 23 08:33:14 srv01 sshd[1782]: debug3: preauth child monitor started Mar 23 08:33:14 srv01 sshd[1782]: debug3: privsep user:group 104:65534 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug1: permanently_set_uid: 104/65534 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug1: list_hostkey_types: ssh-ed25519,ssh-rsa [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug1: SSH2_MSG_KEXINIT sent [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug1: SSH2_MSG_KEXINIT received [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: curve25519-sha...@libssh.org,diffie-hellman-group-exchange-sha256 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: ssh-ed25519,ssh-rsa [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: chacha20-poly1...@openssh.com,aes256-...@openssh.com,aes256-ctr,aes192-ctr [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: chacha20-poly1...@openssh.com,aes256-...@openssh.com,aes256-ctr,aes192-ctr [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: hmac-sha2-512-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-ripemd160-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: hmac-sha2-512-...@openssh.com,hmac-sha2-256-...@openssh.com,hmac-ripemd160-...@openssh.com,umac-128-...@openssh.com,hmac-sha2-512,hmac-sha2-256,hmac-ripemd160 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: none,z...@openssh.com [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: none,z...@openssh.com [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: reserved 0 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,aes256-cbc,rijndael-...@lysator.liu.se,aes192-cbc,aes128-cbc,blowfish-cbc,arcfour128,arcfour,cast128-cbc,3des-cbc [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,aes256-cbc,rijndael-...@lysator.liu.se,aes192-cbc,aes128-cbc,blowfish-cbc,arcfour128,arcfour,cast128-cbc,3des-cbc [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: hmac-sha2-512-...@openssh.com,hmac-sha2-512,hmac-sha2-256-...@openssh.com,hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-ripemd160,hmac-ripemd...@openssh.com [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: hmac-sha2-512-...@openssh.com,hmac-sha2-512,hmac-sha2-256-...@openssh.com,hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-ripemd160,hmac-ripemd...@openssh.com [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: zlib,z...@openssh.com,none [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: zlib,z...@openssh.com,none [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: first_kex_follows 0 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug2: kex_parse_kexinit: reserved 0 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug1: kex: client->server aes192-ctr hmac-sha2-512-...@openssh.com z...@openssh.com [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug1: kex: server->client aes192-ctr hmac-sha2-512-...@openssh.com z...@openssh.com [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug1: expecting SSH2_MSG_KEX_DH_GEX_REQUEST [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug3: mm_request_send entering: type 0 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug3: mm_request_receive_expect entering: type 1 [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug3: mm_request_receive entering [preauth] Mar 23 08:33:14 srv01 sshd[1782]: debug3: mm_request_receive entering Mar 23 08:33:14 srv01 sshd[1782]: debug3: monitor_read: checking request 0 Mar 23 08:33:14 srv01 sshd[1782]: debug3: mm_answer_moduli: got parameters: 1024 1536 2048 Mar 23 08:33:14 srv01 sshd[1782]: WARNING: no suitable primes in /etc/ssh/primes -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1528251 Title: WARNING: no suitable primes in /etc/ssh/primes Status in openssh package in Ubuntu: Incomplete Bug description: For instance when the KexAlgorithms option in sshd_config is set to include Diffie Hellman group exchange (e.g. diffie-hellman-group-exchange-sha256), and the /etc/ssh/moduli file is regenerated to include only 4096 bit primes, the ssh server may log the above warning message to /var/log/auth.log, probably because the ssh client trying to log in does not allow for the use of 4096 bit primes during the key exchange. The alleged problem is the reference to /etc/ssh/primes instead of /etc/ssh/moduli. It would appear that the file /etc/ssh/primes is neither used by ssh server, nor documented. I note that this error appears to have been reported in several places on the web in the past years, but to no avail (e.g. http://misc.openbsd.narkive.com/tZPNEoZk/no-suitable-primes) Release: Ubuntu 14.04.3 LTS Package: openssh-server, Version: 1:6.6p1-2ubuntu2.3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1528251/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp