Again ssh connection problem

Hello,
a couple of days ago, I have posted the following post: “Cannot connect with ssh since update to Fedora core 31 ” and this issue was closed and resolved but fore some strange reasons after recovering my machine from a backup, I pay attention to adjust the /etc/ssh/sshd_config and /etc/hosts.allow as explained in the issue.
Now I am still not able to ssh to my fedora 31 server either as normal user or as root and giving me the message: “Permission denied, please try again.”

Any help will be appreciated.

myagfedora

Can your paste your both configs (if there is nothing private, i’ve no idea what ssh is)?

Could you please execute ssh in verbose mode and share with us:

 -v      Verbose mode.  Causes ssh to print debugging messages about its progress.
         This is helpful in debugging connection, authentication, and configuration
         problems.  Multiple -v options increase the verbosity.  The maximum is 3.

Also, check you ssh log in your Server :

journalctl _SYSTEMD_UNIT=sshd.service

Regards.,

1 Like

Hello,
Thanks for your answer.
here is the output of ssh -v giuseppe@piwigoserver:

giuseppe@testangelini:~/.ssh$ ssh -v giuseppe@piwigoserver
OpenSSH_7.5p1 Ubuntu-10ubuntu0.1, OpenSSL 1.0.2g  1 Mar 2016
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
debug1: Connecting to piwigoserver [10.1.4.10] port 22.
debug1: Connection established.
debug1: key_load_public: No such file or directory
debug1: identity file /home/giuseppe/.ssh/identity type -1
debug1: key_load_public: No such file or directory
debug1: identity file /home/giuseppe/.ssh/identity-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_7.5p1 Ubuntu-10ubuntu0.1
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.1
debug1: match: OpenSSH_8.1 pat OpenSSH* compat 0x04000000
debug1: Authenticating to piwigoserver:22 as 'giuseppe'
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ecdsa-sha2-nistp256 SHA256:Padi7OK2RlEX+v1hH4Yzymqjz3wqtRHBM5cU0MVtK7E
debug1: Host 'piwigoserver' is known and matches the ECDSA host key.
debug1: Found key in /home/giuseppe/.ssh/known_hosts:1
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: rekey after 134217728 blocks
debug1: SSH2_MSG_EXT_INFO received
debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
debug1: Next authentication method: gssapi-keyex
debug1: No valid Key exchange context
debug1: Next authentication method: gssapi-with-mic
debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1000)

debug1: Unspecified GSS failure.  Minor code may provide more information
No Kerberos credentials available (default cache: FILE:/tmp/krb5cc_1000)

debug1: Next authentication method: publickey
debug1: Trying private key: /home/giuseppe/.ssh/identity
debug1: Next authentication method: password
giuseppe@piwigoserver's password: 
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password
Permission denied, please try again.
giuseppe@piwigoserver's password: 

and here is the output of journalctl _SYSTEMD_UNIT=sshd.service | grep "failure":

 Nov 19 15:02:04 piwigoserver.vki.private.eu sshd[32713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.1.5.4  user=root
Nov 20 13:59:38 piwigoserver.vki.private.eu sshd[20673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.1.2.2
Nov 20 14:00:12 piwigoserver.vki.private.eu sshd[20673]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.1.2.2
Nov 26 14:16:40 piwigoserver.vki.private.eu sshd[3718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.1.5.4  user=root
Nov 26 14:17:04 piwigoserver.vki.private.eu sshd[3718]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.1.5.4  user=root
Nov 26 14:17:16 piwigoserver.vki.private.eu sshd[3737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.1.5.4  user=root
Nov 26 14:22:20 piwigoserver.vki.private.eu sshd[3834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10.1.5.4  user=root
Dec 03 14:47:47 piwigoserver.vki.private.eu sshd[2661]: Disconnecting authenticating user giuseppe 10.1.2.2 port 50927: Too many authentication failures [preauth]
Jan 06 13:28:16 piwigoserver.vki.private.eu sshd[2010]: Disconnecting authenticating user root 10.1.2.2 port 49884: Too many authentication failures [preauth]

Best Regards.

myagfedora

Could you please login with:

ssh -o IdentitiesOnly=yes giuseppe@piwigoserver

if this works:

Alternatively, if you want this to work for all ssh client connections, you can configure it in your ~/.ssh/config file.

vim ~/.ssh/config

Add the following configuration in the file, under the Host section:

Host * 
       	IdentitiesOnly=yes

For more information, see the ssh-config man page.

man ssh-config

IdentitiesOnly
Specifies that ssh should only use the authentication identity files configured in the ssh_config files, even if ssh-agent offers more identities. The argument to this keyword must be ‘‘yes’’ or ‘‘no’’. This option is intended for situations where ssh-agent offers many different identities. The default is ‘‘no’’.

