[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2020-08-27 Thread Aruna Potti (Jira)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17186067#comment-17186067
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein]  Does fix for SSHD-492 work for this issue as well to remove 
padded zeros with DSA/RSA keys.

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2019-06-25 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872622#comment-16872622
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein] Sorry I was not able to attach the screen shot. I was referring 
about below keep-alive machanisms, 

[https://github.com/apache/mina-sshd/blob/master/docs/client-setup.md]

 
 * Sending {{SSH_MSG_IGNORE}} messages every once in a while.

This mechanism is along the lines of [PUTTY null packets 
configuration|https://patrickmn.com/aside/how-to-keep-alive-ssh-sessions/]. It 
generates small 
[{{SSH_MSG_IGNORE}}|https://tools.ietf.org/html/rfc4253#section-11.2] messages. 
The way to set this mechanism up is via the {{setSessionHeartbeat}} API.

_Note:_ the same effect can also be achieved by setting the relevant properties 
documented in {{SessionHeartbeatController}}, but it is highly recommended to 
use the API - unless one needs to control these properties *externally* via 
{{-Dxxx}} JVM options.

 * Sending {{keepalive@...}} [global 
requests|https://tools.ietf.org/html/rfc4254#section-4].

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2019-06-25 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872619#comment-16872619
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein] I am currently using 0.14.0 version and I do not see below 
keep-alive options in this version. When did you support them?

For 0.14.0, do you have any client side keep-alive support to the server, 
especially SSH based keep-alives?

 

!image-2019-06-25-11-44-02-741.png!

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-185) Support client heartbeat to keep the connection alive

2019-06-25 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-185?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872434#comment-16872434
 ] 

Aruna Potti commented on SSHD-185:
--

Hi Goldstein,

Which version of MINA has this fix.

Thanks,

> Support client heartbeat to keep the connection alive
> -
>
> Key: SSHD-185
> URL: https://issues.apache.org/jira/browse/SSHD-185
> Project: MINA SSHD
>  Issue Type: New Feature
>Reporter: Guillaume Nodet
>Assignee: Guillaume Nodet
>Priority: Major
> Fix For: 0.8.0
>
>




--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2019-06-24 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16871856#comment-16871856
 ] 

Aruna Potti commented on SSHD-869:
--

Hi Goldstein ,

If I enable OpenSSH related "ServerKeepAliveInterval"(SSH) on Linux and if
my apache mina based SSH client is running on this Linux box, can MINA
recognize those keepalives and disconnect mina socket/channel if these
keepalives fail and close the socket?

Thanks,
Aruna.


> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-30 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16705241#comment-16705241
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein] :(Our product really does not use MINA directly, we use Open 
Daylight and it has dependency on MINA. Some how Open Daylight latest version 
also not using 2.1.0 or any other MINA latest versions. I am not sure why they 
are not upgrading their MINA version. So we are stuck with your 0.14.0 version. 
We really need  a work around like if there is way to fix the sshkeys with 
leading zeros? or any other standard way of generating ssh keys that would not 
use leading zeros to fill the bytes.

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-29 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16703783#comment-16703783
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein] Is there any way to correct the issue manually if I have access 
to the SSHKeys with leading zeros problem. 

 

