java - JSch ssh_rsa_verify: signature false on SSH_MSG_KEX_DH_GEX_REPLY -


i trying public/private key authorization, works on servers.

the below code works when connecting local bitwise server, , when connecting local crushftp server, not work when connecting remote server version string "ssh-2.0-liquidsftp" same public key has been uploaded servers.

jsch jsch = new jsch(); jsch.setlogger(new log4jlogger());  jsch.addidentity("privatekey.ppk", "mysecretpassphrase");  string host = "someserver.com"; string username = "myusername"; int port = 1100;  session session = jsch.getsession(username, host, port); session.setconfig("stricthostkeychecking", "no"); session.setconfig("kex","diffie-hellman-group-exchange-sha1");  userinfo ui = new myuserinfo(); session.setuserinfo(ui); session.connect(); 

from key exchange init messages monitored wireshark, , logged in java, can see server support diffie-hellman-group-exchange-sha1 algorithm, fails when trying verify signature in ssh_msg_kex_dh_gex_reply

ssh_msg_kexinit sent ssh_msg_kexinit received kex: server: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1 kex: server: ssh-rsa kex: server: 3des-cbc,blowfish-cbc,twofish256-cbc,twofish192-cbc,twofish128-cbc,aes256-cbc,aes192-cbc,aes128-cbc,serpent256-cbc,serpent192-cbc,serpent128-cbc,arcfour,idea-cbc,cast128-cbc,none,des-cbc,aes128-ctr,aes192-ctr,aes256-ctr,3des-ctr,blowfish-ctr,twofish128-ctr,twofish192-ctr,twofish256-ctr,serpent128-ctr,serpent192-ctr,serpent256-ctr,idea-ctr,cast128-ctr,arcfour128,arcfour256 kex: server: 3des-cbc,blowfish-cbc,twofish256-cbc,twofish192-cbc,twofish128-cbc,aes256-cbc,aes192-cbc,aes128-cbc,serpent256-cbc,serpent192-cbc,serpent128-cbc,arcfour,idea-cbc,cast128-cbc,none,des-cbc,aes128-ctr,aes192-ctr,aes256-ctr,3des-ctr,blowfish-ctr,twofish128-ctr,twofish192-ctr,twofish256-ctr,serpent128-ctr,serpent192-ctr,serpent256-ctr,idea-ctr,cast128-ctr,arcfour128,arcfour256 kex: server: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,none,hmac-ripemd160,hmac-ripemd,hmac-ripemd160@openssh.com,hmac-sha256@ssh.com,hmac-sha256-96@ssh.com,umac-32@openssh.com,umac-64@openssh.com,umac-96@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512 kex: server: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,none,hmac-ripemd160,hmac-ripemd,hmac-ripemd160@openssh.com,hmac-sha256@ssh.com,hmac-sha256-96@ssh.com,umac-32@openssh.com,umac-64@openssh.com,umac-96@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512 kex: server: none,zlib,zlib@openssh.com kex: server: none,zlib,zlib@openssh.com kex: server:  kex: server:  kex: client: diffie-hellman-group-exchange-sha1 kex: client: ssh-rsa kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96 kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96 kex: client: none kex: client: none kex: client:  kex: client:  kex: server->client aes128-ctr hmac-md5 none kex: client->server aes128-ctr hmac-md5 none  ssh_msg_kex_dh_gex_request(1024<2048<2048) sent ssh_msg_kex_dh_gex_init sent  ssh_rsa_verify: signature false 

when connecting server putty using same algorithms , same private key, works, , wireshark output looks similar, client not disconnect after ssh_msg_kex_dh_gex_reply has been received.

any idea wrong? have missed obvious?


Comments

Popular posts from this blog

javascript - Thinglink image not visible until browser resize -

firebird - Error "invalid transaction handle (expecting explicit transaction start)" executing script from Delphi -

mongodb - How to keep track of users making Stripe Payments -