Regards.,

Hello,
thanks for your answer.
Unfortunately, it still doesn’t work, same problem.
Best Regards.

myagfedora

I’m sorry: Did your checked the firewall settings?

Hello,
here is the output of the “iptables” -L -n command:

Chain INPUT (policy ACCEPT)
target prot opt source destination
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT all – 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all – 0.0.0.0/0 0.0.0.0/0
INPUT_direct all – 0.0.0.0/0 0.0.0.0/0
INPUT_ZONES all – 0.0.0.0/0 0.0.0.0/0
DROP all – 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all – 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited

Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all – 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED,DNAT
ACCEPT all – 0.0.0.0/0 0.0.0.0/0
FORWARD_direct all – 0.0.0.0/0 0.0.0.0/0
FORWARD_IN_ZONES all – 0.0.0.0/0 0.0.0.0/0
FORWARD_OUT_ZONES all – 0.0.0.0/0 0.0.0.0/0
DROP all – 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
REJECT all – 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited

Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ACCEPT all – 0.0.0.0/0 0.0.0.0/0
OUTPUT_direct all – 0.0.0.0/0 0.0.0.0/0

Chain FORWARD_IN_ZONES (1 references)
target prot opt source destination
FWDI_FedoraWorkstation all – 0.0.0.0/0 0.0.0.0/0 [goto]
FWDI_FedoraWorkstation all – 0.0.0.0/0 0.0.0.0/0 [goto]

Chain FORWARD_OUT_ZONES (1 references)
target prot opt source destination
FWDO_FedoraWorkstation all – 0.0.0.0/0 0.0.0.0/0 [goto]
FWDO_FedoraWorkstation all – 0.0.0.0/0 0.0.0.0/0 [goto]

Chain FORWARD_direct (1 references)
target prot opt source destination

Chain FWDI_FedoraWorkstation (2 references)
target prot opt source destination
FWDI_FedoraWorkstation_pre all – 0.0.0.0/0 0.0.0.0/0
FWDI_FedoraWorkstation_log all – 0.0.0.0/0 0.0.0.0/0
FWDI_FedoraWorkstation_deny all – 0.0.0.0/0 0.0.0.0/0
FWDI_FedoraWorkstation_allow all – 0.0.0.0/0 0.0.0.0/0
FWDI_FedoraWorkstation_post all – 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0

Chain FWDI_FedoraWorkstation_allow (1 references)
target prot opt source destination

Chain FWDI_FedoraWorkstation_deny (1 references)
target prot opt source destination

Chain FWDI_FedoraWorkstation_log (1 references)
target prot opt source destination

Chain FWDI_FedoraWorkstation_post (1 references)
target prot opt source destination

Chain FWDI_FedoraWorkstation_pre (1 references)
target prot opt source destination

Chain FWDO_FedoraWorkstation (2 references)
target prot opt source destination
FWDO_FedoraWorkstation_pre all – 0.0.0.0/0 0.0.0.0/0
FWDO_FedoraWorkstation_log all – 0.0.0.0/0 0.0.0.0/0
FWDO_FedoraWorkstation_deny all – 0.0.0.0/0 0.0.0.0/0
FWDO_FedoraWorkstation_allow all – 0.0.0.0/0 0.0.0.0/0
FWDO_FedoraWorkstation_post all – 0.0.0.0/0 0.0.0.0/0

Chain FWDO_FedoraWorkstation_allow (1 references)
target prot opt source destination

Chain FWDO_FedoraWorkstation_deny (1 references)
target prot opt source destination

Chain FWDO_FedoraWorkstation_log (1 references)
target prot opt source destination

Chain FWDO_FedoraWorkstation_post (1 references)
target prot opt source destination

Chain FWDO_FedoraWorkstation_pre (1 references)
target prot opt source destination

Chain INPUT_ZONES (1 references)
target prot opt source destination
IN_FedoraWorkstation all – 0.0.0.0/0 0.0.0.0/0 [goto]
IN_FedoraWorkstation all – 0.0.0.0/0 0.0.0.0/0 [goto]

Chain INPUT_direct (1 references)
target prot opt source destination

Chain IN_FedoraWorkstation (2 references)
target prot opt source destination
IN_FedoraWorkstation_pre all – 0.0.0.0/0 0.0.0.0/0
IN_FedoraWorkstation_log all – 0.0.0.0/0 0.0.0.0/0
IN_FedoraWorkstation_deny all – 0.0.0.0/0 0.0.0.0/0
IN_FedoraWorkstation_allow all – 0.0.0.0/0 0.0.0.0/0
IN_FedoraWorkstation_post all – 0.0.0.0/0 0.0.0.0/0
ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0

