baiglin opened a new issue, #531:
URL: https://github.com/apache/mina-sshd/issues/531
### Version
2.11.0
### Bug description
Hi @tomaswolf ,
We ran into the following case which seems maybe a wrong handling on server
side, but still Apache Mina client behavior seems not ok against that.
The following is negotiated:
Kex: encryption algorithms (server to client) = aes128-ctr
Kex: compression algorithms (server to client) = none
Kex: compression algorithms (client to server) = none
Kex: mac algorithms (server to client) = hmac-sha2-256
Kex: encryption algorithms (client to server) = aes128-ctr
Kex: kex algorithms = curve25519-sha256
Kex: server host key algorithms = ssh-rsa
Kex: mac algorithms (client to server) = hmac-sha2-256
Still I can see in the logs:
processAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection][publickey]
SSH_MSG_USERAUTH_PK_OK type=rsa-sha2-512,
fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE
processAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection][publickey]:
signing with algorithm rsa-sha2-512
Which ends in failure. If not mistaken from the code it seems in the process
method we extract the key type from buffer response from server which seems
wrong here .... But not sure...
Then we try to use different algorithm:
send SSH_MSG_USERAUTH_REQUEST request publickey type=**rsa-sha2-256** -
fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE
send SSH_MSG_USERAUTH_REQUEST request publickey type=**ssh-rsa** -
fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE
But still it fails and I do not see anymore the signing part done...
I can successully connect howver forsing the server algorithm to ssh-rsa:
`````java
session.setSignatureFactoriesNameList("ssh-rsa");
````
### Actual behavior
Fail to authenticate to server
### Expected behavior
Use relevant algorithm
### Relevant log output
```Shell
https://unified.loggingfacility.amadeus.com/#/log-viewer/search-id/890181042561045//
2024/07/16 05:36:14.003000 disapp04 DDS_UDD#0-0 APP WARNG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} Creating IoSession on
/172.25.63.181:45916 from /10.243.2.50:6710 via null
2024/07/16 05:36:14.884000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {} Client session created:
Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710]
2024/07/16 05:36:14.886000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
ClientUserAuthService(ClientSessionImpl[null@/10.243.2.50:6710]) client
methods: [publickey, keyboard-interactive, password]
2024/07/16 05:36:14.891000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.h.SessionTimeoutListener#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
sessionCreated(ClientSessionImpl[null@/10.243.2.50:6710]) tracking
2024/07/16 05:36:14.891000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
initializeProxyConnector(ClientSessionImpl[null@/10.243.2.50:6710]) no proxy to
initialize
2024/07/16 05:36:14.895000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 28 bytes
2024/07/16 05:36:14.895000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
sendIdentification(ClientSessionImpl[null@/10.243.2.50:6710]):
SSH-2.0-APACHE-SSHD-2.11.0
2024/07/16 05:36:14.897000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
sendKexInit(ClientSessionImpl[null@/10.243.2.50:6710]) Send SSH_MSG_KEXINIT
2024/07/16 05:36:14.905000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
encode(ClientSessionImpl[null@/10.243.2.50:6710]) packet #0 sending
command=20[SSH_MSG_KEXINIT] len=1244
2024/07/16 05:36:14.905000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 1264 bytes
2024/07/16 05:36:14.908000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.SshClient#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-resume-thread-1] {}
setupDefaultSessionIdentities(ClientSessionImpl[amadeus@/10.243.2.50:6710]) key
identity provider override in session listener
2024/07/16 05:36:14.910000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.f.DefaultConnectFuture#0 TID#00000> genericLoop
[http-nio-30200-exec-1] {CORR_ID=4c7cd49f-c625-4beb-86e0-949e8bc599c6}
Connected to /10.243.2.50:6710 after 90437594 nanos
2024/07/16 05:36:14.912000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-3] {}
doReadIdentification(ClientSessionImpl[amadeus@/10.243.2.50:6710])
line='SSH-2.0-XFB.Gateway Unix'
2024/07/16 05:36:14.912000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-3] {}
readIdentification(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Server version
string: SSH-2.0-XFB.Gateway Unix
2024/07/16 05:36:14.944000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #0
SSH_MSG_KEXINIT
2024/07/16 05:36:14.944000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
handleKexInit(ClientSessionImpl[amadeus@/10.243.2.50:6710]) SSH_MSG_KEXINIT
2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex:
encryption algorithms (server to client) = aes128-ctr
2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex:
compression algorithms (server to client) = none
2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex:
compression algorithms (client to server) = none
2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: mac
algorithms (server to client) = hmac-sha2-256
2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex:
encryption algorithms (client to server) = aes128-ctr
2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: kex
algorithms = curve25519-sha256
2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: server
host key algorithms = ssh-rsa
2024/07/16 05:36:14.950000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
setNegotiationResult(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Kex: mac
algorithms (client to server) = hmac-sha2-256
2024/07/16 05:36:14.973000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #1 sending
command=30[30] len=37
2024/07/16 05:36:14.973000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 56 bytes
2024/07/16 05:36:14.973000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.k.DHGClient#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-4] {}
init(DHGClient[curve25519-sha256])[ClientSessionImpl[amadeus@/10.243.2.50:6710]]
Send SSH_MSG_KEXDH_INIT
2024/07/16 05:36:15.078000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.k.DHGClient#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
next(DHGClient[curve25519-sha256])[ClientSessionImpl[amadeus@/10.243.2.50:6710]]
process command=SSH_MSG_KEXDH_REPLY
2024/07/16 05:36:15.078000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #1 31
2024/07/16 05:36:15.088000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
setServerKey(ClientSessionImpl[amadeus@/10.243.2.50:6710]) keyType=ssh-rsa,
digest=SHA256:waSLHkyWs+zjqmZdDDRwgSnMedtiyfa6VuOHPGnlLbE
2024/07/16 05:36:15.088000 disapp01 DDS_UDD#0-0 APP WARN
<o.a.s.c.k.AcceptAllServerKeyVerifier#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {} Server at /10.243.2.50:6710
presented unverified RSA key: SHA256:waSLHkyWs+zjqmZdDDRwgSnMedtiyfa6VuOHPGnlLbE
2024/07/16 05:36:15.088000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
handleKexMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710])[curve25519-sha256]
KEX processing complete after cmd=31
2024/07/16 05:36:15.089000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
sendNewKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Send SSH_MSG_NEWKEYS
2024/07/16 05:36:15.089000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
checkKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710])
key=ssh-rsa-SHA256:waSLHkyWs+zjqmZdDDRwgSnMedtiyfa6VuOHPGnlLbE, verified=true
2024/07/16 05:36:15.089000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
prepareNewKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) session
ID=df:c2:4d:c0:cb:51:e5:c5:14:96:6a:b8:9e:6e:91:9e:49:73:8a:bd:00:61:02:57:fa:09:f3:91:25:92:25:05
2024/07/16 05:36:15.098000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #2 sending
command=21[SSH_MSG_NEWKEYS] len=1
2024/07/16 05:36:15.098000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 16 bytes
2024/07/16 05:36:15.122000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
setOutputEncoding(ClientSessionImpl[amadeus@/10.243.2.50:6710]): cipher
BaseCipher[AES, ivSize=16, kdfSize=16,AES/CTR/NoPadding, blkSize=16]; mac
BaseMac[HmacSHA256] - block=32/32 bytes, encrypt-then-mac=false; compression
none[Deflater/-1]; blocks limit 134217728
2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
sendInitialServiceRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Send
SSH_MSG_SERVICE_REQUEST for ssh-userauth
2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 80 bytes
2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #3 sending
command=5[SSH_MSG_SERVICE_REQUEST] len=17
2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
handleNewKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) SSH_MSG_NEWKEYS
command=SSH_MSG_NEWKEYS
2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
setInputEncoding(ClientSessionImpl[amadeus@/10.243.2.50:6710]): cipher
BaseCipher[AES, ivSize=16, kdfSize=16,AES/CTR/NoPadding, blkSize=16]; mac
BaseMac[HmacSHA256] - block=32/32 bytes, encrypt-then-mac=false; compression
none[Inflater/-1]; blocks limit 4294967296
2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #2
SSH_MSG_NEWKEYS
2024/07/16 05:36:15.124000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
handleNewKeys(ClientSessionImpl[amadeus@/10.243.2.50:6710]) No pending packets
to flush at end of KEX
2024/07/16 05:36:15.125000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 96 bytes
2024/07/16 05:36:15.125000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
auth(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection] send
SSH_MSG_USERAUTH_REQUEST for 'none'
2024/07/16 05:36:15.125000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-5] {}
encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #4 sending
command=50[SSH_MSG_USERAUTH_REQUEST] len=38
2024/07/16 05:36:15.230000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
handleServiceAccept(ClientSessionImpl[amadeus@/10.243.2.50:6710])
SSH_MSG_SERVICE_ACCEPT service=ssh-userauth
2024/07/16 05:36:15.230000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #4
SSH_MSG_USERAUTH_FAILURE
2024/07/16 05:36:15.230000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #3
SSH_MSG_SERVICE_ACCEPT
2024/07/16 05:36:15.231000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) attempting
method=publickey
2024/07/16 05:36:15.231000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) starting authentication
mechanisms: client=[publickey, keyboard-interactive, password],
server=[password, publickey]
2024/07/16 05:36:15.231000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Received
SSH_MSG_USERAUTH_FAILURE - partial=false, methods=password,publickey
2024/07/16 05:36:15.237000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
sendAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection]
send SSH_MSG_USERAUTH_REQUEST request publickey type=rsa-sha2-512 -
fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE
2024/07/16 05:36:15.237000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #5 sending
command=50[SSH_MSG_USERAUTH_REQUEST] len=341
2024/07/16 05:36:15.237000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 400 bytes
2024/07/16 05:36:15.238000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-6] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) successfully processed
initial buffer by method=publickey
2024/07/16 05:36:15.284000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-7] {}
processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) delegate
processing of 60 to publickey
2024/07/16 05:36:15.284000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-7] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #5 60
