Public key not accepted via ProxyJump since 0.11.1

Hi,

After upgrading from 0.10.6 to 0.11.1 (both from Debian package), I can no longer login via public key when the connection is using a ProxyJump host. I can still login to the jump host (and other, unrelated, hosts) with the same key. Openssh has no problems in connecting.

I tried extracting a relevant part of the logs. Let me know if other parts are needed.

0.10.6:

[2024/09/16 17:37:08.516616, 4] agent_talk:  Request length: 1
[2024/09/16 17:37:08.516708, 4] agent_talk:  Response length: 733
[2024/09/16 17:37:08.516721, 1] ssh_agent_get_ident_count:  Answer type: 12, expected answer: 12
[2024/09/16 17:37:08.516728, 3] ssh_agent_get_ident_count:  Agent count: 4
[2024/09/16 17:37:08.516741, 3] ssh_userauth_agent:  Trying identity idkey_ed25519
[2024/09/16 17:37:08.516753, 3] ssh_key_algorithm_allowed:  Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa>
[2024/09/16 17:37:08.516793, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2024/09/16 17:37:08.516809, 4] ssh_socket_unbuffered_write:  wrote 148
[2024/09/16 17:37:08.516820, 3] packet_send2:  packet: wrote [type=50, len=128, padding_size=10, comp=117, payload=117]
[2024/09/16 17:37:08.516833, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLOUT ), out buffer 0
[2024/09/16 17:37:08.516843, 4] ssh_socket_pollcallback:  sending control flow event
[2024/09/16 17:37:08.516850, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2024/09/16 17:37:08.525687, 4] ssh_socket_pollcallback:  Poll callback on socket 4 (POLLIN ), out buffer 0
[2024/09/16 17:37:08.525703, 4] ssh_socket_unbuffered_read:  read 100
[2024/09/16 17:37:08.525714, 3] ssh_packet_socket_callback:  packet: read type 60 [len=80,padding=8,comp=71,payload=71]
[2024/09/16 17:37:08.525722, 3] ssh_packet_process:  Dispatching handler for packet type 60
[2024/09/16 17:37:08.525729, 4] ssh_packet_userauth_pk_ok:  Received SSH_USERAUTH_PK_OK/INFO_REQUEST/GSSAPI_RESPONSE
[2024/09/16 17:37:08.525737, 4] ssh_packet_userauth_pk_ok:  Assuming SSH_USERAUTH_PK_OK
[2024/09/16 17:37:08.525745, 3] ssh_userauth_agent:  Public key of idkey_ed25519 accepted by server
[2024/09/16 17:37:08.525754, 3] ssh_key_algorithm_allowed:  Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa>

0.11.1:

[2024/09/16 17:37:33.864118, 4] agent_talk:  Request length: 1
[2024/09/16 17:37:33.864248, 4] agent_talk:  Response length: 733
[2024/09/16 17:37:33.864267, 4] ssh_agent_get_ident_count:  Answer type: 12, expected answer: 12
[2024/09/16 17:37:33.864275, 3] ssh_agent_get_ident_count:  Agent count: 4
[2024/09/16 17:37:33.864283, 3] ssh_userauth_agent:  Trying identity idkey_ed25519
[2024/09/16 17:37:33.864290, 3] ssh_key_algorithm_allowed:  Checking ssh-ed25519 with list <ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa>
[2024/09/16 17:37:33.864314, 3] packet_send2:  packet: wrote [type=5, len=24, padding_size=6, comp=17, payload=17]
[2024/09/16 17:37:33.864321, 3] ssh_service_request:  Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth)
[2024/09/16 17:37:33.864329, 4] ssh_socket_pollcallback:  Poll callback on socket 5 (POLLOUT ), out buffer 44
[2024/09/16 17:37:33.864338, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2024/09/16 17:37:33.864344, 4] ssh_socket_unbuffered_write:  wrote 44
[2024/09/16 17:37:33.864351, 4] ssh_socket_pollcallback:  Poll callback on socket 5 (POLLOUT ), out buffer 0
[2024/09/16 17:37:33.864357, 4] ssh_socket_pollcallback:  sending control flow event
[2024/09/16 17:37:33.864363, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2024/09/16 17:37:33.917531, 4] ssh_socket_pollcallback:  Poll callback on socket 5 (POLLIN ), out buffer 0
[2024/09/16 17:37:33.917564, 4] ssh_socket_unbuffered_read:  read 44
[2024/09/16 17:37:33.917586, 3] ssh_packet_socket_callback:  packet: read type 6 [len=24,padding=6,comp=17,payload=17]
[2024/09/16 17:37:33.917595, 3] ssh_packet_process:  Dispatching handler for packet type 6
[2024/09/16 17:37:33.917604, 3] ssh_packet_service_accept:  Received SSH_MSG_SERVICE_ACCEPT
[2024/09/16 17:37:33.917616, 4] ssh_userauth_try_publickey:  Trying signature type ssh-ed25519
[2024/09/16 17:37:33.917651, 3] ssh_socket_unbuffered_write:  Enabling POLLOUT for socket
[2024/09/16 17:37:33.917665, 4] ssh_socket_unbuffered_write:  wrote 140
[2024/09/16 17:37:33.917673, 3] packet_send2:  packet: wrote [type=50, len=120, padding_size=8, comp=111, payload=111]
[2024/09/16 17:37:33.917684, 4] ssh_socket_pollcallback:  Poll callback on socket 5 (POLLOUT ), out buffer 0
[2024/09/16 17:37:33.917692, 4] ssh_socket_pollcallback:  sending control flow event
[2024/09/16 17:37:33.917700, 4] ssh_packet_socket_controlflow_callback:  sending channel_write_wontblock callback
[2024/09/16 17:37:33.932599, 4] ssh_socket_pollcallback:  Poll callback on socket 5 (POLLIN ), out buffer 0
[2024/09/16 17:37:33.932622, 4] ssh_socket_unbuffered_read:  read 52
[2024/09/16 17:37:33.932641, 3] ssh_packet_socket_callback:  packet: read type 51 [len=32,padding=7,comp=24,payload=24]
[2024/09/16 17:37:33.932650, 3] ssh_packet_process:  Dispatching handler for packet type 51
[2024/09/16 17:37:33.932660, 4] ssh_packet_userauth_failure:  Access denied for 'publickey'. Authentication that can continue: publickey,password
[2024/09/16 17:37:33.932670, 3] ssh_packet_userauth_failure:  Access denied for 'publickey'. Authentication that can continue: publickey,password
[2024/09/16 17:37:33.932680, 3] ssh_userauth_agent:  Public key of idkey_ed25519 refused by server
Assignee Loading
Time tracking Loading