Chain IN_FedoraWorkstation_allow (1 references)
target prot opt source destination
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW,UNTRACKED
ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:137 ctstate NEW,UNTRACKED
ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:138 ctstate NEW,UNTRACKED
ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 udp dpts:1025:65535 ctstate NEW,UNTRACKED
ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpts:1025:65535 ctstate NEW,UNTRACKED

Chain IN_FedoraWorkstation_deny (1 references)
target prot opt source destination

Chain IN_FedoraWorkstation_log (1 references)
target prot opt source destination

Chain IN_FedoraWorkstation_post (1 references)
target prot opt source destination

Chain IN_FedoraWorkstation_pre (1 references)
target prot opt source destination

Chain OUTPUT_direct (1 references)
target prot opt source destination

Best Regards.

myagfedora

I’ve no knowledges, but looks like your machine allows SSH…

Your may also use firewall-cmd --list-all. For me it’s shows:

FedoraWorkstation (active)
  target: default
  icmp-block-inversion: no
  interfaces: enp0s29u1u2 tun0
  sources: 
  services: dhcpv6-client mdns samba-client ssh
  ports: 1025-65535/udp 1025-65535/tcp
  protocols: 
  masquerade: no
  forward-ports: 
  source-ports: 
  icmp-blocks: 
  rich rules: 

PS: use this for the long posts:

[details="Summary"]
long posts
[/details]

Hello,
here is the output of " firewall-cmd --list-all":
FedoraWorkstation (active)
target: default
icmp-block-inversion: no
interfaces: enp0s25
sources:
services: dhcpv6-client samba-client ssh
ports: 1025-65535/udp 1025-65535/tcp
protocols:
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
I hope it helps.

Best Regards.

myagfedora

Did your tried this:
Arch Wiki: OpenSSH Troubleshooting

Hello,
I have followed the 7 steps in the checklist of "Arch: Openssh Troubleshooting"till “Connection refused or timeout problem” and still have the same problem.
Now I join the output of " journalctl -xe ":

