[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17186343#comment-17186343 ] Lyor Goldstein commented on SSHD-869: - I really could not say - the code has evolved so much that I cannot tell which issue was fixed at which version. All I can do is repeat my recommendation - use the latest version (2.5.1 in this case). > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17186067#comment-17186067 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] Does fix for SSHD-492 work for this issue as well to remove padded zeros with DSA/RSA keys. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian Jira (v8.3.4#803005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16874230#comment-16874230 ] Goldstein Lyor commented on SSHD-869: - 0.14.0 (and any version below 2.0) is very old. Furthermore, the keep-alive mentioned in the documentation was modified several times - including in the latest version. My advice is to concentrate on using 2.2.0 - especially since we are probably going to release 2.3.0 pretty soon - as we do not really provide support for old versions.. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872622#comment-16872622 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] Sorry I was not able to attach the screen shot. I was referring about below keep-alive machanisms, [https://github.com/apache/mina-sshd/blob/master/docs/client-setup.md] * Sending {{SSH_MSG_IGNORE}} messages every once in a while. This mechanism is along the lines of [PUTTY null packets configuration|https://patrickmn.com/aside/how-to-keep-alive-ssh-sessions/]. It generates small [{{SSH_MSG_IGNORE}}|https://tools.ietf.org/html/rfc4253#section-11.2] messages. The way to set this mechanism up is via the {{setSessionHeartbeat}} API. _Note:_ the same effect can also be achieved by setting the relevant properties documented in {{SessionHeartbeatController}}, but it is highly recommended to use the API - unless one needs to control these properties *externally* via {{-Dxxx}} JVM options. * Sending {{keepalive@...}} [global requests|https://tools.ietf.org/html/rfc4254#section-4]. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872619#comment-16872619 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] I am currently using 0.14.0 version and I do not see below keep-alive options in this version. When did you support them? For 0.14.0, do you have any client side keep-alive support to the server, especially SSH based keep-alives? !image-2019-06-25-11-44-02-741.png! > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872554#comment-16872554 ] Goldstein Lyor commented on SSHD-869: - I don't think so - please note the keep-alive heartbeat is only generated by the SSHD *client* - I am not sure how {{ServerKeepAliveInterval}} behaves - specifically what is the mechanism being used to keep the connection alive. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16871856#comment-16871856 ] Aruna Potti commented on SSHD-869: -- Hi Goldstein , If I enable OpenSSH related "ServerKeepAliveInterval"(SSH) on Linux and if my apache mina based SSH client is running on this Linux box, can MINA recognize those keepalives and disconnect mina socket/channel if these keepalives fail and close the socket? Thanks, Aruna. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005) - To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16705844#comment-16705844 ] Goldstein Lyor commented on SSHD-869: - I am sorry that I cannot be more helpful - but like I said, 0.14 is an extremely old version. BTW, even if you fix this issue, you will encounter many more - so I really (really) encourage you to find some way to use 2.1.0. That being said, the best I can offer right now is to look at the commit log of the {{AbstractSignature}}, {{SignatureRSA}} and {{SignatureDSA}} classes and see if you can figure out the patch. More specifically the usage of {{putBigInteger}}, the invocation of {{SignatureRSA/SignatureDSA#verify}}. In any case, please note that IMO there is nothing you can do in your code to fix this - the version 0.14 itself must be patched - so (again) better to upgrade to 2.1.0. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16705241#comment-16705241 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] :(Our product really does not use MINA directly, we use Open Daylight and it has dependency on MINA. Some how Open Daylight latest version also not using 2.1.0 or any other MINA latest versions. I am not sure why they are not upgrading their MINA version. So we are stuck with your 0.14.0 version. We really need a work around like if there is way to fix the sshkeys with leading zeros? or any other standard way of generating ssh keys that would not use leading zeros to fill the bytes. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16704491#comment-16704491 ] Goldstein Lyor commented on SSHD-869: - I am sure there is, but it was so ago that I don't remember where or how this was done :(. I strongly (re-)recommend you upgrade to 2.1.0 > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16703783#comment-16703783 ] Aruna Potti commented on SSHD-869: -- [~lgoldstein] Is there any way to correct the issue manually if I have access to the SSHKeys with leading zeros problem. 018-11-16 10:45:43,618 | Received packet #3: 21 00 00 01 b1 00 00 00 07 73 73 68 2d 64 73 73 00 00 00 81 00 a8 b5 50 09 ab 14 4b 2d f9 10 96 f5 98 ba 47 e1 f1 6f 3f 3a 30 eb f5 8c bc b9 c6 49 0f 03 c4 b7 b9 e6 57 8a 88 18 c4 22 fd c2 ca 85 a1 70 ee ae be b3 b4 0e fa 84 4a 75 33 40 8a cc a1 86 33 1d d8 ab 79 46 a4 f3 c2 b7 b5 cc 41 8f 6e 46 be 75 2b f2 63 a1 f3 22 d1 0b f4 ba 44 be c1 bd aa bb 9f 50 1f eb 9e ef 76 95 59 18 cc 78 ed e5 c9 82 46 f3 05 56 c5 46 e6 f4 d3 05 79 67 31 5f 5d e3 00 00 00 15 00 84 fe 2b 6a d4 c2 d2 31 7a 9d 00 55 a8 ac 6a 4e e6 78 69 77 00 00 00 80 17 75 cc d0 68 af c8 a0 10 b4 0f 96 db 25 32 e3 00 f1 b2 ac c3 48 28 fb 16 66 ce c3 1a f9 9e a9 3e b7 27 56 97 63 bb 26 4d b9 18 97 63 cc 47 45 13 f2 fe b6 3b 9b 2b 37 29 e7 64 39 b7 95 91 d9 f0 6d 90 17 c1 90 ff 47 2d c2 ac 2e 9c c7 f5 05 fa f0 1c 84 86 d3 e0 ad 73 c3 50 8c dc 2e 36 cc 0d 7a be e2 b2 58 62 06 cb 14 f2 bc 22 04 3d 5c 27 e4 de a7 f0 13 dd 49 1b 4a 2d 4a f7 72 52 62 00 00 00 80 36 b6 53 71 f5 15 82 55 bb 0b 43 a1 da 98 73 9f 47 d8 52 d9 0f d8 2d f6 e2 9d f6 8b d1 73 51 2a ef 87 7f 75 35 d6 28 53 fb a5 2f 9a 23 4d d7 c1 9a f0 9c a6 57 bf 64 11 bb ec 72 c5 7c cf b9 ae 0d 05 a7 11 83 90 15 d2 7c ad 9e dc 7a 4e 10 6d 94 8e f1 f0 af d8 1a ab 33 f5 26 d3 a8 87 f7 a4 fe 99 2d bb 35 10 70 e6 c2 54 f9 44 84 46 7c 06 14 f8 4e 5d 25 e1 0c 38 18 de 0f 1f fa bf 90 30 00 00 02 01 00 9b 69 e7 43 dc 54 09 67 01 67 10 31 b5 d7 32 9b 38 83 b0 b7 13 e9 a8 d2 5e f7 9f ce 02 5a e9 51 35 af 09 22 c3 01 57 d8 7a eb 14 3d 8d f7 c4 87 b8 96 d3 b3 0f fa 11 77 71 47 18 0c 80 04 9e af f8 21 65 fa 83 00 d9 d5 19 21 6e 36 f2 39 6f db d8 de bb 35 7c 74 ef 0a 8e 6c a3 7e b2 fe 94 eb f3 09 b2 d2 e9 b2 7e 41 2c 84 fd e7 9d 1f ca 99 e8 64 1b 36 da 74 99 a3 91 c9 a2 a3 37 c4 b5 74 fc c5 06 b7 2b 09 0e 88 a9 38 bd 8b 0a 0b 57 47 e8 af b4 bc 08 40 e3 35 95 42 c8 cc 88 17 b9 af 08 54 2b 90 af 5b 2d 29 16 ce 23 a9 68 9c a5 d6 8e ae d5 2b 60 5d 68 e0 df ad 7f 7c f0 0b a3 37 23 96 35 26 bf 92 f3 48 b7 59 7a 65 59 ac 41 3f 0a c3 29 54 f6 77 ff b0 cd e9 3c 14 cc ed a4 83 20 eb 02 99 44 b5 5b d2 e2 0d b8 d1 fa e5 5e 77 d3 b8 a3 e4 e4 2f 13 15 c3 ff 7e 06 d6 b8 6c 3b 33 e4 37 c1 c7 30 9e 04 2a 6a 2a 13 da 97 b1 ba 09 11 89 02 57 c0 cc 37 ff 42 28 24 c4 a9 7f 66 51 2f 1d 9a 74 77 c6 16 ba ea 0b 1a 3f 00 14 b2 a5 37 e5 28 58 25 0a 91 b9 cc 8c 31 83 a4 74 9b 1e 54 e9 06 31 8a f6 e0 cc 74 11 33 0a 49 47 7c 4e 85 7f a9 ca 5e c7 53 be 45 7f a4 95 ad eb 7c 24 39 6a ea 2e 9e 71 f1 b3 34 71 73 df 19 56 f9 5a 53 6d 4d 3a 54 03 d2 35 20 ba 01 01 4f f2 9d 23 8f 33 20 6a dc c4 04 