Invalid Host Key - Can't Connect To SFTP

I am trying to connect to an SFTP site.  Using the latest version of SmartFTP client (6.0.2147.0) I get the first set of log information and a failure to connect.  However, if, on another computer, I use a slightly older version of SmartFTP (6.0.2058.0 - second set of logs) or even FileZilla, I can connect to the exact same server correctly.
 
I have tried every setting I could find and nothing allows me to connect with the latest version of SmartFTP.  Does anyone have any ideas on what to do?
 
 
[09:41:08] 2>SSH protocol version reply. Client Id: SSH-2.0-SmartFTP
[09:41:08] 2>SSH-2.0-6.4.9.66 SSH Tectia Server
[09:41:08] 2>Starting SSH session. Remote Id: "SSH-2.0-6.4.9.66 SSH Tectia Server"
[09:41:08] 2>Server Algorithm Suite
             Key Exchange: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group14-sha256@ssh.com,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256
             Server Host Key: ssh-dss,ssh-dss-sha256@ssh.com
             Client to Server Encryption: aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc,seed-cbc@ssh.com,crypticore128@ssh.com
             Server to Client Encryption: aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc,seed-cbc@ssh.com,crypticore128@ssh.com
             Client to Server HMAC: hmac-sha1,hmac-md5,crypticore-mac@ssh.com
             Server to Client HMAC: hmac-sha1,hmac-md5,crypticore-mac@ssh.com
             Client to Server Compression: none,zlib
             Server to Client Compression: none,zlib
[09:41:08] 2>Selected Algorithm Suite
             Key Exchange: diffie-hellman-group-exchange-sha256
             Server Host Key: ssh-dss-sha256@ssh.com
             Client to Server Encryption: aes128-cbc
             Server to Client Encryption: aes128-cbc
             Client to Server HMAC: hmac-sha1
             Server to Client HMAC: hmac-sha1
             Client to Server Compression: zlib
             Server to Client Compression: zlib
[09:41:08] 2>Client Algorithm Suite
             Key Exchange: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
             Server Host Key: ssh-ed25519,x509v3-ecdsa-sha2-nistp256,x509v3-ecdsa-sha2-nistp384,x509v3-ecdsa-sha2-nistp521,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,x509v3-rsa2048-sha256,x509v3-sign-rsa,x509v3-sign-dss,x509v3-sign-rsa-sha256@ssh.com,x509v3-sign-dss-sha256@ssh.com,ssh-rsa-sha256@ssh.com,ssh-dss-sha256@ssh.com,ssh-rsa,ssh-dss
             Client to Server Encryption: aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
             Server to Client Encryption: aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc
             Client to Server HMAC: hmac-sha1,hmac-md5,hmac-sha2-256,hmac-sha2-512
             Server to Client HMAC: hmac-sha1,hmac-md5,hmac-sha2-256,hmac-sha2-512
             Client to Server Compression: zlib@openssh.com,zlib,none
             Server to Client Compression: zlib@openssh.com,zlib,none
[09:41:08] 2>Key Exchange Algorithm: diffie-hellman-group-exchange-sha256
[09:41:09] 2>Invalid host key.
[09:41:09] 2>Client closed the connection.
 
 
 
 
[09:41:38] 1>SSH protocol version reply. Client Id: SSH-2.0-SmartFTP
[09:41:38] 1>SSH-2.0-6.4.9.66 SSH Tectia Server
[09:41:38] 1>Starting SSH session. Remote Id: "SSH-2.0-6.4.9.66 SSH Tectia Server"
[09:41:38] 1>Server Algorithm Suite
             Key Exchange: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group14-sha256@ssh.com,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256
             Server Host Key: ssh-dss,ssh-dss-sha256@ssh.com
             Client to Server Encryption: aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc,seed-cbc@ssh.com,crypticore128@ssh.com
             Server to Client Encryption: aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc,seed-cbc@ssh.com,crypticore128@ssh.com
             Client to Server HMAC: hmac-sha1,hmac-md5,crypticore-mac@ssh.com
             Server to Client HMAC: hmac-sha1,hmac-md5,crypticore-mac@ssh.com
             Client to Server Compression: none,zlib
             Server to Client Compression: none,zlib
[09:41:38] 1>Selected Algorithm Suite
             Key Exchange: diffie-hellman-group-exchange-sha256
             Server Host Key: ssh-dss
             Client to Server Encryption: aes128-cbc
             Server to Client Encryption: aes128-cbc
             Client to Server HMAC: hmac-sha1
             Server to Client HMAC: hmac-sha1
             Client to Server Compression: zlib
             Server to Client Compression: zlib
[09:41:38] 1>Client Algorithm Suite
             Key Exchange: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,rsa1024-sha1
             Server Host Key: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,x509v3-sign-rsa-sha1,x509v3-sign-dss-sha1,ssh-rsa,ssh-dss
             Client to Server Encryption: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,rijndael128-cbc,aes192-cbc,rijndael192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,rijndael256-cbc,3des-cbc,arcfour,blowfish-cbc,cast128-cbc
             Server to Client Encryption: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,rijndael128-cbc,aes192-cbc,rijndael192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,rijndael256-cbc,3des-cbc,arcfour,blowfish-cbc,cast128-cbc
             Client to Server HMAC: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5,umac-64@openssh.com,hmac-ripemd160
             Server to Client HMAC: hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5,umac-64@openssh.com,hmac-ripemd160
             Client to Server Compression: zlib@openssh.com,zlib,none
             Server to Client Compression: zlib@openssh.com,zlib,none
[09:41:38] 1>Key Exchange Algorithm: diffie-hellman-group-exchange-sha256
[09:41:39] 1>Server "ssh-dss" host key fingerprint: 4A:05:C8:20:FD:34:57:A6:B8:C4:BC:A4:58:BF:D6:7E
[09:41:39] 1>Key exchange completed.
[09:41:39] 1>Requesting service "ssh-userauth".
[09:41:39] 1>RTT: 11.587 ms
[09:41:39] 1>Authentication request. Method: none
[09:41:39] 1>Server supported authentications: password,publickey,keyboard-interactive
[09:41:39] 1>Authentication request. Method: password
[09:41:39] 1>User authentication successful.
[09:41:39] 1>SSH session established.
[09:41:39] 1>Detected Server Software: SSH Communications Security Tectia Server
[09:41:39] 1>Opening channel 0.
[09:41:39] 1>Channel successfully opened (Local=0, Remote=0).
[09:41:39] 1>Requesting subsystem "sftp" (Local=0, Remote=0).
[09:41:39] 1>Sending FXP initialization. Protocol version=6.
[09:41:39] 1>SFTP protocol version 3
[09:41:39] 1>Resolving path "/".
[09:41:39] 1>Path successfully resolved to "/".
[09:41:39] 1>Reading directory "/".
[09:41:39] 1>100429 bytes transferred. (1.22 MB/s) (78 ms)
[09:41:39] 1>Closing file handle.
[09:41:39] 1>Directory listing complete.
 

We have contacted you through email.