Seems like a cipher problem on the RouterOS side.
Code: Select all
[admin@MikroTik] > /sys ssh 10.20.2.8
DH_compute_key failed err: error:05066066:lib(5):func(102):reason(102)
[Ticket#2014012866000869]
Mikrotik Team ?
[admin@MikroTik] > /sys ssh 10.20.2.8
DH_compute_key failed err: error:05066066:lib(5):func(102):reason(102)
Mikrotik ?UBNT has upgraded dropbear from used v0.51 to v2013.59 version. Here is dropbear change log (https://matt.ucc.asn.au/dropbear/CHANGES). Do you think newer dropbear version started to use weaker keys to "increase" security level?
One of the lines say that blowfish is disabled by default. Is it what RouterOS is using?
Thanks!
Firmware Version: XW.v5.5.6
Build Number: 18861
Dropbear server v2013.58