Initial Setup:
- Setup ssh keys and disable passwords-based authentication via ssh (the most secure)
Instead option 3, I choose option 1.
I try to follow the given procedure as below,
configtargetssh 192.168.2.2
Generating new key pair…
Generating public/private rsa key pair.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/mangoh/.ssh/id_rsa.legatoTarget.
Your public key has been saved in /home/mangoh/.ssh/id_rsa.legatoTarget.pub.
The key fingerprint is:
SHA256:xPpvnp9qkqaX0skd2ONVS/zoUUCC20gnib8kV3an8QE mangoh’s key for Legato target devices.
The key’s randomart image is:
±–[RSA 4096]----+
| . o.Eo |
| … = +.+…|
| oo O o .|
| o. * . = o|
| . S . o = |
| … = . + .|
| o.* + . . |
| . X.=. … |
| .= ==oo |
±—[SHA256]-----+
Host 192.168.2.2 not found in /home/mangoh/.ssh/known_hosts
Adding the target to the list of known hosts.
192.168.2.2:22 SSH-2.0-dropbear_2017.75
Connecting to the target… (ENTER TARGET’S ROOT PASSWORD WHENEVER PROMPTED FOR A PASSWORD)
(Just hit ENTER if your target doesn’t have a root password.)
/home/mangoh/.ssh/config line 5: Bad SSH2 cipher spec ‘aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc’.
When i am entering
ssh root@192.168.2.2
I am getting like this
/home/mangoh/.ssh/config line 5: Bad SSH2 cipher spec ‘aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc’.
Please help me to resolve the problem…