[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17186067#comment-17186067 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] Does fix for SSHD-492 work for this issue as well to remove padded zeros with DSA/RSA keys. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872622#comment-16872622 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] Sorry I was not able to attach the screen shot. I was referring about below keep-alive machanisms, [https://github.com/apache/mina-sshd/blob/master/docs/client-setup.md] * Sending {{SSH_MSG_IGNORE}} messages every once in a while. This mechanism is along the lines of [PUTTY null packets configuration|https://patrickmn.com/aside/how-to-keep-alive-ssh-sessions/]. It generates small [{{SSH_MSG_IGNORE}}|https://tools.ietf.org/html/rfc4253#section-11.2] messages. The way to set this mechanism up is via the {{setSessionHeartbeat}} API. _Note:_ the same effect can also be achieved by setting the relevant properties documented in {{SessionHeartbeatController}}, but it is highly recommended to use the API - unless one needs to control these properties *externally* via {{-Dxxx}} JVM options. * Sending {{keepalive@...}} [global requests|https://tools.ietf.org/html/rfc4254#section-4]. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872619#comment-16872619 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] I am currently using 0.14.0 version and I do not see below keep-alive options in this version. When did you support them? For 0.14.0, do you have any client side keep-alive support to the server, especially SSH based keep-alives? !image-2019-06-25-11-44-02-741.png! > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-185) Support client heartbeat to keep the connection alive
[ https://issues.apache.org/jira/browse/SSHD-185?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872434#comment-16872434 ] Aruna Potti commented on SSHD-185: -- Hi Goldstein, Which version of MINA has this fix. Thanks, > Support client heartbeat to keep the connection alive > - > > Key: SSHD-185 > URL: https://issues.apache.org/jira/browse/SSHD-185 > Project: MINA SSHD > Issue Type: New Feature >Reporter: Guillaume Nodet >Assignee: Guillaume Nodet >Priority: Major > Fix For: 0.8.0 > > -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16871856#comment-16871856 ] Aruna Potti commented on SSHD-869: -- Hi Goldstein , If I enable OpenSSH related "ServerKeepAliveInterval"(SSH) on Linux and if my apache mina based SSH client is running on this Linux box, can MINA recognize those keepalives and disconnect mina socket/channel if these keepalives fail and close the socket? Thanks, Aruna. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16705241#comment-16705241 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] :(Our product really does not use MINA directly, we use Open Daylight and it has dependency on MINA. Some how Open Daylight latest version also not using 2.1.0 or any other MINA latest versions. I am not sure why they are not upgrading their MINA version. So we are stuck with your 0.14.0 version. We really need a work around like if there is way to fix the sshkeys with leading zeros? or any other standard way of generating ssh keys that would not use leading zeros to fill the bytes. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16703783#comment-16703783 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] Is there any way to correct the issue manually if I have access to the SSHKeys with leading zeros problem. 018-11-16 10:45:43,618 | Received packet #3: 21 00 00 01 b1 00 00 00 07 73 73 68 2d 64 73 73 00 00 00 81 00 a8 b5 50 09 ab 14 4b 2d f9 10 96 f5 98 ba 47 e1 f1 6f 3f 3a 30 eb f5 8c bc b9 c6 49 0f 03 c4 b7 b9 e6 57 8a 88 18 c4 22 fd c2 ca 85 a1 70 ee ae be b3 b4 0e fa 84 4a 75 33 40 8a cc a1 86 33 1d d8 ab 79 46 a4 f3 c2 b7 b5 cc 41 8f 6e 46 be 75 2b f2 63 a1 f3 22 d1 0b f4 ba 44 be c1 bd aa bb 9f 50 1f eb 9e ef 76 95 59 18 cc 78 ed e5 c9 82 46 f3 05 56 c5 46 e6 f4 d3 05 79 67 31 5f 5d e3 00 00 00 15 00 84 fe 2b 6a d4 c2 d2 31 7a 9d 00 55 a8 ac 6a 4e e6 78 69 77 00 00 00 80 17 75 cc d0 68 af c8 a0 10 b4 0f 96 db 25 32 e3 00 f1 b2 ac c3 48 28 fb 16 66 ce c3 1a f9 9e a9 3e b7 27 56 97 63 bb 