You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@mina.apache.org by "Jean-Sebastien Delfino (JIRA)" <ji...@apache.org> on 2010/03/13 18:28:27 UTC
[jira] Created: (VYSPER-188) java.security.KeyStoreException
running XMPPServer with Apache Harmony
java.security.KeyStoreException running XMPPServer with Apache Harmony
----------------------------------------------------------------------
Key: VYSPER-188
URL: https://issues.apache.org/jira/browse/VYSPER-188
Project: VYSPER
Issue Type: Bug
Components: authentication
Environment: Ubuntu 9.10
Apache Harmony harmony 5.0 M12a
Reporter: Jean-Sebastien Delfino
Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
at test.TestVysperServer.main(TestVysperServer.java:60)
Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
at java.security.KeyStore.getInstance(KeyStore.java:120)
at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
... 1 more
The same test [1] runs OK with other JDKs.
Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
[1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
[2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
[3] http://issues.apache.org/jira/browse/HARMONY-6098
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
Re: [jira] Commented: (VYSPER-188) java.security.KeyStoreException
running XMPPServer with Apache Harmony
Posted by Bernd Fondermann <be...@googlemail.com>.
On Tue, Mar 16, 2010 at 07:42, Jean-Sebastien Delfino (JIRA)
<ji...@apache.org> wrote:
>
> [ https://issues.apache.org/jira/browse/VYSPER-188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12845741#action_12845741 ]
>
> Jean-Sebastien Delfino commented on VYSPER-188:
> -----------------------------------------------
>
> I asked on dev@harmony [1].
>
> Here's the output with -Djsse=engine,socket,alert,record,conn_state,prf,ssocket. I'm not sure what to do with that trace though :)
mmhhh. According to the SSH RFCs, message type 128 is from the
"reserved for client protocol" range, while type 21 is
SSH_MSG_NEWKEYS.
so, seems to be a problem in the (pre-)authentication handshake, maybe.
Bernd
>
> Starting test Vysper server...
> 23:33:24,420 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | replacing the storage provider registry with org.apache.vysper.storage.inmemory.MemoryStorageProviderRegistry
> 23:33:24,807 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... servicediscovery (1.0beta)
> 23:33:24,812 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... roster (1.0beta)
> 23:33:24,916 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0092 Software Version (1.0)
> 23:33:24,918 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0202 Entity Time (1.0)
> 23:33:24,935 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0054 Vcard-temp (1.0)
> 23:33:24,936 | ERROR | org.apache.vysper.xmpp.modules.extension.xep0054_vcardtemp.VcardTempModule | no VcardTempPersistenceManager found
> 23:33:24,936 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0199 XMPP Ping (2.0)
> 23:33:24,938 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0049 Private Data (1.2)
> 23:33:24,939 | ERROR | org.apache.vysper.xmpp.modules.extension.xep0049_privatedata.PrivateDataModule | no PrivateDataPersistenceManager found
> Test Vysper server started...
> 23:33:55,709 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = INITIATED
