Log entries such as these lack the attackers IP address When unneeded ciphers/macs/KexAlgorithms are removed -- we get: Jan 12 20:17:28 <<REMOVED>> sshd[8888]: fatal: Unable to negotiate a key exchange method [preauth] Jan 12 20:19:16 <<REMOVED>> sshd[8890]: fatal: Unable to negotiate a key exchange method [preauth] This prevents fail2ban and others from doing some useful attack mitigation. Also see: http://lists.mindrot.org/pipermail/openssh-unix-dev/2015-January/033328.html
I believe this is fixed in current openssh 7.1. I see in log: Sep 10 08:42:12 localhost sshd[26793]: fatal: Unable to negotiate with 192.168.100.243: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1 [preauth] Upstream commit: https://anongit.mindrot.org/openssh.git/commit/?id=f319912b0d0e1675b8bb051ed8213792c788bcb2
Yes, this was fixed in 7.0
Close all resolved bugs after 7.3p1 release