[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2020-08-28 Thread Lyor Goldstein (Jira)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17186343#comment-17186343
 ] 

Lyor Goldstein commented on SSHD-869:
-

I really could not say - the code has evolved so much that I cannot tell which 
issue was fixed at which version. All I can  do is repeat my recommendation - 
use the latest version (2.5.1 in this case).

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2020-08-27 Thread Aruna Potti (Jira)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17186067#comment-17186067
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein]  Does fix for SSHD-492 work for this issue as well to remove 
padded zeros with DSA/RSA keys.

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2019-06-27 Thread Goldstein Lyor (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16874230#comment-16874230
 ] 

Goldstein Lyor commented on SSHD-869:
-

0.14.0 (and any version below 2.0) is very old. Furthermore, the keep-alive 
mentioned in the documentation was modified several times - including in the 
latest version. My advice is to concentrate on using 2.2.0 - especially since 
we are probably going to release 2.3.0 pretty soon - as we do not really 
provide support for  old versions..

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2019-06-25 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872622#comment-16872622
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein] Sorry I was not able to attach the screen shot. I was referring 
about below keep-alive machanisms, 

[https://github.com/apache/mina-sshd/blob/master/docs/client-setup.md]

 
 * Sending {{SSH_MSG_IGNORE}} messages every once in a while.

This mechanism is along the lines of [PUTTY null packets 
configuration|https://patrickmn.com/aside/how-to-keep-alive-ssh-sessions/]. It 
generates small 
[{{SSH_MSG_IGNORE}}|https://tools.ietf.org/html/rfc4253#section-11.2] messages. 
The way to set this mechanism up is via the {{setSessionHeartbeat}} API.

_Note:_ the same effect can also be achieved by setting the relevant properties 
documented in {{SessionHeartbeatController}}, but it is highly recommended to 
use the API - unless one needs to control these properties *externally* via 
{{-Dxxx}} JVM options.

 * Sending {{keepalive@...}} [global 
requests|https://tools.ietf.org/html/rfc4254#section-4].

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2019-06-25 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872619#comment-16872619
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein] I am currently using 0.14.0 version and I do not see below 
keep-alive options in this version. When did you support them?

For 0.14.0, do you have any client side keep-alive support to the server, 
especially SSH based keep-alives?

 

!image-2019-06-25-11-44-02-741.png!

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2019-06-25 Thread Goldstein Lyor (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16872554#comment-16872554
 ] 

Goldstein Lyor commented on SSHD-869:
-

I don't think so - please note the keep-alive heartbeat is only generated by 
the SSHD *client* - I am not sure how {{ServerKeepAliveInterval}} behaves - 
specifically what is the mechanism being used to keep the connection alive.

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2019-06-24 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16871856#comment-16871856
 ] 

Aruna Potti commented on SSHD-869:
--

Hi Goldstein ,

If I enable OpenSSH related "ServerKeepAliveInterval"(SSH) on Linux and if
my apache mina based SSH client is running on this Linux box, can MINA
recognize those keepalives and disconnect mina socket/channel if these
keepalives fail and close the socket?

Thanks,
Aruna.


> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-12-01 Thread Goldstein Lyor (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16705844#comment-16705844
 ] 

Goldstein Lyor commented on SSHD-869:
-

I am sorry that I cannot be more helpful - but like I said, 0.14 is an 
extremely old version. BTW, even if you fix this issue, you will encounter many 
more - so I really (really) encourage you to find some way to use 2.1.0. That 
being said, the best I can offer right now is to look at the commit log of the 
{{AbstractSignature}}, {{SignatureRSA}} and {{SignatureDSA}} classes and see if 
you can figure out the patch. More specifically the usage of {{putBigInteger}}, 
the invocation of {{SignatureRSA/SignatureDSA#verify}}. In any case, please 
note that IMO there is nothing you can do in your code to fix this - the 
version 0.14 itself must be patched - so (again) better to upgrade to 2.1.0.

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-30 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16705241#comment-16705241
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein] :(Our product really does not use MINA directly, we use Open 
Daylight and it has dependency on MINA. Some how Open Daylight latest version 
also not using 2.1.0 or any other MINA latest versions. I am not sure why they 
are not upgrading their MINA version. So we are stuck with your 0.14.0 version. 
We really need  a work around like if there is way to fix the sshkeys with 
leading zeros? or any other standard way of generating ssh keys that would not 
use leading zeros to fill the bytes.

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-30 Thread Goldstein Lyor (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16704491#comment-16704491
 ] 

Goldstein Lyor commented on SSHD-869:
-

I am sure there is, but it was so ago that I don't remember where or how this 
was done :(. I strongly (re-)recommend you upgrade to 2.1.0

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-29 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16703783#comment-16703783
 ] 

Aruna Potti commented on SSHD-869:
--

[~lgoldstein] Is there any way to correct the issue manually if I have access 
to the SSHKeys with leading zeros problem. 