> 23:33:55,777 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = STARTED
> 23:33:55,797 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = ENCRYPTION_STARTED
> record[pool-2-thread-3] SSLRecordProtocol.unwrap: BEGIN [
> record[pool-2-thread-3] Non v3.1 message type:128
> record[pool-2-thread-3] SSLRecordProtocol:unwrap ] END, SSLv2 type
> record[pool-2-thread-3] SSLRecordProtocol.wrap: TLSPlaintext.fragment[774]:
> 02 00 00 46 03 01 4B 9F 26 56 1C 59 3E 0D 12 D6
> A3 76 7F BB A8 0E 54 C6 1C 8A 13 8C F1 F6 D0 55
> 17 28 C4 D2 80 38 20 F1 1C FA 35 71 83 F1 8A 55
> 92 50 32 E3 CA 6E 2B E4 0D 0E F0 B8 46 CC 03 B9
> FD F5 65 4B 9F 26 56 00 16 00 0B 00 01 E7 00 01
> E4 00 01 E1 30 82 01 DD 30 82 01 89 A0 03 02 01
> 02 02 04 15 F4 C7 12 30 0B 06 09 2A 86 48 86 F7
> 0D 01 01 04 30 6D 31 0B 30 09 06 03 55 04 06 13
> 02 53 45 31 12 30 10 06 03 55 04 07 13 09 53 74
> 6F 63 6B 68 6F 6C 6D 31 25 30 23 06 03 55 04 0A
> 13 1C 42 6F 67 75 73 54 72 75 73 74 4D 61 6E 61
> 67 65 72 46 61 63 74 6F 72 79 20 49 6E 63 31 0F
> 30 0D 06 03 55 04 0B 13 06 58 58 58 20 43 41 31
> 12 30 10 06 03 55 04 03 13 09 62 6F 67 75 73 2E
> 63 6F 6D 30 1E 17 0D 31 30 30 33 31 32 31 38 34
> 35 31 36 5A 17 0D 32 30 30 33 30 39 31 38 34 35
> 31 36 5A 30 6D 31 0B 30 09 06 03 55 04 06 13 02
> 53 45 31 12 30 10 06 03 55 04 07 13 09 53 74 6F
> 63 6B 68 6F 6C 6D 31 25 30 23 06 03 55 04 0A 13
> 1C 42 6F 67 75 73 54 72 75 73 74 4D 61 6E 61 67
> 65 72 46 61 63 74 6F 72 79 20 49 6E 63 31 0F 30
> 0D 06 03 55 04 0B 13 06 58 58 58 20 43 41 31 12
> 30 10 06 03 55 04 03 13 09 62 6F 67 75 73 2E 63
> 6F 6D 30 5C 30 0D 06 09 2A 86 48 86 F7 0D 01 01
> 01 05 00 03 4B 00 30 48 02 41 00 CD DF 3D 26 37
> FE 4B 30 0A 0F BA 8E 80 F9 2D BA 72 89 86 FC 10
> E0 BC 29 15 2A 77 22 21 7D A1 DF C8 89 37 9E E0
> 6D C4 37 4B 96 6C 56 CC 9A C9 69 BE 79 84 F4 D8
> B9 40 D7 25 90 8D 0F 83 0A 4B 91 02 03 01 00 01
> A3 13 30 11 30 0F 06 03 55 1D 13 04 08 30 06 02
> 04 7F FF FF FF 30 0B 06 09 2A 86 48 86 F7 0D 01
> 01 04 03 41 00 8F DA 1F 3D 7D EE E4 D3 D8 83 E1
> 71 45 CF 4A BA 92 4B 16 D8 73 71 94 68 E9 3C 1A
> D1 69 E7 24 E3 96 B5 F7 41 09 19 1E CA 03 BB 1D
> 7E 9F 2C 96 63 AF 2F F3 03 92 59 18 09 14 1C B0
> 69 4F C8 39 35 0C 00 00 C9 00 40 F5 2A FF 3C E1
> B1 29 40 18 11 8D 7C 84 A7 0A 72 D6 86 C4 03 19
> C8 07 29 7A CA 95 0C D9 96 9F AB D0 0A 50 9B 02
> 46 D3 08 3D 66 A4 5D 41 9F 9C 7C BD 89 4B 22 19
> 26 BA AB A2 5E C3 55 E9 2A 05 5F 00 01 02 00 40
> 9D 80 16 10 3B BB B0 78 3C 47 CE DC 0A 84 87 50
> 09 68 6D B5 07 D3 51 18 AA 31 0E 2D C8 99 27 66
> 0F D8 38 52 BD 28 AF 3B A3 31 C9 54 5B A8 5C 3F
> 27 05 DD F6 E4 70 76 B3 95 96 46 75 F6 2D E1 72
> 00 40 5F 29 EA A5 07 5C 3B B6 31 15 1D 14 EE 90
> 05 59 77 25 B0 98 10 6B 09 18 44 46 3E 28 74 E4
> AF 3E F5 C1 D8 21 05 73 F0 94 EA BC E8 D3 58 E0
> B5 34 53 0E 39 25 0A FB CB 8E 94 F9 47 33 D1 CC
> 21 B2 0E 00 00 00
> record[pool-2-thread-3] SSLRecordProtocol.unwrap: BEGIN [
> record[pool-2-thread-3] Got the message of type: 21
> record[pool-2-thread-3] TLSCiphertext.fragment[2]: ...
> 02 33
> record[pool-2-thread-3] SSLRecordProtocol.allert: 2 51
> alert[pool-2-thread-3] Alert.alert: 2 51
> record[pool-2-thread-3] SSLRecordProtocol:unwrap ] END, type: 21
> alert[pool-2-thread-3] Alert.setProcessed
> 23:33:59,021 | WARN | org.apache.mina.filter.logging.LoggingFilter | EXCEPTION :
> javax.net.ssl.SSLHandshakeException: SSL handshake failed.