[details="Summary"]
-- Logs begin at Wed 2019-10-30 18:25:01 CET, end at Mon 2020-01-13 16:09:02 CET. --
Jan 13 15:54:01 piwigoserver.vki.private.eu systemd[3738]: Reached target Sockets.
-- Subject: A start job for unit UNIT has finished successfully
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A start job for unit UNIT has finished successfully.
-- 
-- The job identifier is 5.
Jan 13 15:54:01 piwigoserver.vki.private.eu systemd[3738]: Reached target Basic System.
-- Subject: A start job for unit UNIT has finished successfully
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A start job for unit UNIT has finished successfully.
-- 
-- The job identifier is 2.
Jan 13 15:54:01 piwigoserver.vki.private.eu systemd[1]: Started User Manager for UID 0.
-- Subject: A start job for unit user@0.service has finished successfully
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A start job for unit user@0.service has finished successfully.
-- 
-- The job identifier is 38415.
Jan 13 15:54:01 piwigoserver.vki.private.eu systemd[3738]: Condition check resulted in Sound Service being skipped.
-- Subject: A start job for unit UNIT has finished successfully
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A start job for unit UNIT has finished successfully.
-- 
-- The job identifier is 12.
Jan 13 15:54:01 piwigoserver.vki.private.eu systemd[3738]: Reached target Main User Target.
-- Subject: A start job for unit UNIT has finished successfully
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A start job for unit UNIT has finished successfully.
-- 
-- The job identifier is 1.
Jan 13 15:54:01 piwigoserver.vki.private.eu systemd[3738]: Startup finished in 191ms.
-- Subject: User manager start-up is now complete
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- The user manager instance for user 0 has been started. All services queued
-- for starting have been started. Note that other services might still be starting
-- up or be started at any later time.
-- 
-- Startup of the manager took 191657 microseconds.
Jan 13 15:54:01 piwigoserver.vki.private.eu audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=user@0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jan 13 15:54:01 piwigoserver.vki.private.eu systemd[1]: Started Session 359 of user root.
-- Subject: A start job for unit session-359.scope has finished successfully
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A start job for unit session-359.scope has finished successfully.
-- 
-- The job identifier is 38516.
Jan 13 15:54:01 piwigoserver.vki.private.eu audit[3735]: USER_START pid=3735 uid=0 auid=0 ses=359 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits,pam_systemd acct="root" exe="/usr/sbin/crond" hostname=? addr=? terminal=cron res=success'
Jan 13 15:54:01 piwigoserver.vki.private.eu audit[3735]: CRED_REFR pid=3735 uid=0 auid=0 ses=359 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/sbin/crond" hostname=? addr=? terminal=cron res=success'
Jan 13 15:54:01 piwigoserver.vki.private.eu CROND[3748]: (root) CMD (/usr/sbin/iptables -I INPUT 1  -p tcp --dport 80 -j ACCEPT )
Jan 13 15:54:01 piwigoserver.vki.private.eu audit: NETFILTER_CFG table=filter family=2 entries=405
Jan 13 15:54:01 piwigoserver.vki.private.eu audit[3735]: CRED_DISP pid=3735 uid=0 auid=0 ses=359 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/sbin/crond" hostname=? addr=? terminal=cron res=success'
Jan 13 15:54:01 piwigoserver.vki.private.eu audit[3735]: USER_END pid=3735 uid=0 auid=0 ses=359 subj=system_u:system_r:crond_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_limits,pam_systemd acct="root" exe="/usr/sbin/crond" hostname=? addr=? terminal=cron res=success'
Jan 13 15:54:01 piwigoserver.vki.private.eu systemd[1]: session-359.scope: Succeeded.
-- Subject: Unit succeeded
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- The unit session-359.scope has successfully entered the 'dead' state.
Jan 13 15:54:11 piwigoserver.vki.private.eu systemd[1]: Stopping User Manager for UID 0...
-- Subject: A stop job for unit user@0.service has begun execution
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A stop job for unit user@0.service has begun execution.
-- 
-- The job identifier is 38618.
Jan 13 15:54:11 piwigoserver.vki.private.eu systemd[3738]: Stopped target Main User Target.
-- Subject: A stop job for unit UNIT has finished
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A stop job for unit UNIT has finished.
-- 
-- The job identifier is 26 and the job result is done.
Jan 13 15:54:11 piwigoserver.vki.private.eu systemd[3738]: Stopped target Basic System.
-- Subject: A stop job for unit UNIT has finished
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A stop job for unit UNIT has finished.
-- 
-- The job identifier is 25 and the job result is done.
Jan 13 15:54:11 piwigoserver.vki.private.eu systemd[3738]: Stopped target Paths.
-- Subject: A stop job for unit UNIT has finished
-- Defined-By: systemd
-- Support: https://lists.freedesktop.org/mailman/listinfo/systemd-devel
-- 
-- A stop job for unit UNIT has finished.
[/details]
Best Regards.

myagfedora

Please, try this ONLY temporary

If this will help, see the post below of this inside a linked topic, for proper repair methods.

https://discussion.fedoraproject.org/t/cannot-connect-to-openvpn-using-gnome/76347/10?u=vits95

PS: Things like [details] (when needed) need to be placed before triple `, not inside:

[details="Summary"]
\```
Some text
\```
[/details]

Hello,
Thanks for your answer.
“setenforce Permissive” did not solved the problem.

Best Regards.

Giuseppe

Please, don’t forget to revert it! setenforce enforcing

Hello,
do I have to understand that my problem will not be solved ?
Best Regards.
myagfedora

Who knows! I’m personally never even used ssh.

In solution of your previous topic (hhlp):

  1. OpenSSH client configuration file ssh_config
  2. OpenSSH daemon configuration file /etc/ssh/sshd_config

Can your recheck this, then?

Or read the all sections, starting from the configuration in Arch Wiki (OpenSSH)?
Just no other ideas left. If only i were able to poke this issue myself…

Please don’t get angry: very stupid questions.
Is the password the right one?
Are you able to login locally on piwigoserver as user giuseppe?
The ip 10.1.4.10 is the IP of the right host you are trying to connect to?

Hello,
yes, I am able to login locally on piwigoserver as user giuseppe.
Yes, the ip 10.1.4.10 is the IP of the right host I am trying to connect to.
I have got this idea:
in order to make a reset of ssh, I would like to make a fresh install.
Can you advice me how to uninstall the current ssh version and of course how to install with dnf ssh.
Best Regards.
myagfedora

Step 1: backup configs in /home (edit: try recreate them from scratch, i meant).

Your may try to reinstall stuff with:

dnf reinstall `dnf list --installed | grep ssh | awk '{print $1}'`

PS: this command above aren’t reinstalls the dependencies of the programs. Your may try to omit the | grep ssh for a full system reinstall. But today for my system it is “Total download size: 1.2 G