018-11-16 10:45:43,618 | Received packet #3: 21 00 00 01 b1 00 00 00 07 73 73 
68 2d 64 73 73 00 00 00 81 00 a8 b5 50 09 ab 14 4b 2d f9 10 96 f5 98 ba 47 e1 
f1 6f 3f 3a 30 eb f5 8c bc b9 c6 49 0f 03 c4 b7 b9 e6 57 8a 88 18 c4 22 fd c2 
ca 85 a1 70 ee ae be b3 b4 0e fa 84 4a 75 33 40 8a cc a1 86 33 1d d8 ab 79 46 
a4 f3 c2 b7 b5 cc 41 8f 6e 46 be 75 2b f2 63 a1 f3 22 d1 0b f4 ba 44 be c1 bd 
aa bb 9f 50 1f eb 9e ef 76 95 59 18 cc 78 ed e5 c9 82 46 f3 05 56 c5 46 e6 f4 
d3 05 79 67 31 5f 5d e3 00 00 00 15 00 84 fe 2b 6a d4 c2 d2 31 7a 9d 00 55 a8 
ac 6a 4e e6 78 69 77 00 00 00 80 17 75 cc d0 68 af c8 a0 10 b4 0f 96 db 25 32 
e3 00 f1 b2 ac c3 48 28 fb 16 66 ce c3 1a f9 9e a9 3e b7 27 56 97 63 bb 26 4d 
b9 18 97 63 cc 47 45 13 f2 fe b6 3b 9b 2b 37 29 e7 64 39 b7 95 91 d9 f0 6d 90 
17 c1 90 ff 47 2d c2 ac 2e 9c c7 f5 05 fa f0 1c 84 86 d3 e0 ad 73 c3 50 8c dc 
2e 36 cc 0d 7a be e2 b2 58 62 06 cb 14 f2 bc 22 04 3d 5c 27 e4 de a7 f0 13 dd 
49 1b 4a 2d 4a f7 72 52 62 00 00 00 80 36 b6 53 71 f5 15 82 55 bb 0b 43 a1 da 
98 73 9f 47 d8 52 d9 0f d8 2d f6 e2 9d f6 8b d1 73 51 2a ef 87 7f 75 35 d6 28 
53 fb a5 2f 9a 23 4d d7 c1 9a f0 9c a6 57 bf 64 11 bb ec 72 c5 7c cf b9 ae 0d 
05 a7 11 83 90 15 d2 7c ad 9e dc 7a 4e 10 6d 94 8e f1 f0 af d8 1a ab 33 f5 26 
d3 a8 87 f7 a4 fe 99 2d bb 35 10 70 e6 c2 54 f9 44 84 46 7c 06 14 f8 4e 5d 25 
e1 0c 38 18 de 0f 1f fa bf 90 30 00 00 02 01 00 9b 69 e7 43 dc 54 09 67 01 67 
10 31 b5 d7 32 9b 38 83 b0 b7 13 e9 a8 d2 5e f7 9f ce 02 5a e9 51 35 af 09 22 
c3 01 57 d8 7a eb 14 3d 8d f7 c4 87 b8 96 d3 b3 0f fa 11 77 71 47 18 0c 80 04 
9e af f8 21 65 fa 83 00 d9 d5 19 21 6e 36 f2 39 6f db d8 de bb 35 7c 74 ef 0a 
8e 6c a3 7e b2 fe 94 eb f3 09 b2 d2 e9 b2 7e 41 2c 84 fd e7 9d 1f ca 99 e8 64 
1b 36 da 74 99 a3 91 c9 a2 a3 37 c4 b5 74 fc c5 06 b7 2b 09 0e 88 a9 38 bd 8b 
0a 0b 57 47 e8 af b4 bc 08 40 e3 35 95 42 c8 cc 88 17 b9 af 08 54 2b 90 af 5b 
2d 29 16 ce 23 a9 68 9c a5 d6 8e ae d5 2b 60 5d 68 e0 df ad 7f 7c f0 0b a3 37 
23 96 35 26 bf 92 f3 48 b7 59 7a 65 59 ac 41 3f 0a c3 29 54 f6 77 ff b0 cd e9 
3c 14 cc ed a4 83 20 eb 02 99 44 b5 5b d2 e2 0d b8 d1 fa e5 5e 77 d3 b8 a3 e4 
e4 2f 13 15 c3 ff 7e 06 d6 b8 6c 3b 33 e4 37 c1 c7 30 9e 04 2a 6a 2a 13 da 97 
b1 ba 09 11 89 02 57 c0 cc 37 ff 42 28 24 c4 a9 7f 66 51 2f 1d 9a 74 77 c6 16 
ba ea 0b 1a 3f 00 14 b2 a5 37 e5 28 58 25 0a 91 b9 cc 8c 31 83 a4 74 9b 1e 54 
e9 06 31 8a f6 e0 cc 74 11 33 0a 49 47 7c 4e 85 7f a9 ca 5e c7 53 be 45 7f a4 
95 ad eb 7c 24 39 6a ea 2e 9e 71 f1 b3 34 71 73 df 19 56 f9 5a 53 6d 4d 3a 54 
03 d2 35 20 ba 01 01 4f f2 9d 23 8f 33 20 6a dc c4 04 8d cb bd bb 0d 99 4d 70 
70 77 11 06 da c2 b4 1a 19 a4 ba aa 13 63 28 32 78 54 eb 8a d5 5d 8a 4c dc 20 
7c d0 3c 1e 5a 28 b6 8c 49 6e ac 46 20 81 1e af 1c d9 6b 23 fa c1 38 8d db 49 
73 26 ab 5b 66 3b b7 68 c4 93 78 66 fa 2c 39 6c 72 f9 4c 8e e3 ed 2c 4f a2 c0 
49 43 36 1e d2 48 31 f8 28 97 dd 96 20 73 53 37 0e 4f 8e e2 7c a0 01 bc 4c e6 
ee 97 5a 09 54 38 89 98 00 00 00 37 00 00 00 07 73 73 68 2d 64 73 73 00 00 00 
28 00 6d 1f 26 a7 fa 92 e0 27 cb b8 a5 22 a4 91 6d 43 86 81 45 82 eb ea 8b e2 
f0 76 dc 7c fc 08 8d bc f6 d4 48 ab 2d 54 a8
2018-11-16 10:45:43,618 | Received SSH_MSG_KEX_DH_GEX_REPLY
2018-11-16 10:45:43,780 | Caught exception, now calling handler
2018-11-16 10:45:43,780 | Exception caught
java.security.SignatureException: error decoding signature bytes.
    at 
org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown 
Source)[bcprov-jdk15on-1.59.jar:1.59.0]
    at 
java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
    at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
    at 
org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd

[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-20 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16694284#comment-16694284
 ] 

Aruna Potti commented on SSHD-869:
--

Thank you for the response.
But I see exception is coming from bouncy castle, not from your code.




> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-20 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16693928#comment-16693928
 ] 

Aruna Potti commented on SSHD-869:
--

Hi,

Can you let me know what is the issue here?. Is it mina issue or keys are
malformed?

Thanks,
Aruna.




> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Created] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-19 Thread Aruna Potti (JIRA)
Aruna Potti created SSHD-869:


 Summary: java.security.SignatureException: error decoding 
signature bytes.
 Key: SSHD-869
 URL: https://issues.apache.org/jira/browse/SSHD-869
 Project: MINA SSHD
  Issue Type: Bug
Affects Versions: 0.14.0
Reporter: Aruna Potti


Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
version as I can not upgrade the version in my product.

 

Exception caught
java.security.SignatureException: error decoding signature bytes.
    at 
org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown 
Source)[bcprov-jdk15on-1.59.jar:1.59.0]
    at 
java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
    at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
    at 
org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
    at java.security.AccessController.doPrivileged(Native Method)[:1.8.0_66]
    at 
org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
    at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
    at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
    at 
sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
    at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
    at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
    at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)