Warn the user when the SSH client or server are using weak ciphers. This can be done by default, when using -v or on a specific test-security parameter. Client and Server settings should be tested. According to https://stribika.github.io/2015/01/04/secure-secure-shell.html Many ciphers (but not all) are either weak or broken. By having an automatic test in the tools we can improve the settings of the currently used servers and clients. That would improve the average security level in a simple anbd efficient way.
Our policy is to remove weak ciphers from the configuration. Users need to take explicit action to enable them, and I don't think adding a warning on top of offers the right benefit:hassle ratio.
closing resolved bugs as of 8.6p1 release