26 4d b9 18 97 63 cc 47 45 13 f2 fe b6 3b 9b 2b 37 29 e7 64 39 b7 95 91 d9 f0 6d 90 17 c1 90 ff 47 2d c2 ac 2e 9c c7 f5 05 fa f0 1c 84 86 d3 e0 ad 73 c3 50 8c dc 2e 36 cc 0d 7a be e2 b2 58 62 06 cb 14 f2 bc 22 04 3d 5c 27 e4 de a7 f0 13 dd 49 1b 4a 2d 4a f7 72 52 62 00 00 00 80 36 b6 53 71 f5 15 82 55 bb 0b 43 a1 da 98 73 9f 47 d8 52 d9 0f d8 2d f6 e2 9d f6 8b d1 73 51 2a ef 87 7f 75 35 d6 28 53 fb a5 2f 9a 23 4d d7 c1 9a f0 9c a6 57 bf 64 11 bb ec 72 c5 7c cf b9 ae 0d 05 a7 11 83 90 15 d2 7c ad 9e dc 7a 4e 10 6d 94 8e f1 f0 af d8 1a ab 33 f5 26 d3 a8 87 f7 a4 fe 99 2d bb 35 10 70 e6 c2 54 f9 44 84 46 7c 06 14 f8 4e 5d 25 e1 0c 38 18 de 0f 1f fa bf 90 30 00 00 02 01 00 9b 69 e7 43 dc 54 09 67 01 67 10 31 b5 d7 32 9b 38 83 b0 b7 13 e9 a8 d2 5e f7 9f ce 02 5a e9 51 35 af 09 22 c3 01 57 d8 7a eb 14 3d 8d f7 c4 87 b8 96 d3 b3 0f fa 11 77 71 47 18 0c 80 04 9e af f8 21 65 fa 83 00 d9 d5 19 21 6e 36 f2 39 6f db d8 de bb 35 7c 74 ef 0a 8e 6c a3 7e b2 fe 94 eb f3 09 b2 d2 e9 b2 7e 41 2c 84 fd e7 9d 1f ca 99 e8 64 1b 36 da 74 99 a3 91 c9 a2 a3 37 c4 b5 74 fc c5 06 b7 2b 09 0e 88 a9 38 bd 8b 0a 0b 57 47 e8 af b4 bc 08 40 e3 35 95 42 c8 cc 88 17 b9 af 08 54 2b 90 af 5b 2d 29 16 ce 23 a9 68 9c a5 d6 8e ae d5 2b 60 5d 68 e0 df ad 7f 7c f0 0b a3 37 23 96 35 26 bf 92 f3 48 b7 59 7a 65 59 ac 41 3f 0a c3 29 54 f6 77 ff b0 cd e9 3c 14 cc ed a4 83 20 eb 02 99 44 b5 5b d2 e2 0d b8 d1 fa e5 5e 77 d3 b8 a3 e4 e4 2f 13 15 c3 ff 7e 06 d6 b8 6c 3b 33 e4 37 c1 c7 30 9e 04 2a 6a 2a 13 da 97 b1 ba 09 11 89 02 57 c0 cc 37 ff 42 28 24 c4 a9 7f 66 51 2f 1d 9a 74 77 c6 16 ba ea 0b 1a 3f 00 14 b2 a5 37 e5 28 58 25 0a 91 b9 cc 8c 31 83 a4 74 9b 1e 54 e9 06 31 8a f6 e0 cc 74 11 33 0a 49 47 7c 4e 85 7f a9 ca 5e c7 53 be 45 7f a4 95 ad eb 7c 24 39 6a ea 2e 9e 71 f1 b3 34 71 73 df 19 56 f9 5a 53 6d 4d 3a 54 03 d2 35 20 ba 01 01 4f f2 9d 23 8f 33 20 6a dc c4 04 8d cb bd bb 0d 99 4d 70 70 77 11 06 da c2 b4 1a 19 a4 ba aa 13 63 28 32 78 54 eb 8a d5 5d 8a 4c dc 20 7c d0 3c 1e 5a 28 b6 8c 49 6e ac 46 20 81 1e af 1c d9 6b 23 fa c1 38 8d db 49 73 26 ab 5b 66 3b b7 68 c4 93 78 66 fa 2c 39 6c 72 f9 4c 8e e3 ed 2c 4f a2 c0 49 43 36 1e d2 48 31 f8 28 97 dd 96 20 73 53 37 0e 4f 8e e2 7c a0 01 bc 4c e6 ee 97 5a 09 54 38 89 98 00 00 00 37 00 00 00 07 73 73 68 2d 64 73 73 00 00 00 28 00 6d 1f 26 a7 fa 92 e0 27 cb b8 a5 22 a4 91 6d 43 86 81 45 82 eb ea 8b e2 f0 76 dc 7c fc 08 8d bc f6 d4 48 ab 2d 54 a8 2018-11-16 10:45:43,618 | Received SSH_MSG_KEX_DH_GEX_REPLY 2018-11-16 10:45:43,780 | Caught exception, now calling handler 2018-11-16 10:45:43,780 | Exception caught java.security.SignatureException: error decoding signature bytes. at org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown Source)[bcprov-jdk15on-1.59.jar:1.59.0] at java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] at org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16694284#comment-16694284 ] Aruna Potti commented on SSHD-869: -- Thank you for the response. But I see exception is coming from bouncy castle, not from your code. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16693928#comment-16693928 ] Aruna Potti commented on SSHD-869: -- Hi, Can you let me know what is the issue here?. Is it mina issue or keys are malformed? Thanks, Aruna. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Created] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
Aruna Potti created SSHD-869: Summary: java.security.SignatureException: error decoding signature bytes. Key: SSHD-869 URL: https://issues.apache.org/jira/browse/SSHD-869 Project: MINA SSHD Issue Type: Bug Affects Versions: 0.14.0 Reporter: Aruna Potti Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 version as I can not upgrade the version in my product. Exception caught java.security.SignatureException: error decoding signature bytes. at org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown Source)[bcprov-jdk15on-1.59.jar:1.59.0] at java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] at org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) at java.security.AccessController.doPrivileged(Native Method)[:1.8.0_66] at org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] at sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)