2024/07/16 05:36:15.285000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-7] {}
processAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection][publickey]:
signing with algorithm rsa-sha2-512
2024/07/16 05:36:15.285000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-7] {}
processAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection][publickey]
SSH_MSG_USERAUTH_PK_OK type=rsa-sha2-512,
fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE
2024/07/16 05:36:15.295000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-7] {}
encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #6 sending
command=50[SSH_MSG_USERAUTH_REQUEST] len=621
2024/07/16 05:36:15.296000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-7] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 688 bytes
2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-8] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #6
SSH_MSG_USERAUTH_FAILURE
2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-8] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 400 bytes
2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-8] {}
encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #7 sending
command=50[SSH_MSG_USERAUTH_REQUEST] len=341
2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-8] {}
processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Received
SSH_MSG_USERAUTH_FAILURE - partial=false, methods=password
2024/07/16 05:36:15.344000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-8] {}
sendAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection]
send SSH_MSG_USERAUTH_REQUEST request publickey type=rsa-sha2-256 -
fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE
2024/07/16 05:36:15.345000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-8] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) successfully processed
initial buffer by method=publickey
2024/07/16 05:36:15.391000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-9] {}
processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Received
SSH_MSG_USERAUTH_FAILURE - partial=false, methods=password
2024/07/16 05:36:15.391000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-9] {}
sendAuthDataRequest(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection]
send SSH_MSG_USERAUTH_REQUEST request publickey type=ssh-rsa -
fingerprint=SHA256:YNK/48lJZvi8/w2VTwCd4vNYWI0IJod7CDvF+Jc//JE
2024/07/16 05:36:15.391000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-9] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #7
SSH_MSG_USERAUTH_FAILURE
2024/07/16 05:36:15.392000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-9] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) successfully processed
initial buffer by method=publickey
2024/07/16 05:36:15.392000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-9] {}
encode(ClientSessionImpl[amadeus@/10.243.2.50:6710]) packet #8 sending
command=50[SSH_MSG_USERAUTH_REQUEST] len=336
2024/07/16 05:36:15.392000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.i.n.Nio2Session#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-9] {}
writeBuffer(Nio2Session[local=/172.25.63.181:45916, remote=/10.243.2.50:6710])
writing 400 bytes
2024/07/16 05:36:15.413000 disapp01 DDS_UDD#0-0 APP WARN
<o.a.s.c.k.AcceptAllServerKeyVerifier#0 TID#00000> DDPLoop
[sshd-SshClient[1a99744a]-nio2-thread-20] {} Server at /192.102.253.24:22
presented unverified EC key: SHA256:8moyEtOP764Y8jU+oUT9zZ65DbIqcm4iCCv/i5vL9AY
2024/07/16 05:36:15.438000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
processUserAuth(ClientSessionImpl[amadeus@/10.243.2.50:6710]) Received
SSH_MSG_USERAUTH_FAILURE - partial=false, methods=password
2024/07/16 05:36:15.438000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientSessionImpl#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
doHandleMessage(ClientSessionImpl[amadeus@/10.243.2.50:6710]) process #8
SSH_MSG_USERAUTH_FAILURE
2024/07/16 05:36:15.439000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
resolveAttemptedPublicKeyIdentity(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection]
no more keys to send
2024/07/16 05:36:15.439000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPublicKey#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
destroy(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection]
2024/07/16 05:36:15.439000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) no initial request sent
by method=publickey
2024/07/16 05:36:15.440000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) attempting method=password
2024/07/16 05:36:15.441000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPassword#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
resolveAttemptedPassword(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection]
no more passwords to send
2024/07/16 05:36:15.442000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) no initial request sent
by method=password
2024/07/16 05:36:15.442000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.s.ClientUserAuthService#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
tryNext(ClientSessionImpl[amadeus@/10.243.2.50:6710]) exhausted all methods -
client=[publickey, keyboard-interactive, password], server=[password, publickey]
2024/07/16 05:36:15.442000 disapp01 DDS_UDD#0-0 APP DEBUG
<o.a.s.c.a.p.UserAuthPassword#0 TID#00000> genericLoop
[sshd-SshClient[36ae17ef]-nio2-thread-10] {}
destroy(ClientSessionImpl[amadeus@/10.243.2.50:6710])[ssh-connection]
2024/07/16 05:36:15.443000 disapp01 DDS_UDD#0-0 APP WARN
```
### Other information
_No response_
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: [email protected]
For queries about this service, please contact Infrastructure at:
[email protected]
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]