> at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
> at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
> at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
> at java.lang.Thread.run(Thread.java:669)
> Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
> at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
> at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
> at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
> at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
> at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
> at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
> at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
> ... 14 more
> 23:33:59,024 | WARN | org.apache.vysper.mina.XmppIoHandlerAdapter | error caught on transportation layer: {}
> javax.net.ssl.SSLHandshakeException: SSL handshake failed.
> at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
> at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
> at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
> at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
> at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
> at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
> at java.lang.Thread.run(Thread.java:669)
> Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
> at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
> at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
> at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
> at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
> at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
> at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
> at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
> at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
> ... 14 more
>
> [1] http://www.mail-archive.com/dev@harmony.apache.org/msg19506.html
>
>
>> java.security.KeyStoreException running XMPPServer with Apache Harmony
>> ----------------------------------------------------------------------
>>
>> Key: VYSPER-188
>> URL: https://issues.apache.org/jira/browse/VYSPER-188
>> Project: VYSPER
>> Issue Type: Bug
>> Components: authentication
>> Environment: Ubuntu 9.10
>> Apache Harmony harmony 5.0 M12a
>> Reporter: Jean-Sebastien Delfino
>>
>> Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
>> java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
>> at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
>> at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>> at test.TestVysperServer.main(TestVysperServer.java:60)
>> Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
>> at java.security.KeyStore.getInstance(KeyStore.java:120)
>> at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
>> at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
>> at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
>> at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>> ... 1 more
>> The same test [1] runs OK with other JDKs.
>> Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
>> [1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
>> [2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
>> [3] http://issues.apache.org/jira/browse/HARMONY-6098
>
> --
> This message is automatically generated by JIRA.
> -
> You can reply to this email to add a comment to the issue online.
>
>
[jira] Commented: (VYSPER-188) java.security.KeyStoreException
running XMPPServer with Apache Harmony
Posted by "Niklas Gustavsson (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/VYSPER-188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12844955#action_12844955 ]
Niklas Gustavsson commented on VYSPER-188:
------------------------------------------
Is it possible to get a SSL trace with Harmony, similar to javas.net.ssl.debug? If so, would be great if we could it attached to this issue.
> java.security.KeyStoreException running XMPPServer with Apache Harmony
> ----------------------------------------------------------------------
>
> Key: VYSPER-188
> URL: https://issues.apache.org/jira/browse/VYSPER-188
> Project: VYSPER
> Issue Type: Bug
> Components: authentication
> Environment: Ubuntu 9.10
> Apache Harmony harmony 5.0 M12a
> Reporter: Jean-Sebastien Delfino
>
> Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
> java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
> at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
> at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
> at test.TestVysperServer.main(TestVysperServer.java:60)
> Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
> at java.security.KeyStore.getInstance(KeyStore.java:120)
> at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
> at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
> at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
> at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
> ... 1 more
> The same test [1] runs OK with other JDKs.
> Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
> [1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
> [2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
> [3] http://issues.apache.org/jira/browse/HARMONY-6098
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Commented: (VYSPER-188) java.security.KeyStoreException
running XMPPServer with Apache Harmony
Posted by "Jean-Sebastien Delfino (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/VYSPER-188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12845741#action_12845741 ]
Jean-Sebastien Delfino commented on VYSPER-188:
-----------------------------------------------
I asked on dev@harmony [1].
Here's the output with -Djsse=engine,socket,alert,record,conn_state,prf,ssocket. I'm not sure what to do with that trace though :)
Starting test Vysper server...
23:33:24,420 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | replacing the storage provider registry with org.apache.vysper.storage.inmemory.MemoryStorageProviderRegistry
23:33:24,807 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... servicediscovery (1.0beta)
23:33:24,812 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... roster (1.0beta)
23:33:24,916 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0092 Software Version (1.0)
23:33:24,918 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0202 Entity Time (1.0)
23:33:24,935 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0054 Vcard-temp (1.0)
23:33:24,936 | ERROR | org.apache.vysper.xmpp.modules.extension.xep0054_vcardtemp.VcardTempModule | no VcardTempPersistenceManager found
23:33:24,936 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0199 XMPP Ping (2.0)
23:33:24,938 | INFO | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0049 Private Data (1.2)
23:33:24,939 | ERROR | org.apache.vysper.xmpp.modules.extension.xep0049_privatedata.PrivateDataModule | no PrivateDataPersistenceManager found
Test Vysper server started...
