Something went wrong while setting up the ssh key pair for a new WP76xx module per the instructions at Login Authentication - Legato Docs. We got some error about a bad cipher after generating the keys, and are now getting the error firstname.lastname@example.org: Permission denied (publickey) when trying to login. Trying to recover the target by using the instructions at https://source.sierrawireless.com/resources/airprime/software/swiflash/#sthash.uVfepyV7.Qib3fBGQ.dpbs has no effect (even when we toggle the TP1 pin low). We seem completely locked out. Surely there’s some way to either factory reset these things or regain control in some other way? The cipher error message is below…
(lsh:wp76Profile1) dave-k@davek-HP-ProBook-640-G1:~/leafWS2$ configtargetssh
Generating new key pair…
Generating public/private rsa key pair.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /home/dave-k/.ssh/id_rsa.legatoTarget.
Your public key has been saved in /home/dave-k/.ssh/id_rsa.legatoTarget.pub.
The key fingerprint is:
SHA256:GR6BqeqbL9Du586Rpq3ObvlgwF40aRCinj8AhtwFrKw dave-k’s key for Legato target devices.
The key’s randomart image is:
|.oo… o. |
|= o.o o . |
|=o.* . o |
|=o+ o . + |
|o* o S |
|E.* . |
| =o++ |
| o*Bo. |
| =XXB |
Original contents retained as /home/dave-k/.ssh/known_hosts.old
Adding the target to the list of known hosts.
Connecting to the target… (ENTER TARGET’S ROOT PASSWORD WHENEVER PROMPTED FOR A PASSWORD)
(Just hit ENTER if your target doesn’t have a root password.)
/home/dave-k/.ssh/config line 10: Bad SSH2 cipher spec ‘aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc’.