 

018-11-16 10:45:43,618 | Received packet #3: 21 00 00 01 b1 00 00 00 07 73 73 
68 2d 64 73 73 00 00 00 81 00 a8 b5 50 09 ab 14 4b 2d f9 10 96 f5 98 ba 47 e1 
f1 6f 3f 3a 30 eb f5 8c bc b9 c6 49 0f 03 c4 b7 b9 e6 57 8a 88 18 c4 22 fd c2 
ca 85 a1 70 ee ae be b3 b4 0e fa 84 4a 75 33 40 8a cc a1 86 33 1d d8 ab 79 46 
a4 f3 c2 b7 b5 cc 41 8f 6e 46 be 75 2b f2 63 a1 f3 22 d1 0b f4 ba 44 be c1 bd 
aa bb 9f 50 1f eb 9e ef 76 95 59 18 cc 78 ed e5 c9 82 46 f3 05 56 c5 46 e6 f4 
d3 05 79 67 31 5f 5d e3 00 00 00 15 00 84 fe 2b 6a d4 c2 d2 31 7a 9d 00 55 a8 
ac 6a 4e e6 78 69 77 00 00 00 80 17 75 cc d0 68 af c8 a0 10 b4 0f 96 db 25 32 
e3 00 f1 b2 ac c3 48 28 fb 16 66 ce c3 1a f9 9e a9 3e b7 27 56 97 63 bb 26 4d 
b9 18 97 63 cc 47 45 13 f2 fe b6 3b 9b 2b 37 29 e7 64 39 b7 95 91 d9 f0 6d 90 
17 c1 90 ff 47 2d c2 ac 2e 9c c7 f5 05 fa f0 1c 84 86 d3 e0 ad 73 c3 50 8c dc 
2e 36 cc 0d 7a be e2 b2 58 62 06 cb 14 f2 bc 22 04 3d 5c 27 e4 de a7 f0 13 dd 
49 1b 4a 2d 4a f7 72 52 62 00 00 00 80 36 b6 53 71 f5 15 82 55 bb 0b 43 a1 da 
98 73 9f 47 d8 52 d9 0f d8 2d f6 e2 9d f6 8b d1 73 51 2a ef 87 7f 75 35 d6 28 
53 fb a5 2f 9a 23 4d d7 c1 9a f0 9c a6 57 bf 64 11 bb ec 72 c5 7c cf b9 ae 0d 
05 a7 11 83 90 15 d2 7c ad 9e dc 7a 4e 10 6d 94 8e f1 f0 af d8 1a ab 33 f5 26 
d3 a8 87 f7 a4 fe 99 2d bb 35 10 70 e6 c2 54 f9 44 84 46 7c 06 14 f8 4e 5d 25 
e1 0c 38 18 de 0f 1f fa bf 90 30 00 00 02 01 00 9b 69 e7 43 dc 54 09 67 01 67 
10 31 b5 d7 32 9b 38 83 b0 b7 13 e9 a8 d2 5e f7 9f ce 02 5a e9 51 35 af 09 22 
c3 01 57 d8 7a eb 14 3d 8d f7 c4 87 b8 96 d3 b3 0f fa 11 77 71 47 18 0c 80 04 
9e af f8 21 65 fa 83 00 d9 d5 19 21 6e 36 f2 39 6f db d8 de bb 35 7c 74 ef 0a 
8e 6c a3 7e b2 fe 94 eb f3 09 b2 d2 e9 b2 7e 41 2c 84 fd e7 9d 1f ca 99 e8 64 
1b 36 da 74 99 a3 91 c9 a2 a3 37 c4 b5 74 fc c5 06 b7 2b 09 0e 88 a9 38 bd 8b 
0a 0b 57 47 e8 af b4 bc 08 40 e3 35 95 42 c8 cc 88 17 b9 af 08 54 2b 90 af 5b 
2d 29 16 ce 23 a9 68 9c a5 d6 8e ae d5 2b 60 5d 68 e0 df ad 7f 7c f0 0b a3 37 
23 96 35 26 bf 92 f3 48 b7 59 7a 65 59 ac 41 3f 0a c3 29 54 f6 77 ff b0 cd e9 
3c 14 cc ed a4 83 20 eb 02 99 44 b5 5b d2 e2 0d b8 d1 fa e5 5e 77 d3 b8 a3 e4 
e4 2f 13 15 c3 ff 7e 06 d6 b8 6c 3b 33 e4 37 c1 c7 30 9e 04 2a 6a 2a 13 da 97 
b1 ba 09 11 89 02 57 c0 cc 37 ff 42 28 24 c4 a9 7f 66 51 2f 1d 9a 74 77 c6 16 
ba ea 0b 1a 3f 00 14 b2 a5 37 e5 28 58 25 0a 91 b9 cc 8c 31 83 a4 74 9b 1e 54 
e9 06 31 8a f6 e0 cc 74 11 33 0a 49 47 7c 4e 85 7f a9 ca 5e c7 53 be 45 7f a4 
95 ad eb 7c 24 39 6a ea 2e 9e 71 f1 b3 34 71 73 df 19 56 f9 5a 53 6d 4d 3a 54 
03 d2 35 20 ba 01 01 4f f2 9d 23 8f 33 20 6a dc c4 04 8d cb bd bb 0d 99 4d 70 
70 77 11 06 da c2 b4 1a 19 a4 ba aa 13 63 28 32 78 54 eb 8a d5 5d 8a 4c dc 20 
7c d0 3c 1e 5a 28 b6 8c 49 6e ac 46 20 81 1e af 1c d9 6b 23 fa c1 38 8d db 49 
73 26 ab 5b 66 3b b7 68 c4 93 78 66 fa 2c 39 6c 72 f9 4c 8e e3 ed 2c 4f a2 c0 
49 43 36 1e d2 48 31 f8 28 97 dd 96 20 73 53 37 0e 4f 8e e2 7c a0 01 bc 4c e6 
ee 97 5a 09 54 38 89 98 00 00 00 37 00 00 00 07 73 73 68 2d 64 73 73 00 00 00 
28 00 6d 1f 26 a7 fa 92 e0 27 cb b8 a5 22 a4 91 6d 43 86 81 45 82 eb ea 8b e2 
f0 76 dc 7c fc 08 8d bc f6 d4 48 ab 2d 54 a8
2018-11-16 10:45:43,618 | Received SSH_MSG_KEX_DH_GEX_REPLY
2018-11-16 10:45:43,780 | Caught exception, now calling handler
2018-11-16 10:45:43,780 | Exception caught
java.security.SignatureException: error decoding signature bytes.
    at 
org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown 
Source)[bcprov-jdk15on-1.59.jar:1.59.0]
    at 
java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
    at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
    at 
org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
    at 
org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd

[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-21 Thread Goldstein Lyor (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16694934#comment-16694934
 ] 

Goldstein Lyor commented on SSHD-869:
-

The problem (assuming it is the one represented here) was that we did not strip 
leading zeroes before passing them to _Bouncycastle_

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-20 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16694284#comment-16694284
 ] 

Aruna Potti commented on SSHD-869:
--

Thank you for the response.
But I see exception is coming from bouncy castle, not from your code.




> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-20 Thread Goldstein Lyor (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16694246#comment-16694246
 ] 

Goldstein Lyor commented on SSHD-869:
-

If I remember correctly (and it was a long time ago) there was a problem with 
zero padded RSA/DSS keys - which were correctly sent by the server but 
incorrectly handled by our code.

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-20 Thread Aruna Potti (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16693928#comment-16693928
 ] 

Aruna Potti commented on SSHD-869:
--

Hi,

Can you let me know what is the issue here?. Is it mina issue or keys are
malformed?

Thanks,
Aruna.




> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (SSHD-869) java.security.SignatureException: error decoding signature bytes.

2018-11-19 Thread Goldstein Lyor (JIRA)


[ 
https://issues.apache.org/jira/browse/SSHD-869?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16692683#comment-16692683
 ] 

Goldstein Lyor commented on SSHD-869:
-

{quote}
 I need a fix/workaround in 0.14.0 version as I can not upgrade the version in 
my product.
{quote}
I am very sorry :(, but we cannot maintain several versions of the library due 
to the extremely limited manpower we have. Furthermore 0.14.0 is an extremely 
old version which contains many bugs that have been fixed since. I do strongly 
recommend to make the effort and upgrade to 2.1 :) (unless you cannot use JDK 
1.8 code, in which case I cannot offer a solution).

> java.security.SignatureException: error decoding signature bytes.
> -
>
> Key: SSHD-869
> URL: https://issues.apache.org/jira/browse/SSHD-869
> Project: MINA SSHD
>  Issue Type: Bug
>Affects Versions: 0.14.0
>Reporter: Aruna Potti
>Priority: Major
>
> Below exception is seen with some ssh keys. I need a fix/workaround in 0.14.0 
> version as I can not upgrade the version in my product.
>  
> Exception caught
> java.security.SignatureException: error decoding signature bytes.
>     at 
> org.bouncycastle.jcajce.provider.asymmetric.dsa.DSASigner.engineVerify(Unknown
>  Source)[bcprov-jdk15on-1.59.jar:1.59.0]
>     at 
> java.security.Signature$Delegate.engineVerify(Signature.java:1219)[:1.8.0_66]
>     at java.security.Signature.verify(Signature.java:652)[:1.8.0_66]
>     at 
> org.apache.sshd.common.signature.AbstractSignatureDSA.verify(AbstractSignatureDSA.java:88)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.kex.DHGEX.next(DHGEX.java:163)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:425)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:326)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.client.session.ClientSessionImpl.handleMessage(ClientSessionImpl.java:306)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:780)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:308)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:54)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:184)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2Session$1.onCompleted(Nio2Session.java:170)[53:org.apache.sshd.core:0.14.0]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:32)
>     at java.security.AccessController.doPrivileged(Native 
> Method)[:1.8.0_66]
>     at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:30)[53:org.apache.sshd.core:0.14.0]
>     at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)[:1.8.0_66]
>     at sun.nio.ch.Invoker$2.run(Invoker.java:218)[:1.8.0_66]
>     at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)[:1.8.0_66]
>     at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)[:1.8.0_66]
>     at java.lang.Thread.run(Thread.java:745)[:1.8.0_66]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)