23:33:55,709 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = INITIATED
23:33:55,777 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = STARTED
23:33:55,797 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = ENCRYPTION_STARTED
record[pool-2-thread-3] SSLRecordProtocol.unwrap: BEGIN [
record[pool-2-thread-3] Non v3.1 message type:128
record[pool-2-thread-3] SSLRecordProtocol:unwrap ] END, SSLv2 type
record[pool-2-thread-3] SSLRecordProtocol.wrap: TLSPlaintext.fragment[774]:
02 00 00 46 03 01 4B 9F 26 56 1C 59 3E 0D 12 D6
A3 76 7F BB A8 0E 54 C6 1C 8A 13 8C F1 F6 D0 55
17 28 C4 D2 80 38 20 F1 1C FA 35 71 83 F1 8A 55
92 50 32 E3 CA 6E 2B E4 0D 0E F0 B8 46 CC 03 B9
FD F5 65 4B 9F 26 56 00 16 00 0B 00 01 E7 00 01
E4 00 01 E1 30 82 01 DD 30 82 01 89 A0 03 02 01
02 02 04 15 F4 C7 12 30 0B 06 09 2A 86 48 86 F7
0D 01 01 04 30 6D 31 0B 30 09 06 03 55 04 06 13
02 53 45 31 12 30 10 06 03 55 04 07 13 09 53 74
6F 63 6B 68 6F 6C 6D 31 25 30 23 06 03 55 04 0A
13 1C 42 6F 67 75 73 54 72 75 73 74 4D 61 6E 61
67 65 72 46 61 63 74 6F 72 79 20 49 6E 63 31 0F
30 0D 06 03 55 04 0B 13 06 58 58 58 20 43 41 31
12 30 10 06 03 55 04 03 13 09 62 6F 67 75 73 2E
63 6F 6D 30 1E 17 0D 31 30 30 33 31 32 31 38 34
35 31 36 5A 17 0D 32 30 30 33 30 39 31 38 34 35
31 36 5A 30 6D 31 0B 30 09 06 03 55 04 06 13 02
53 45 31 12 30 10 06 03 55 04 07 13 09 53 74 6F
63 6B 68 6F 6C 6D 31 25 30 23 06 03 55 04 0A 13
1C 42 6F 67 75 73 54 72 75 73 74 4D 61 6E 61 67
65 72 46 61 63 74 6F 72 79 20 49 6E 63 31 0F 30
0D 06 03 55 04 0B 13 06 58 58 58 20 43 41 31 12
30 10 06 03 55 04 03 13 09 62 6F 67 75 73 2E 63
6F 6D 30 5C 30 0D 06 09 2A 86 48 86 F7 0D 01 01
01 05 00 03 4B 00 30 48 02 41 00 CD DF 3D 26 37
FE 4B 30 0A 0F BA 8E 80 F9 2D BA 72 89 86 FC 10
E0 BC 29 15 2A 77 22 21 7D A1 DF C8 89 37 9E E0
6D C4 37 4B 96 6C 56 CC 9A C9 69 BE 79 84 F4 D8
B9 40 D7 25 90 8D 0F 83 0A 4B 91 02 03 01 00 01
A3 13 30 11 30 0F 06 03 55 1D 13 04 08 30 06 02
04 7F FF FF FF 30 0B 06 09 2A 86 48 86 F7 0D 01
01 04 03 41 00 8F DA 1F 3D 7D EE E4 D3 D8 83 E1
71 45 CF 4A BA 92 4B 16 D8 73 71 94 68 E9 3C 1A
D1 69 E7 24 E3 96 B5 F7 41 09 19 1E CA 03 BB 1D
7E 9F 2C 96 63 AF 2F F3 03 92 59 18 09 14 1C B0
69 4F C8 39 35 0C 00 00 C9 00 40 F5 2A FF 3C E1
B1 29 40 18 11 8D 7C 84 A7 0A 72 D6 86 C4 03 19
C8 07 29 7A CA 95 0C D9 96 9F AB D0 0A 50 9B 02
46 D3 08 3D 66 A4 5D 41 9F 9C 7C BD 89 4B 22 19
26 BA AB A2 5E C3 55 E9 2A 05 5F 00 01 02 00 40
9D 80 16 10 3B BB B0 78 3C 47 CE DC 0A 84 87 50
09 68 6D B5 07 D3 51 18 AA 31 0E 2D C8 99 27 66
0F D8 38 52 BD 28 AF 3B A3 31 C9 54 5B A8 5C 3F
27 05 DD F6 E4 70 76 B3 95 96 46 75 F6 2D E1 72
00 40 5F 29 EA A5 07 5C 3B B6 31 15 1D 14 EE 90
05 59 77 25 B0 98 10 6B 09 18 44 46 3E 28 74 E4
AF 3E F5 C1 D8 21 05 73 F0 94 EA BC E8 D3 58 E0
B5 34 53 0E 39 25 0A FB CB 8E 94 F9 47 33 D1 CC
21 B2 0E 00 00 00
record[pool-2-thread-3] SSLRecordProtocol.unwrap: BEGIN [
record[pool-2-thread-3] Got the message of type: 21
record[pool-2-thread-3] TLSCiphertext.fragment[2]: ...