8d cb bd bb 0d 99 4d 70 70 77 11 06 da c2 b4 1a 19 a4 ba aa 13 63 28 32 78 54 eb 8a d5 5d 8a 4c dc 20 7c d0 3c 1e 5a 28 b6 8c 49 6e ac 46 20 81 1e af 1c d9 6b 23 fa c1 38 8d db 49 73 26 ab 5b 66 3b b7 68 c4 93 78 66 fa 2c 39 6c 72 f9 4c 8e e3 ed 2c 4f a2 c0 49 43 36 1e d2 48 31 f8 28 97 dd 96 20 73 53 37 0e 4f 8e e2 7c a0 01 bc 4c e6 ee 97 5a 09 54 38 89 98 00 00 00 37 00 00 00 07 73 73 68 2d 64 73 73 00 00 00 28 00 6d 1f 26 a7 fa 92 e0 27 cb b8 a5 22 a4 91 6d 43 86 81 45 82 eb ea 8b e2 f0 76 dc 7c fc 08 8d bc f6 d4 48 ab 2d 54 a8 2018-11-16 10:45:43,618 | Received SSH_MSG_KEX_DH_GEX_REPLY 2018-11-16 10:45:43,780 | Caught exception, now calling handler 2018-11-16 10:45:43,780 | Exception caught java.security.SignatureException: error decoding signature bytes. at org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown Source)[bcprov-jdk15on-1.59.jar:1.59.0] at java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] at org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] at org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16694934#comment-16694934 ] Goldstein Lyor commented on SSHD-869: - The problem (assuming it is the one represented here) was that we did not strip leading zeroes before passing them to _Bouncycastle_ > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16694284#comment-16694284 ] Aruna Potti commented on SSHD-869: -- Thank you for the response. But I see exception is coming from bouncy castle, not from your code. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16694246#comment-16694246 ] Goldstein Lyor commented on SSHD-869: - If I remember correctly (and it was a long time ago) there was a problem with zero padded RSA/DSS keys - which were correctly sent by the server but incorrectly handled by our code. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16693928#comment-16693928 ] Aruna Potti commented on SSHD-869: -- Hi, Can you let me know what is the issue here?. Is it mina issue or keys are malformed? Thanks, Aruna. > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.
[ https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16692683#comment-16692683 ] Goldstein Lyor commented on SSHD-869: - {quote} I need a fix/workaround in 0.14.0 version as I can not upgrade the version in my product. {quote} I am very sorry :(, but we cannot maintain several versions of the library due to the extremely limited manpower we have. Furthermore 0.14.0 is an extremely old version which contains many bugs that have been fixed since. I do strongly recommend to make the effort and upgrade to 2.1 :) (unless you cannot use JDK 1.8 code, in which case I cannot offer a solution). > java.security.SignatureException: error decoding signature bytes. > - > > Key: SSHD-869 > URL: https://issues.apache.org/jira/browse/SSHD-869 > Project: MINA SSHD > Issue Type: Bug >Affects Versions: 0.14.0 >Reporter: Aruna Potti >Priority: Major > > Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 > version as I can not upgrade the version in my product. > > Exception caught > java.security.SignatureException: error decoding signature bytes. > at > org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown > Source)[bcprov-jdk15on-1.59.jar:1.59.0] > at > java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66] > at java.security.Signature.verify(Signature.java:652)[:1.8.0_66] > at > org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32) > at java.security.AccessController.doPrivileged(Native > Method)[:1.8.0_66] > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0] > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66] > at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66] > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66] > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66] > at java.lang.Thread.run(Thread.java:745)[:1.8.0_66] -- This message was sent by Atlassian JIRA (v7.6.3#76005)