java - JSch ssh_rsa_verify: signature false on SSH_MSG_KEX_DH_GEX_REPLY -
i trying public/private key authorization, works on servers.
the below code works when connecting local bitwise server, , when connecting local crushftp server, not work when connecting remote server version string "ssh-2.0-liquidsftp" same public key has been uploaded servers.
jsch jsch = new jsch(); jsch.setlogger(new log4jlogger()); jsch.addidentity("privatekey.ppk", "mysecretpassphrase"); string host = "someserver.com"; string username = "myusername"; int port = 1100; session session = jsch.getsession(username, host, port); session.setconfig("stricthostkeychecking", "no"); session.setconfig("kex","diffie-hellman-group-exchange-sha1"); userinfo ui = new myuserinfo(); session.setuserinfo(ui); session.connect();
from key exchange init messages monitored wireshark, , logged in java, can see server support diffie-hellman-group-exchange-sha1 algorithm, fails when trying verify signature in ssh_msg_kex_dh_gex_reply
ssh_msg_kexinit sent ssh_msg_kexinit received kex: server: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1 kex: server: ssh-rsa kex: server: 3des-cbc,blowfish-cbc,twofish256-cbc,twofish192-cbc,twofish128-cbc,aes256-cbc,aes192-cbc,aes128-cbc,serpent256-cbc,serpent192-cbc,serpent128-cbc,arcfour,idea-cbc,cast128-cbc,none,des-cbc,aes128-ctr,aes192-ctr,aes256-ctr,3des-ctr,blowfish-ctr,twofish128-ctr,twofish192-ctr,twofish256-ctr,serpent128-ctr,serpent192-ctr,serpent256-ctr,idea-ctr,cast128-ctr,arcfour128,arcfour256 kex: server: 3des-cbc,blowfish-cbc,twofish256-cbc,twofish192-cbc,twofish128-cbc,aes256-cbc,aes192-cbc,aes128-cbc,serpent256-cbc,serpent192-cbc,serpent128-cbc,arcfour,idea-cbc,cast128-cbc,none,des-cbc,aes128-ctr,aes192-ctr,aes256-ctr,3des-ctr,blowfish-ctr,twofish128-ctr,twofish192-ctr,twofish256-ctr,serpent128-ctr,serpent192-ctr,serpent256-ctr,idea-ctr,cast128-ctr,arcfour128,arcfour256 kex: server: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,none,hmac-ripemd160,hmac-ripemd,hmac-ripemd160@openssh.com,hmac-sha256@ssh.com,hmac-sha256-96@ssh.com,umac-32@openssh.com,umac-64@openssh.com,umac-96@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512 kex: server: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,none,hmac-ripemd160,hmac-ripemd,hmac-ripemd160@openssh.com,hmac-sha256@ssh.com,hmac-sha256-96@ssh.com,umac-32@openssh.com,umac-64@openssh.com,umac-96@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512 kex: server: none,zlib,zlib@openssh.com kex: server: none,zlib,zlib@openssh.com kex: server: kex: server: kex: client: diffie-hellman-group-exchange-sha1 kex: client: ssh-rsa kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc,aes192-ctr,aes192-cbc,aes256-ctr,aes256-cbc kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96 kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96 kex: client: none kex: client: none kex: client: kex: client: kex: server->client aes128-ctr hmac-md5 none kex: client->server aes128-ctr hmac-md5 none ssh_msg_kex_dh_gex_request(1024<2048<2048) sent ssh_msg_kex_dh_gex_init sent ssh_rsa_verify: signature false
when connecting server putty using same algorithms , same private key, works, , wireshark output looks similar, client not disconnect after ssh_msg_kex_dh_gex_reply
has been received.
any idea wrong? have missed obvious?
Comments
Post a Comment