Our Products:   CompleteFTP  edtFTPnet/Free  edtFTPnet/PRO  edtFTPj/Free  edtFTPj/PRO
0 votes
3.1k views
in Java FTP by (120 points)
Hi,

We're experiencing issues with SFTP file transfer. We use simultaneous connections over OpenSSH_5.3 servers and we sporadically receive a SSH_MSG_UNIMPLEMENTED in the authentication process.

Here's an example from edtftpj logs:

INFO [SCPClient] 18 Dec 2012 15:32:51.933 : SCPClient settings validated.
DEBUG [SCPClient] 18 Dec 2012 15:32:51.933 : Connecting to 10.49.128.217:22
DEBUG [TransportProviderFactory] 18 Dec 2012 15:32:51.933 : Connecting to 10.49.128.217:22 via standard socket
DEBUG [SocketTransportProvider] 18 Dec 2012 15:32:51.933 : Invoking connect with timeout=5000
ALL [TransportProtocolCommon] 18 Dec 2012 15:32:51.935 : Received unregistered message: Name=SSH_MSG_KEXDH_REPLY,MessageId=31
ALL [DhGroup1Sha1] 18 Dec 2012 15:32:51.935 : Name=SSH_MSG_KEXDH_REPLY,MessageId=31
INFO [TransportProtocolCommon] 18 Dec 2012 15:32:51.936 : Timeout=5000
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.936 : Starting transport protocol
INFO [TransportProtocolCommon] 18 Dec 2012 15:32:51.936 : Wait for state update timeout=5000
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.936 : Registering transport protocol messages with inputstream
INFO [TransportProtocolCommon] 18 Dec 2012 15:32:51.936 : Wait for state update timeout=5000
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.936 : Negotiating protocol version
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.936 : Local identification: SSH-2.0-edtFTPjPRO-3.0.3
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.942 : EOL is guessed at CR+LF
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.942 : Remote identification: 'SSH-2.0-OpenSSH_5.3'
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.942 : Protocol negotiation complete
ALL [TransportProtocolCommon] 18 Dec 2012 15:32:51.942 : Name=SSH_MSG_KEX_INIT,MessageId=20
Supported Kex diffie-hellman-group1-sha1
Supported Public Keys ssh-rsa,ssh-dss
Supported Encryption Client->Server 3des-cbc,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc
Supported Encryption Server->Client 3des-cbc,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc
Supported Mac Client->Server hmac-sha1,hmac-md5-96,hmac-sha1-96,hmac-md5
Supported Mac Server->Client hmac-sha1,hmac-md5-96,hmac-sha1-96,hmac-md5
Supported Compression Client->Server none,zlib
Supported Compression Server->Client none,zlib
Supported Languages Client->Server 
Supported Languages Server->Client 
First Kex Packet Follows [FALSE]
INFO [TransportProtocolCommon] 18 Dec 2012 15:32:51.942 : Wait for state update timeout=5000
DEBUG [SshMsgKexInit] 18 Dec 2012 15:32:51.943 : Packetlength=780, Paddinglength=10
ALL [TransportProtocolCommon] 18 Dec 2012 15:32:51.943 : Received registered message: Name=SSH_MSG_KEX_INIT,MessageId=20
Supported Kex diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
Supported Public Keys ssh-rsa,ssh-dss
Supported Encryption Client->Server aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
Supported Encryption Server->Client aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
Supported Mac Client->Server hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported Mac Server->Client hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
Supported Compression Client->Server none,zlib@openssh.com
Supported Compression Server->Client none,zlib@openssh.com
Supported Languages Client->Server 
Supported Languages Server->Client 
First Kex Packet Follows [FALSE]
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Received remote key exchange init message
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Starting key exchange
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Determine Algorithm
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Client Algorithms: [diffie-hellman-group1-sha1]
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Server Algorithms: [diffie-hellman-group-exchange-sha256, diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1]
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Returning diffie-hellman-group1-sha1
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Key exchange algorithm: diffie-hellman-group1-sha1
INFO [DhGroup1Sha1] 18 Dec 2012 15:32:51.944 : Starting client side key exchange.
DEBUG [DhGroup1Sha1] 18 Dec 2012 15:32:51.944 : calculateExchangeHash()
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Verifying host 10.49.128.217
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Preferred algorithm null
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Determine Algorithm
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Client Algorithms: [ssh-rsa, ssh-dss]
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Server Algorithms: [ssh-rsa, ssh-dss]
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Returning ssh-rsa
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.944 : Selected algorithm ssh-rsa
DEBUG [SshRsaPublicKey] 18 Dec 2012 15:32:51.944 : Signature length=271
DEBUG [SshRsaPublicKey] 18 Dec 2012 15:32:51.944 : Verifying signature (com.enterprisedt.cryptix.provider.rsa.SHA1_RSA_PKCS1Signature)
ALL [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Name=SSH_MSG_NEWKEYS,MessageId=21
ALL [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Received registered message: Name=SSH_MSG_NEWKEYS,MessageId=21
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Completing key exchange
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Making keys from key exchange output
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Creating algorithm objects
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Determine Algorithm
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Client Algorithms: [3des-cbc, aes256-cbc, aes192-cbc, aes128-cbc, blowfish-cbc]
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Server Algorithms: [aes128-ctr, aes192-ctr, aes256-ctr, arcfour256, arcfour128, aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, aes192-cbc, aes256-cbc, arcfour, rijndael-cbc@lysator.liu.se]
DEBUG [TransportProtocolCommon] 18 Dec 2012 15:32:51.945 : Returning 3des-cbc
DEBUG [com.enterprisedt.net.j2ssh.transport.cipher.SshCipherFactory] 18 Dec 2012 15:32:51.945 : Creating new 3des-cbc cipher instance
DEBUG [Cipher] 18 Dec 2012 15:32:51.945 : Entered getInstance("DESede", "CBC", "NONE", "CryptixEDT")
DEBUG [Cipher] 18 Dec 2012 15:32:51.945 : cipherName=DES-EDE3,modeName=CBC,paddingName=NONE
DEBUG [IJCE] 18 Dec 2012 15:32:51.945 : getImplementation('DES-EDE3/CBC/NONE','CryptixEDT','Cipher')
DEBUG [IJCE] 18 Dec 2012 15:32:51.945 : getImplementationClass('DES-EDE3/CBC/NONE','CryptixEDT','Cipher')
DEBUG [IJCE] 18 Dec 2012 15:32:51.945 : getClassCandidate('DES-EDE3/CBC/NONE','CryptixEDT','Cipher')
DEBUG [IJCE] 18 Dec 2012 15:32:51.945 : getImplementation('DES-EDE3/CBC','CryptixEDT','Cipher')
DEBUG &

1 Answer

0 votes
by (162k points)
This has been taken offline - will post the resolution when resolved.

Categories

...