baiglin opened a new issue, #531: URL: https://github.com/apache/mina-sshd/issues/531
### Version 2.11.0 ### Bug description Hi @tomaswolf , We ran into the following case which seems maybe a wrong handling on server side, but still Apache Mina client behavior seems not ok against that. The following is negotiated: Kex: encryption algorithms (server to client) = aes128-ctr Kex: compression algorithms (server to client) = none Kex: compression algorithms (client to server) = none Kex: mac algorithms (server to client) = hmac-sha2-256 Kex: encryption algorithms (client to server) = aes128-ctr Kex: kex algorithms = curve25519-sha256 Kex: server host key algorithms = ssh-rsa Kex: mac algorithms (client to server) = hmac-sha2-256 Still I can see in the logs: processAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection][publickey] SSH_MSG_USERAUTH_PK_OK type=rsa-sha2-512, fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE processAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection][publickey]: signing with algorithm rsa-sha2-512 Which ends in failure. If not mistaken from the code it seems in the process method we extract the key type from buffer response from server which seems wrong here .... But not sure... Then we try to use different algorithm: send SSH_MSG_USERAUTH_REQUEST request publickey type=**rsa-sha2-256** - fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE send SSH_MSG_USERAUTH_REQUEST request publickey type=**ssh-rsa** - fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE But still it fails and I do not see anymore the signing part done... I can successully connect howver forsing the server algorithm to ssh-rsa: `````java session.setSignatureFactoriesNameList("ssh-rsa"); ```` ### Actual behavior Fail to authenticate to server ### Expected behavior Use relevant algorithm ### Relevant log output ```Shell https://unified.loggingfacility.amadeus.com/#/log-viewer/search-id/890181042561045// 2024/07/16 05:36:14.003000 disapp04 DDS_UDD#0-0 APP WARNG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} Creating IoSession on /172.25.63.181:45916 from /10.243.2.50:6710 via null 2024/07/16 05:36:14.884000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} Client session created: Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710] 2024/07/16 05:36:14.886000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} ClientUserAuthService(ClientSessionImpl[null@/10.243.2.50:6710]) client methods: [publickey, keyboard-interactive, password] 2024/07/16 05:36:14.891000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.h.SessionTimeoutListener#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} sessionCreated(ClientSessionImpl[null@/10.243.2.50:6710]) tracking 2024/07/16 05:36:14.891000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} initializeProxyConnector(ClientSessionImpl[null@/10.243.2.50:6710]) no proxy to initialize 2024/07/16 05:36:14.895000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 28 bytes 2024/07/16 05:36:14.895000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} sendIdentification(ClientSessionImpl[null@/10.243.2.50:6710]): SSH-2.0-APACHE-SSHD-2.11.0 2024/07/16 05:36:14.897000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} sendKexInit(ClientSessionImpl[null@/10.243.2.50:6710]) Send SSH_MSG_KEXINIT 2024/07/16 05:36:14.905000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} encode(ClientSessionImpl[null@/10.243.2.50:6710]) packet #0 sending command=20[SSH_MSG_KEXINIT] len=1244 2024/07/16 05:36:14.905000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 1264 bytes 2024/07/16 05:36:14.908000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.SshClient#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} setupDefaultSessionIdentities(ClientSessionImpl[amadeus@/10.243.2.50:6710]) key identity provider override in session listener 2024/07/16 05:36:14.910000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.f.DefaultConnectFuture#0 TID#00000> genericLoop [http-nio-30200-exec-1] {CORR_ID=4c7cd49f-c625-4beb-86e0-949e8bc599c6} Connected to /10.243.2.50:6710 after 90437594 nanos 2024/07/16 05:36:14.912000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-3] {} doReadIdentification(ClientSessionImpl[amadeus@/10.243.2.50:6710]) line='SSH-2.0-XFB.Gateway Unix' 2024/07/16 05:36:14.912000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-3] {} readIdentification(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Server version string: SSH-2.0-XFB.Gateway Unix 2024/07/16 05:36:14.944000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #0 SSH_MSG_KEXINIT 2024/07/16 05:36:14.944000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} handleKexInit(ClientSessionImpl[amadeus@/10.243.2.50:6710]) SSH_MSG_KEXINIT 2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: encryption algorithms (server to client) = aes128-ctr 2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: compression algorithms (server to client) = none 2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: compression algorithms (client to server) = none 2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: mac algorithms (server to client) = hmac-sha2-256 2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: encryption algorithms (client to server) = aes128-ctr 2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: kex algorithms = curve25519-sha256 2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: server host key algorithms = ssh-rsa 2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: mac algorithms (client to server) = hmac-sha2-256 