Archived Forum Post

Index of archived forum posts

Question:

FromOpenSshPrivateKey returns false, but LastErrorText seems to say everything succeeded

Jan 25 '16 at 08:08

I'm running the SFTP Public-Key Authentication example for VB.net. The FromOpenSshPrivateKey returns false, but LastErrorText seems to say everything succeeded. I'm not sure what to make of the return value. Here is the LastErrorText:

 ChilkatLog:
  Connect:
    DllDate: Aug  3 2011
    UnlockPrefix: UPSDEUSSH
    Username: KYLOULAPP5K8Q:app1dak
    Architecture: Little Endian; 32-bit
    Language: .NET 2.0
    SftpVersion: 0
    ChilkatObjectID: 4532
    hostname: 193.191.216.90
    port: 22
    ConnectTimeoutMs: 5000
    calling ConnectSocket2
    This is an IPV4 numeric address...
    AddrInfoList:
      AddrInfo:
        ai_flags: 4
        ai_family: 2
        ai_socktype: 1
        ai_protocol: 0
        ai_addrlen: 16
        ai_canonname: (NULL)
    Connect using IPV4.
    ipAddress1: 193.191.216.90
    myIP_3: 10.123.10.45
    myPort_3: 62024
    connect successful.
    Established TCP/IP connection with SSH server
    clientIdentifier: SSH-2.0-PuTTY_Local:_May_11_2009_17:22:38
    initialDataFromSshServer: SSH-2.0-SFTP Server

    serverVersion: SSH-2.0-SFTP Server
    KeyExchangeAlgs:
      algorithm: diffie-hellman-group1-sha1
      algorithm: diffie-hellman-group14-sha1
      algorithm: diffie-hellman-group-exchange-sha1
      algorithm: diffie-hellman-group-exchange-sha256
    HostKeyAlgs:
      algorithm: ssh-rsa
    EncCS:
      algorithm: blowfish-cbc
      algorithm: 3des-ctr
      algorithm: aes128-ctr
      algorithm: aes192-ctr
      algorithm: aes256-ctr
      algorithm: 3des-cbc
      algorithm: aes128-cbc
      algorithm: aes192-cbc
      algorithm: aes256-cbc
      algorithm: arcfour
      algorithm: arcfour128
      algorithm: arcfour256
      algorithm: twofish256-cbc
      algorithm: twofish192-cbc
      algorithm: twofish128-cbc
      algorithm: cast128-cbc
    EncSC:
      algorithm: blowfish-cbc
      algorithm: 3des-ctr
      algorithm: aes128-ctr
      algorithm: aes192-ctr
      algorithm: aes256-ctr
      algorithm: 3des-cbc
      algorithm: aes128-cbc
      algorithm: aes192-cbc
      algorithm: aes256-cbc
      algorithm: arcfour
      algorithm: arcfour128
      algorithm: arcfour256
      algorithm: twofish256-cbc
      algorithm: twofish192-cbc
      algorithm: twofish128-cbc
      algorithm: cast128-cbc
    MacCS:
      algorithm: hmac-sha1
      algorithm: hmac-md5
      algorithm: hmac-md5-96
      algorithm: hmac-sha1-96
      algorithm: hmac-sha256
      algorithm: hmac-sha2-256
      algorithm: hmac-sha256@ssh.com
    MacSC:
      algorithm: hmac-sha1
      algorithm: hmac-md5
      algorithm: hmac-md5-96
      algorithm: hmac-sha1-96
      algorithm: hmac-sha256
      algorithm: hmac-sha2-256
      algorithm: hmac-sha256@ssh.com
    CompCS:
      algorithm: none
      algorithm: zlib
    CompSC:
      algorithm: none
      algorithm: zlib
    Encryption: 256-bit AES
    Encryption: 256-bit AES
    MAC: HMAC-SHA1
    MAC: HMAC-SHA1
    Compression: none
    Compression: none
    Key Exchange: DH Group Exchange SHA256
    Host Key Algorithm: RSA
    numBits: 256
    pbits: 4096
    Using GEX Group.
    Sending KEX_DH_GEX_REQUEST...
    pbits: 4096
    Received GEX Group.
    Sent e to server.
    Using SHA256 for Exchange Hash
    RSA host key parsed successfully.
    keyXml: <RSAKeyValue><Modulus>h8ASEtD1JwXo1cqi9uFZm6op9TeSx1YGqFj4DKZiyElNaVx81tP3OVpuv1STZU5MmFgWD3DA36/4i3ra0MfUK2+Nx7IC+NjgBMfqIbGIqNP4WrNLWopjoVwpzqhTMhJ8U+a4BmH+hyL4FrF34XGsSJEaR5ru1up6AGnWbeLzECiEv3COP9U7IszongCbF7E2d1Da2RChNFk8JBRa8sgFc1v+7aN9yIj0fpivNMDq2h76mL4edQlf5Pamg/AaFve6wS6f6pfaVSwJyFVHh5avsYJmx/5jE3nmrPYhiX3VeIJEMXDRMKvwuG3mi1wjj82KfQzh/RRGaUcwC4t4PkBu6Q==</Modulus><Exponent>AQAB</Exponent></RSAKeyValue>
    HostKeyNumBits: 2048
    RSA signature verification success.
    Sending newkeys to server...
    Expecting newkeys from server...
    SSH Key Exchange Success.
    Outgoing encryption is now AES 256
    algorithm: aes
    keyLength: 256
    Success.

Accepted Answer

You are showing the LastErrorText for the ssh object, not the key object. The name of the method is in the 2nd line of the LastErrorText. If you called FromOpenSshPrivateKey, and you do not see "FromOpenSshPrivateKey" in the 2nd line, then you're NOT looking at the LastErrorText for that particular method call.


Answer

DllDate: Aug  3 2011
Have you tried the current release? This is almost 5 years old.