Netgear WAX206 running 23.05 snapshot from yesterday (this commit IIRC).
Edit: confirming, it's r23288-476bf135fc
When in failsafe mode, something about the server's host key makes the SSH client (Fedora 38) unhappy:
$ ssh -v -o UserKnownHostsFile=/dev/null root@192.168.1.1
OpenSSH_9.0p1, OpenSSL 3.0.9 30 May 2023
debug1: Reading configuration data /home/d/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
debug1: configuration requests final Match pass
debug1: re-parsing configuration
debug1: Reading configuration data /home/d/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf
debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config
debug1: Connecting to 192.168.1.1 [192.168.1.1] port 22.
debug1: Connection established.
debug1: identity file /home/d/.ssh/id_rsa type -1
debug1: identity file /home/d/.ssh/id_rsa-cert type -1
debug1: identity file /home/d/.ssh/id_ecdsa type -1
debug1: identity file /home/d/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/d/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/d/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/d/.ssh/id_ed25519 type -1
debug1: identity file /home/d/.ssh/id_ed25519-cert type -1
debug1: identity file /home/d/.ssh/id_ed25519_sk type -1
debug1: identity file /home/d/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/d/.ssh/id_xmss type -1
debug1: identity file /home/d/.ssh/id_xmss-cert type -1
debug1: identity file /home/d/.ssh/id_dsa type -1
debug1: identity file /home/d/.ssh/id_dsa-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_9.0
debug1: Remote protocol version 2.0, remote software version dropbear
debug1: compat_banner: no match: dropbear
debug1: Authenticating to 192.168.1.1:22 as 'root'
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory
debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: algorithm: curve25519-sha256
debug1: kex: host key algorithm: rsa-sha2-256
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: kex: curve25519-sha256 need=64 dh_need=64
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: SSH2_MSG_KEX_ECDH_REPLY received
Bad server host key: Invalid key length
Note the -o UserKnownHostsFile=/dev/null
option, this isn't the client complaining about the host key "changing". It smells to me like the default host key is either completely invalid or falls foul of some of Fedora's (tightening with each release) default crypto policies.
In failsafe mode, shouldn't dropbear
default to some on-the-fly generated host key?
Any ideas how to tell ssh
"just accept any key/length for now"? I wasn't able to find any option to do that.
Failsafe is essentially inaccessible now that telnet
is no longer part of the failsafe config.