2024/07/16 05:36:14.973000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #1 sending command=30[30] len=37 2024/07/16 05:36:14.973000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 56 bytes 2024/07/16 05:36:14.973000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.k.DHGClient#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-4] {} init(DHGClient[curve25519-sha256])[ClientSessionImpl[amadeus@/10.243.2.50:6710]] Send SSH_MSG_KEXDH_INIT 2024/07/16 05:36:15.078000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.k.DHGClient#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} next(DHGClient[curve25519-sha256])[ClientSessionImpl[amadeus@/10.243.2.50:6710]] process command=SSH_MSG_KEXDH_REPLY 2024/07/16 05:36:15.078000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #1 31 2024/07/16 05:36:15.088000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} setServerKey(ClientSessionImpl[amadeus@/10.243.2.50:6710]) keyType=ssh-rsa, digest=SHA256:waSLHkyWs+zjqmZdDDRwgSnMedtiyfa6VuOHPGnlLbE 2024/07/16 05:36:15.088000 disapp01 DDS_UDD#0-0 APP WARN <o.a.s.c.k.AcceptAllServerKeyVerifier#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} Server at /10.243.2.50:6710 presented unverified RSA key: SHA256:waSLHkyWs+zjqmZdDDRwgSnMedtiyfa6VuOHPGnlLbE 2024/07/16 05:36:15.088000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} handleKexMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710])[curve25519-sha256] KEX processing complete after cmd=31 2024/07/16 05:36:15.089000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} sendNewKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Send SSH_MSG_NEWKEYS 2024/07/16 05:36:15.089000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} checkKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) key=ssh-rsa-SHA256:waSLHkyWs+zjqmZdDDRwgSnMedtiyfa6VuOHPGnlLbE, verified=true 2024/07/16 05:36:15.089000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} prepareNewKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) session ID=df:c2:4d:c0:cb:51:e5:c5:14:96:6a:b8:9e:6e:91:9e:49:73:8a:bd:00:61:02:57:fa:09:f3:91:25:92:25:05 2024/07/16 05:36:15.098000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #2 sending command=21[SSH_MSG_NEWKEYS] len=1 2024/07/16 05:36:15.098000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 16 bytes 2024/07/16 05:36:15.122000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} setOutputEncoding(ClientSessionImpl[amadeus@/10.243.2.50:6710]): cipher BaseCipher[AES, ivSize=16, kdfSize=16,AES/CTR/NoPadding, blkSize=16]; mac BaseMac[HmacSHA256] - block=32/32 bytes, encrypt-then-mac=false; compression none[Deflater/-1]; blocks limit 134217728 2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} sendInitialServiceRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Send SSH_MSG_SERVICE_REQUEST for ssh-userauth 2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 80 bytes 2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #3 sending command=5[SSH_MSG_SERVICE_REQUEST] len=17 2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} handleNewKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) SSH_MSG_NEWKEYS command=SSH_MSG_NEWKEYS 2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} setInputEncoding(ClientSessionImpl[amadeus@/10.243.2.50:6710]): cipher BaseCipher[AES, ivSize=16, kdfSize=16,AES/CTR/NoPadding, blkSize=16]; mac BaseMac[HmacSHA256] - block=32/32 bytes, encrypt-then-mac=false; compression none[Inflater/-1]; blocks limit 4294967296 2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #2 SSH_MSG_NEWKEYS 2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} handleNewKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) No pending packets to flush at end of KEX 2024/07/16 05:36:15.125000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 96 bytes 2024/07/16 05:36:15.125000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} auth(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] send SSH_MSG_USERAUTH_REQUEST for 'none' 2024/07/16 05:36:15.125000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-5] {} encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #4 sending command=50[SSH_MSG_USERAUTH_REQUEST] len=38 2024/07/16 05:36:15.230000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} handleServiceAccept(ClientSessionImpl[amadeus@/10.243.2.50:6710]) SSH_MSG_SERVICE_ACCEPT service=ssh-userauth 2024/07/16 05:36:15.230000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #4 SSH_MSG_USERAUTH_FAILURE 2024/07/16 05:36:15.230000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #3 SSH_MSG_SERVICE_ACCEPT 2024/07/16 05:36:15.231000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) attempting method=publickey 2024/07/16 05:36:15.231000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) starting authentication mechanisms: client=[publickey, keyboard-interactive, password], server=[password, publickey] 2024/07/16 05:36:15.231000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Received SSH_MSG_USERAUTH_FAILURE - partial=false, methods=password,publickey 2024/07/16 05:36:15.237000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} sendAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] send SSH_MSG_USERAUTH_REQUEST request publickey type=rsa-sha2-512 - fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE 2024/07/16 05:36:15.237000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #5 sending command=50[SSH_MSG_USERAUTH_REQUEST] len=341 2024/07/16 05:36:15.237000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 400 bytes 2024/07/16 