02 33
record[pool-2-thread-3] SSLRecordProtocol.allert: 2 51
alert[pool-2-thread-3] Alert.alert: 2 51
record[pool-2-thread-3] SSLRecordProtocol:unwrap ] END, type: 21
alert[pool-2-thread-3] Alert.setProcessed
23:33:59,021 | WARN | org.apache.mina.filter.logging.LoggingFilter | EXCEPTION :
javax.net.ssl.SSLHandshakeException: SSL handshake failed.
at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
at java.lang.Thread.run(Thread.java:669)
Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
... 14 more
23:33:59,024 | WARN | org.apache.vysper.mina.XmppIoHandlerAdapter | error caught on transportation layer: {}
javax.net.ssl.SSLHandshakeException: SSL handshake failed.
at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
at java.lang.Thread.run(Thread.java:669)
Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
... 14 more
[1] http://www.mail-archive.com/dev@harmony.apache.org/msg19506.html
> java.security.KeyStoreException running XMPPServer with Apache Harmony
> ----------------------------------------------------------------------
>
> Key: VYSPER-188
> URL: https://issues.apache.org/jira/browse/VYSPER-188
> Project: VYSPER
> Issue Type: Bug
> Components: authentication
> Environment: Ubuntu 9.10
> Apache Harmony harmony 5.0 M12a
> Reporter: Jean-Sebastien Delfino
>
> Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
> java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
> at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
> at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
> at test.TestVysperServer.main(TestVysperServer.java:60)
> Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
> at java.security.KeyStore.getInstance(KeyStore.java:120)
> at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
> at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
> at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
> at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
> ... 1 more
> The same test [1] runs OK with other JDKs.
> Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
> [1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
> [2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
> [3] http://issues.apache.org/jira/browse/HARMONY-6098
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
[jira] Commented: (VYSPER-188) java.security.KeyStoreException
running XMPPServer with Apache Harmony
Posted by "Jean-Sebastien Delfino (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/VYSPER-188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12844924#action_12844924 ]
Jean-Sebastien Delfino commented on VYSPER-188:
-----------------------------------------------
More info:
After patching AbstractTLSContextFactory to use BKS and re-generating a version of bogus_mina_tls.cert with Harmony's keytool, I'm getting through KeyStore.getInstance and Keystore.load but then getting another exception later in the SSL handshake with a client:
javax.net.ssl.SSLHandshakeException: SSL handshake failed.
at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
at java.lang.Thread.run(Thread.java:669)
Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
... 14 more
> java.security.KeyStoreException running XMPPServer with Apache Harmony
> ----------------------------------------------------------------------
>
> Key: VYSPER-188
> URL: https://issues.apache.org/jira/browse/VYSPER-188
> Project: VYSPER
> Issue Type: Bug
> Components: authentication
> Environment: Ubuntu 9.10
> Apache Harmony harmony 5.0 M12a
> Reporter: Jean-Sebastien Delfino
>
> Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
> java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
> at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
> at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
> at test.TestVysperServer.main(TestVysperServer.java:60)
> Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
> at java.security.KeyStore.getInstance(KeyStore.java:120)
> at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
> at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
> at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
> at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
> ... 1 more
> The same test [1] runs OK with other JDKs.
> Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
> [1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
> [2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
> [3] http://issues.apache.org/jira/browse/HARMONY-6098
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.