Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

Thread failure in WLS 6.1 SP3

20 views
Skip to first unread message

Robin Ladebue

unread,
Aug 4, 2003, 3:13:38 PM8/4/03
to

Hello,

I'm attempting to use Sshtools (see www.sshtools.com) in a J2EE application to
open an SFTP
session and transfer a file from a remote server. While trying to connect, I
get a "thread
failed" error message and a corrupted MAC exception. I am using 1.3.1 of the
JDK
(I have no choice here) and running my application in Weblogic (version 6.1 sp3).


I can connect to the remote host via the ssh command line interface and when I
run my
programs run successfully when I execute them standalone. Any help is appreciated!

Log and stack trace: (the interesting stuff is near the end):

JAVA version is 1.3.1_03
SUN security provider found
SunRsaSign security provider found
BC security provider found
Loading public key algorithms
The default public key is not set! using first in list
Loading supported cipher algorithms
The default cipher is not set! using first in list
Loading key exchange methods
The default key exchange is not set! using first in list
Loading compression methods
Loading message authentication methods
The default message authentication is not set! using first in list
Starting transport protocol
Registering transport protocol messages with inputstream
Negotiating protocol version
Local identification: SSH-2.0-http://www.sshtools.com J2SSH [CLIENT]
EOL is guessed at LF
Remote identification: SSH-1.99-OpenSSH_3.6.1p1
Protocol negotiation complete
SshMsgKexInit:
Supported Kex [diffie-hellman-group1-sha1]
Supported Public Keys [ssh-rsa, ssh-dss]
Supported Encryption Client->Server [3des-cbc, blowfish-cbc]
Supported Encryption Server->Client [3des-cbc, blowfish-cbc]
Supported Mac Client->Server [hmac-md5-96, hmac-md5, hmac-sha1-96, hmac-sha1]
Supported Mac Server->Client [hmac-md5-96, hmac-md5, hmac-sha1-96, hmac-sha1]
Supported Compression Client->Server [none]
Supported Compression Server->Client [none]
Supported Languages Client->Server []
Supported Languages Server->Client []
First Kex Packet Follows [FALSE]
Sending SSH_MSG_KEX_INIT
Read 536 bytes from socket
Received SSH_MSG_KEX_INIT
Received remote key exchange init message
SshMsgKexInit:
Supported Kex [diffie-hellman-group-exchange-sha1, diffie-hellman-group1-sha1]
Supported Public Keys [ssh-rsa, ssh-dss]
Supported Encryption Client->Server [aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc,
arcfour, aes192-cbc, aes256-cbc, rijnda...@lysator.liu.se]
Supported Encryption Server->Client [aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc,
arcfour, aes192-cbc, aes256-cbc, rijnda...@lysator.liu.se]
Supported Mac Client->Server [hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ri...@openssh.com,
hmac-sha1-96, hmac-md5-96]
Supported Mac Server->Client [hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ri...@openssh.com,
hmac-sha1-96, hmac-md5-96]
Supported Compression Client->Server [none, zlib]
Supported Compression Server->Client [none, zlib]
Supported Languages Client->Server []
Supported Languages Server->Client []
First Kex Packet Follows [FALSE]
Starting key exchange
Determine Algorithm
Client Algorithms: [diffie-hellman-group1-sha1]
Server Algorithms: [diffie-hellman-group-exchange-sha1, diffie-hellman-group1-sha1]
Returning diffie-hellman-group1-sha1
Key exchange algorithm: diffie-hellman-group1-sha1
Starting client side key exchange.
Sending SSH_MSG_KEXDH_INIT
Read 440 bytes from socket
Processing SSH_MSG_KEXDH_REPLY
Determine Algorithm
Client Algorithms: [ssh-rsa, ssh-dss]
Server Algorithms: [ssh-rsa, ssh-dss]
Returning ssh-rsa
Verifying localhost,127.0.0.1 host key
Fingerprint: 1024: af 1a 84 71 78 33 d3 be fa 4c f6 95 fd 65 cd a3
The host key signature is valid
Sending SSH_MSG_NEWKEYS
Read 8 bytes from socket
Received SSH_MSG_NEWKEYS
Completing key exchange
Making keys from key exchange output
Creating algorithm objects
Determine Algorithm
Client Algorithms: [3des-cbc, blowfish-cbc]
Server Algorithms: [aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour,
aes192-cbc, aes256-cbc, rijnda...@lysator.liu.se]
Returning 3des-cbc
Creating new 3des-cbc cipher instance
Determine Algorithm
Client Algorithms: [3des-cbc, blowfish-cbc]
Server Algorithms: [aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour,
aes192-cbc, aes256-cbc, rijnda...@lysator.liu.se]
Returning 3des-cbc
Creating new 3des-cbc cipher instance
Determine Algorithm
Client Algorithms: [hmac-md5-96, hmac-md5, hmac-sha1-96, hmac-sha1]
Server Algorithms: [hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ri...@openssh.com,
hmac-sha1-96, hmac-md5-96]
Returning hmac-md5-96
Determine Algorithm
Client Algorithms: [hmac-md5-96, hmac-md5, hmac-sha1-96, hmac-sha1]
Server Algorithms: [hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ri...@openssh.com,
hmac-sha1-96, hmac-md5-96]
Returning hmac-md5-96
Sending queued messages
Sending SSH_MSG_SERVICE_REQUEST
Read 24 bytes from socket
Received SSH_MSG_SERVICE_ACCEPT
Sending SSH_MSG_USERAUTH_REQUEST
Read 40 bytes from socket
The Transport Protocol thread failed
Exception: message: Corrupt Mac on input.
java.io.IOException: Corrupt Mac on input
at com.sshtools.j2ssh.transport.TransportProtocolInputStream.readMessage(TransportProtocolInputStream.java:308)
at com.sshtools.j2ssh.transport.TransportProtocolCommon.processMessages(TransportProtocolCommon.java:1412)
at com.sshtools.j2ssh.transport.TransportProtocolCommon.startBinaryPacketProtocol(TransportProtocolCommon.java:1013)
at com.sshtools.j2ssh.transport.TransportProtocolCommon.run(TransportProtocolCommon.java:393)
at java.lang.Thread.run(Thread.java:479)

The Transport Protocol has been stopped
Disconnect: Terminating connection
Sending SSH_MSG_DISCONNECT
Failed to send disconnect

Regards,
Robin Ladebue
Principal Engineer
Thomson MICROMEDEX
(303)486-6400
<mailto:robin....@mdx.com>


charvi...@gmail.com

unread,
Jan 16, 2014, 4:45:41 AM1/16/14
to
There is a post for "The Transport Protocol thread failed. java.io.IOException: The socket is EOF" in http://techydiary.com/the-transport-protocol-thread-failed-java-io-ioexception-the-socket-is-eof/ have a look. This might solve your problem.
0 new messages