05:36:15.238000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-6] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) successfully processed initial buffer by method=publickey 2024/07/16 05:36:15.284000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-7] {} processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) delegate processing of 60 to publickey 2024/07/16 05:36:15.284000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-7] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #5 60 2024/07/16 05:36:15.285000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-7] {} processAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection][publickey]: signing with algorithm rsa-sha2-512 2024/07/16 05:36:15.285000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-7] {} processAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection][publickey] SSH_MSG_USERAUTH_PK_OK type=rsa-sha2-512, fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE 2024/07/16 05:36:15.295000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-7] {} encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #6 sending command=50[SSH_MSG_USERAUTH_REQUEST] len=621 2024/07/16 05:36:15.296000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-7] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 688 bytes 2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-8] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #6 SSH_MSG_USERAUTH_FAILURE 2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-8] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 400 bytes 2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-8] {} encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #7 sending command=50[SSH_MSG_USERAUTH_REQUEST] len=341 2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-8] {} processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Received SSH_MSG_USERAUTH_FAILURE - partial=false, methods=password 2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-8] {} sendAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] send SSH_MSG_USERAUTH_REQUEST request publickey type=rsa-sha2-256 - fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE 2024/07/16 05:36:15.345000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-8] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) successfully processed initial buffer by method=publickey 2024/07/16 05:36:15.391000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-9] {} processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Received SSH_MSG_USERAUTH_FAILURE - partial=false, methods=password 2024/07/16 05:36:15.391000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-9] {} sendAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] send SSH_MSG_USERAUTH_REQUEST request publickey type=ssh-rsa - fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE 2024/07/16 05:36:15.391000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-9] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #7 SSH_MSG_USERAUTH_FAILURE 2024/07/16 05:36:15.392000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-9] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) successfully processed initial buffer by method=publickey 2024/07/16 05:36:15.392000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-9] {} encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #8 sending command=50[SSH_MSG_USERAUTH_REQUEST] len=336 2024/07/16 05:36:15.392000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-9] {} writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]) writing 400 bytes 2024/07/16 05:36:15.413000 disapp01 DDS_UDD#0-0 APP WARN <o.a.s.c.k.AcceptAllServerKeyVerifier#0 TID#00000> DDPLoop [sshd-SshClient[1a99744a]-nio2-thread-20] {} Server at /192.102.253.24:22 presented unverified EC key: SHA256:8moyEtOP764Y8jU+oUT9zZ65DbIqcm4iCCv/i5vL9AY 2024/07/16 05:36:15.438000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Received SSH_MSG_USERAUTH_FAILURE - partial=false, methods=password 2024/07/16 05:36:15.438000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #8 SSH_MSG_USERAUTH_FAILURE 2024/07/16 05:36:15.439000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} resolveAttemptedPublicKeyIdentity(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] no more keys to send 2024/07/16 05:36:15.439000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} destroy(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] 2024/07/16 05:36:15.439000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) no initial request sent by method=publickey 2024/07/16 05:36:15.440000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) attempting method=password 2024/07/16 05:36:15.441000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPassword#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} resolveAttemptedPassword(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] no more passwords to send 2024/07/16 05:36:15.442000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) no initial request sent by method=password 2024/07/16 05:36:15.442000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) exhausted all methods - client=[publickey, keyboard-interactive, password], server=[password, publickey] 2024/07/16 05:36:15.442000 disapp01 DDS_UDD#0-0 APP DEBUG <o.a.s.c.a.p.UserAuthPassword#0 TID#00000> genericLoop [sshd-SshClient[36ae17ef]-nio2-thread-10] {} destroy(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] 2024/07/16 05:36:15.443000 disapp01 DDS_UDD#0-0 APP WARN ``` ### Other information _No response_ -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org