Same problem here. MTU of the server is 1500, changing client MTU to the same value doesn't fix it. Testing with ping, 1300 byte pings make it through fine, so tried setting client MTU to that on both client and server. No dice. Server version is OpenSSH_5.9p1 Debian-5ubuntu1.4, OpenSSL 1.0.1 14 Mar 2012. A client running OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013 can connect. A client running OpenSSH_6.6.1p1 Ubuntu-2ubuntu2, OpenSSL 1.0.1f 6 Jan 2014 *cannot* connect. Successful connection: % ssh -vv [redacted] OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug2: ssh_connect: needpriv 0 debug1: Connecting to [redacted] port 22. debug1: Connection established. debug1: identity file /home/meta/.ssh/identity type -1 debug1: identity file /home/meta/.ssh/identity-cert type -1 debug1: identity file /home/meta/.ssh/id_rsa type -1 debug1: identity file /home/meta/.ssh/id_rsa-cert type -1 debug1: identity file /home/meta/.ssh/id_dsa type -1 debug1: identity file /home/meta/.ssh/id_dsa-cert type -1 debug1: Remote protocol version 2.0, remote software version OpenSSH_5.9p1 Debian-5ubuntu1.4 debug1: match: OpenSSH_5.9p1 Debian-5ubuntu1.4 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.3 debug2: fd 3 setting O_NONBLOCK debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: