You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@mina.apache.org by "Jean-Sebastien Delfino (JIRA)" <ji...@apache.org> on 2010/03/13 18:28:27 UTC

[jira] Created: (VYSPER-188) java.security.KeyStoreException running XMPPServer with Apache Harmony

java.security.KeyStoreException running XMPPServer with Apache Harmony
----------------------------------------------------------------------

                 Key: VYSPER-188
                 URL: https://issues.apache.org/jira/browse/VYSPER-188
             Project: VYSPER
          Issue Type: Bug
          Components: authentication
         Environment: Ubuntu 9.10
Apache Harmony harmony 5.0 M12a
            Reporter: Jean-Sebastien Delfino


Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:

java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
    at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
    at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
    at test.TestVysperServer.main(TestVysperServer.java:60)
Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
    at java.security.KeyStore.getInstance(KeyStore.java:120)
    at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
    at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
    at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
    at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
    ... 1 more

The same test [1] runs OK with other JDKs.

Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)

[1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
[2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
[3] http://issues.apache.org/jira/browse/HARMONY-6098


-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


Re: [jira] Commented: (VYSPER-188) java.security.KeyStoreException running XMPPServer with Apache Harmony

Posted by Bernd Fondermann <be...@googlemail.com>.
On Tue, Mar 16, 2010 at 07:42, Jean-Sebastien Delfino (JIRA)
<ji...@apache.org> wrote:
>
>    [ https://issues.apache.org/jira/browse/VYSPER-188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12845741#action_12845741 ]
>
> Jean-Sebastien Delfino commented on VYSPER-188:
> -----------------------------------------------
>
> I asked on dev@harmony [1].
>
> Here's the output with -Djsse=engine,socket,alert,record,conn_state,prf,ssocket. I'm not sure what to do with that trace though :)

mmhhh. According to the SSH RFCs, message type 128 is from the
"reserved for client protocol" range, while type 21 is
SSH_MSG_NEWKEYS.
so, seems to be a problem in the (pre-)authentication handshake, maybe.

  Bernd

>
> Starting test Vysper server...
> 23:33:24,420 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | replacing the storage provider registry with org.apache.vysper.storage.inmemory.MemoryStorageProviderRegistry
> 23:33:24,807 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... servicediscovery (1.0beta)
> 23:33:24,812 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... roster (1.0beta)
> 23:33:24,916 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0092 Software Version (1.0)
> 23:33:24,918 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0202 Entity Time (1.0)
> 23:33:24,935 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0054 Vcard-temp (1.0)
> 23:33:24,936 | ERROR | org.apache.vysper.xmpp.modules.extension.xep0054_vcardtemp.VcardTempModule | no VcardTempPersistenceManager found
> 23:33:24,936 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0199 XMPP Ping (2.0)
> 23:33:24,938 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0049 Private Data (1.2)
> 23:33:24,939 | ERROR | org.apache.vysper.xmpp.modules.extension.xep0049_privatedata.PrivateDataModule | no PrivateDataPersistenceManager found
> Test Vysper server started...
> 23:33:55,709 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = INITIATED
> 23:33:55,777 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = STARTED
> 23:33:55,797 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = ENCRYPTION_STARTED
> record[pool-2-thread-3] SSLRecordProtocol.unwrap: BEGIN [
> record[pool-2-thread-3] Non v3.1 message type:128
> record[pool-2-thread-3] SSLRecordProtocol:unwrap ] END, SSLv2 type
> record[pool-2-thread-3] SSLRecordProtocol.wrap: TLSPlaintext.fragment[774]:
>  02 00 00 46 03 01 4B 9F 26 56 1C 59 3E 0D 12 D6
>  A3 76 7F BB A8 0E 54 C6 1C 8A 13 8C F1 F6 D0 55
>  17 28 C4 D2 80 38 20 F1 1C FA 35 71 83 F1 8A 55
>  92 50 32 E3 CA 6E 2B E4 0D 0E F0 B8 46 CC 03 B9
>  FD F5 65 4B 9F 26 56 00 16 00 0B 00 01 E7 00 01
>  E4 00 01 E1 30 82 01 DD 30 82 01 89 A0 03 02 01
>  02 02 04 15 F4 C7 12 30 0B 06 09 2A 86 48 86 F7
>  0D 01 01 04 30 6D 31 0B 30 09 06 03 55 04 06 13
>  02 53 45 31 12 30 10 06 03 55 04 07 13 09 53 74
>  6F 63 6B 68 6F 6C 6D 31 25 30 23 06 03 55 04 0A
>  13 1C 42 6F 67 75 73 54 72 75 73 74 4D 61 6E 61
>  67 65 72 46 61 63 74 6F 72 79 20 49 6E 63 31 0F
>  30 0D 06 03 55 04 0B 13 06 58 58 58 20 43 41 31
>  12 30 10 06 03 55 04 03 13 09 62 6F 67 75 73 2E
>  63 6F 6D 30 1E 17 0D 31 30 30 33 31 32 31 38 34
>  35 31 36 5A 17 0D 32 30 30 33 30 39 31 38 34 35
>  31 36 5A 30 6D 31 0B 30 09 06 03 55 04 06 13 02
>  53 45 31 12 30 10 06 03 55 04 07 13 09 53 74 6F
>  63 6B 68 6F 6C 6D 31 25 30 23 06 03 55 04 0A 13
>  1C 42 6F 67 75 73 54 72 75 73 74 4D 61 6E 61 67
>  65 72 46 61 63 74 6F 72 79 20 49 6E 63 31 0F 30
>  0D 06 03 55 04 0B 13 06 58 58 58 20 43 41 31 12
>  30 10 06 03 55 04 03 13 09 62 6F 67 75 73 2E 63
>  6F 6D 30 5C 30 0D 06 09 2A 86 48 86 F7 0D 01 01
>  01 05 00 03 4B 00 30 48 02 41 00 CD DF 3D 26 37
>  FE 4B 30 0A 0F BA 8E 80 F9 2D BA 72 89 86 FC 10
>  E0 BC 29 15 2A 77 22 21 7D A1 DF C8 89 37 9E E0
>  6D C4 37 4B 96 6C 56 CC 9A C9 69 BE 79 84 F4 D8
>  B9 40 D7 25 90 8D 0F 83 0A 4B 91 02 03 01 00 01
>  A3 13 30 11 30 0F 06 03 55 1D 13 04 08 30 06 02
>  04 7F FF FF FF 30 0B 06 09 2A 86 48 86 F7 0D 01
>  01 04 03 41 00 8F DA 1F 3D 7D EE E4 D3 D8 83 E1
>  71 45 CF 4A BA 92 4B 16 D8 73 71 94 68 E9 3C 1A
>  D1 69 E7 24 E3 96 B5 F7 41 09 19 1E CA 03 BB 1D
>  7E 9F 2C 96 63 AF 2F F3 03 92 59 18 09 14 1C B0
>  69 4F C8 39 35 0C 00 00 C9 00 40 F5 2A FF 3C E1
>  B1 29 40 18 11 8D 7C 84 A7 0A 72 D6 86 C4 03 19
>  C8 07 29 7A CA 95 0C D9 96 9F AB D0 0A 50 9B 02
>  46 D3 08 3D 66 A4 5D 41 9F 9C 7C BD 89 4B 22 19
>  26 BA AB A2 5E C3 55 E9 2A 05 5F 00 01 02 00 40
>  9D 80 16 10 3B BB B0 78 3C 47 CE DC 0A 84 87 50
>  09 68 6D B5 07 D3 51 18 AA 31 0E 2D C8 99 27 66
>  0F D8 38 52 BD 28 AF 3B A3 31 C9 54 5B A8 5C 3F
>  27 05 DD F6 E4 70 76 B3 95 96 46 75 F6 2D E1 72
>  00 40 5F 29 EA A5 07 5C 3B B6 31 15 1D 14 EE 90
>  05 59 77 25 B0 98 10 6B 09 18 44 46 3E 28 74 E4
>  AF 3E F5 C1 D8 21 05 73 F0 94 EA BC E8 D3 58 E0
>  B5 34 53 0E 39 25 0A FB CB 8E 94 F9 47 33 D1 CC
>  21 B2 0E 00 00 00
> record[pool-2-thread-3] SSLRecordProtocol.unwrap: BEGIN [
> record[pool-2-thread-3] Got the message of type: 21
> record[pool-2-thread-3] TLSCiphertext.fragment[2]: ...
>  02 33
> record[pool-2-thread-3] SSLRecordProtocol.allert: 2 51
> alert[pool-2-thread-3] Alert.alert: 2 51
> record[pool-2-thread-3] SSLRecordProtocol:unwrap ] END, type: 21
> alert[pool-2-thread-3] Alert.setProcessed
> 23:33:59,021 | WARN  | org.apache.mina.filter.logging.LoggingFilter | EXCEPTION :
> javax.net.ssl.SSLHandshakeException: SSL handshake failed.
>        at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
>        at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
>        at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
>        at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
>        at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
>        at java.lang.Thread.run(Thread.java:669)
> Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
>        at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
>        at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
>        at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
>        at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
>        at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
>        at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
>        at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
>        ... 14 more
> 23:33:59,024 | WARN  | org.apache.vysper.mina.XmppIoHandlerAdapter | error caught on transportation layer: {}
> javax.net.ssl.SSLHandshakeException: SSL handshake failed.
>        at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
>        at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
>        at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
>        at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
>        at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
>        at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
>        at java.lang.Thread.run(Thread.java:669)
> Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
>        at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
>        at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
>        at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
>        at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
>        at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
>        at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
>        at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
>        at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
>        ... 14 more
>
> [1] http://www.mail-archive.com/dev@harmony.apache.org/msg19506.html
>
>
>> java.security.KeyStoreException running XMPPServer with Apache Harmony
>> ----------------------------------------------------------------------
>>
>>                 Key: VYSPER-188
>>                 URL: https://issues.apache.org/jira/browse/VYSPER-188
>>             Project: VYSPER
>>          Issue Type: Bug
>>          Components: authentication
>>         Environment: Ubuntu 9.10
>> Apache Harmony harmony 5.0 M12a
>>            Reporter: Jean-Sebastien Delfino
>>
>> Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
>> java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
>>     at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
>>     at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>>     at test.TestVysperServer.main(TestVysperServer.java:60)
>> Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
>>     at java.security.KeyStore.getInstance(KeyStore.java:120)
>>     at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
>>     at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
>>     at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
>>     at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>>     ... 1 more
>> The same test [1] runs OK with other JDKs.
>> Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
>> [1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
>> [2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
>> [3] http://issues.apache.org/jira/browse/HARMONY-6098
>
> --
> This message is automatically generated by JIRA.
> -
> You can reply to this email to add a comment to the issue online.
>
>

[jira] Commented: (VYSPER-188) java.security.KeyStoreException running XMPPServer with Apache Harmony

Posted by "Niklas Gustavsson (JIRA)" <ji...@apache.org>.
    [ https://issues.apache.org/jira/browse/VYSPER-188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12844955#action_12844955 ] 

Niklas Gustavsson commented on VYSPER-188:
------------------------------------------

Is it possible to get a SSL trace with Harmony, similar to javas.net.ssl.debug? If so, would be great if we could it attached to this issue.

> java.security.KeyStoreException running XMPPServer with Apache Harmony
> ----------------------------------------------------------------------
>
>                 Key: VYSPER-188
>                 URL: https://issues.apache.org/jira/browse/VYSPER-188
>             Project: VYSPER
>          Issue Type: Bug
>          Components: authentication
>         Environment: Ubuntu 9.10
> Apache Harmony harmony 5.0 M12a
>            Reporter: Jean-Sebastien Delfino
>
> Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
> java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
>     at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
>     at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>     at test.TestVysperServer.main(TestVysperServer.java:60)
> Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
>     at java.security.KeyStore.getInstance(KeyStore.java:120)
>     at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
>     at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
>     at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
>     at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>     ... 1 more
> The same test [1] runs OK with other JDKs.
> Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
> [1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
> [2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
> [3] http://issues.apache.org/jira/browse/HARMONY-6098

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


[jira] Commented: (VYSPER-188) java.security.KeyStoreException running XMPPServer with Apache Harmony

Posted by "Jean-Sebastien Delfino (JIRA)" <ji...@apache.org>.
    [ https://issues.apache.org/jira/browse/VYSPER-188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12845741#action_12845741 ] 

Jean-Sebastien Delfino commented on VYSPER-188:
-----------------------------------------------

I asked on dev@harmony [1].

Here's the output with -Djsse=engine,socket,alert,record,conn_state,prf,ssocket. I'm not sure what to do with that trace though :)

Starting test Vysper server...
23:33:24,420 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | replacing the storage provider registry with org.apache.vysper.storage.inmemory.MemoryStorageProviderRegistry
23:33:24,807 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... servicediscovery (1.0beta)
23:33:24,812 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... roster (1.0beta)
23:33:24,916 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0092 Software Version (1.0)
23:33:24,918 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0202 Entity Time (1.0)
23:33:24,935 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0054 Vcard-temp (1.0)
23:33:24,936 | ERROR | org.apache.vysper.xmpp.modules.extension.xep0054_vcardtemp.VcardTempModule | no VcardTempPersistenceManager found
23:33:24,936 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0199 XMPP Ping (2.0)
23:33:24,938 | INFO  | org.apache.vysper.xmpp.server.DefaultServerRuntimeContext | adding module... XEP-0049 Private Data (1.2)
23:33:24,939 | ERROR | org.apache.vysper.xmpp.modules.extension.xep0049_privatedata.PrivateDataModule | no PrivateDataPersistenceManager found
Test Vysper server started...
23:33:55,709 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = INITIATED
23:33:55,777 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = STARTED
23:33:55,797 | DEBUG | org.apache.vysper.xmpp.protocol.SessionStateHolder | session state changed to = ENCRYPTION_STARTED
record[pool-2-thread-3] SSLRecordProtocol.unwrap: BEGIN [
record[pool-2-thread-3] Non v3.1 message type:128
record[pool-2-thread-3] SSLRecordProtocol:unwrap ] END, SSLv2 type
record[pool-2-thread-3] SSLRecordProtocol.wrap: TLSPlaintext.fragment[774]:
 02 00 00 46 03 01 4B 9F 26 56 1C 59 3E 0D 12 D6
 A3 76 7F BB A8 0E 54 C6 1C 8A 13 8C F1 F6 D0 55
 17 28 C4 D2 80 38 20 F1 1C FA 35 71 83 F1 8A 55
 92 50 32 E3 CA 6E 2B E4 0D 0E F0 B8 46 CC 03 B9
 FD F5 65 4B 9F 26 56 00 16 00 0B 00 01 E7 00 01
 E4 00 01 E1 30 82 01 DD 30 82 01 89 A0 03 02 01
 02 02 04 15 F4 C7 12 30 0B 06 09 2A 86 48 86 F7
 0D 01 01 04 30 6D 31 0B 30 09 06 03 55 04 06 13
 02 53 45 31 12 30 10 06 03 55 04 07 13 09 53 74
 6F 63 6B 68 6F 6C 6D 31 25 30 23 06 03 55 04 0A
 13 1C 42 6F 67 75 73 54 72 75 73 74 4D 61 6E 61
 67 65 72 46 61 63 74 6F 72 79 20 49 6E 63 31 0F
 30 0D 06 03 55 04 0B 13 06 58 58 58 20 43 41 31
 12 30 10 06 03 55 04 03 13 09 62 6F 67 75 73 2E
 63 6F 6D 30 1E 17 0D 31 30 30 33 31 32 31 38 34
 35 31 36 5A 17 0D 32 30 30 33 30 39 31 38 34 35
 31 36 5A 30 6D 31 0B 30 09 06 03 55 04 06 13 02
 53 45 31 12 30 10 06 03 55 04 07 13 09 53 74 6F
 63 6B 68 6F 6C 6D 31 25 30 23 06 03 55 04 0A 13
 1C 42 6F 67 75 73 54 72 75 73 74 4D 61 6E 61 67
 65 72 46 61 63 74 6F 72 79 20 49 6E 63 31 0F 30
 0D 06 03 55 04 0B 13 06 58 58 58 20 43 41 31 12
 30 10 06 03 55 04 03 13 09 62 6F 67 75 73 2E 63
 6F 6D 30 5C 30 0D 06 09 2A 86 48 86 F7 0D 01 01
 01 05 00 03 4B 00 30 48 02 41 00 CD DF 3D 26 37
 FE 4B 30 0A 0F BA 8E 80 F9 2D BA 72 89 86 FC 10
 E0 BC 29 15 2A 77 22 21 7D A1 DF C8 89 37 9E E0
 6D C4 37 4B 96 6C 56 CC 9A C9 69 BE 79 84 F4 D8
 B9 40 D7 25 90 8D 0F 83 0A 4B 91 02 03 01 00 01
 A3 13 30 11 30 0F 06 03 55 1D 13 04 08 30 06 02
 04 7F FF FF FF 30 0B 06 09 2A 86 48 86 F7 0D 01
 01 04 03 41 00 8F DA 1F 3D 7D EE E4 D3 D8 83 E1
 71 45 CF 4A BA 92 4B 16 D8 73 71 94 68 E9 3C 1A
 D1 69 E7 24 E3 96 B5 F7 41 09 19 1E CA 03 BB 1D
 7E 9F 2C 96 63 AF 2F F3 03 92 59 18 09 14 1C B0
 69 4F C8 39 35 0C 00 00 C9 00 40 F5 2A FF 3C E1
 B1 29 40 18 11 8D 7C 84 A7 0A 72 D6 86 C4 03 19
 C8 07 29 7A CA 95 0C D9 96 9F AB D0 0A 50 9B 02
 46 D3 08 3D 66 A4 5D 41 9F 9C 7C BD 89 4B 22 19
 26 BA AB A2 5E C3 55 E9 2A 05 5F 00 01 02 00 40
 9D 80 16 10 3B BB B0 78 3C 47 CE DC 0A 84 87 50
 09 68 6D B5 07 D3 51 18 AA 31 0E 2D C8 99 27 66
 0F D8 38 52 BD 28 AF 3B A3 31 C9 54 5B A8 5C 3F
 27 05 DD F6 E4 70 76 B3 95 96 46 75 F6 2D E1 72
 00 40 5F 29 EA A5 07 5C 3B B6 31 15 1D 14 EE 90
 05 59 77 25 B0 98 10 6B 09 18 44 46 3E 28 74 E4
 AF 3E F5 C1 D8 21 05 73 F0 94 EA BC E8 D3 58 E0
 B5 34 53 0E 39 25 0A FB CB 8E 94 F9 47 33 D1 CC
 21 B2 0E 00 00 00
record[pool-2-thread-3] SSLRecordProtocol.unwrap: BEGIN [
record[pool-2-thread-3] Got the message of type: 21
record[pool-2-thread-3] TLSCiphertext.fragment[2]: ...
 02 33
record[pool-2-thread-3] SSLRecordProtocol.allert: 2 51
alert[pool-2-thread-3] Alert.alert: 2 51
record[pool-2-thread-3] SSLRecordProtocol:unwrap ] END, type: 21
alert[pool-2-thread-3] Alert.setProcessed
23:33:59,021 | WARN  | org.apache.mina.filter.logging.LoggingFilter | EXCEPTION :
javax.net.ssl.SSLHandshakeException: SSL handshake failed.
	at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
	at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
	at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
	at java.lang.Thread.run(Thread.java:669)
Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
	at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
	at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
	at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
	at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
	at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
	at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
	at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	... 14 more
23:33:59,024 | WARN  | org.apache.vysper.mina.XmppIoHandlerAdapter | error caught on transportation layer: {}
javax.net.ssl.SSLHandshakeException: SSL handshake failed.
	at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
	at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
	at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
	at java.lang.Thread.run(Thread.java:669)
Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
	at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
	at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
	at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
	at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
	at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
	at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
	at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	... 14 more

[1] http://www.mail-archive.com/dev@harmony.apache.org/msg19506.html


> java.security.KeyStoreException running XMPPServer with Apache Harmony
> ----------------------------------------------------------------------
>
>                 Key: VYSPER-188
>                 URL: https://issues.apache.org/jira/browse/VYSPER-188
>             Project: VYSPER
>          Issue Type: Bug
>          Components: authentication
>         Environment: Ubuntu 9.10
> Apache Harmony harmony 5.0 M12a
>            Reporter: Jean-Sebastien Delfino
>
> Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
> java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
>     at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
>     at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>     at test.TestVysperServer.main(TestVysperServer.java:60)
> Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
>     at java.security.KeyStore.getInstance(KeyStore.java:120)
>     at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
>     at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
>     at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
>     at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>     ... 1 more
> The same test [1] runs OK with other JDKs.
> Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
> [1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
> [2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
> [3] http://issues.apache.org/jira/browse/HARMONY-6098

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


[jira] Commented: (VYSPER-188) java.security.KeyStoreException running XMPPServer with Apache Harmony

Posted by "Jean-Sebastien Delfino (JIRA)" <ji...@apache.org>.
    [ https://issues.apache.org/jira/browse/VYSPER-188?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12844924#action_12844924 ] 

Jean-Sebastien Delfino commented on VYSPER-188:
-----------------------------------------------

More info:

After patching AbstractTLSContextFactory to use BKS and re-generating a version of bogus_mina_tls.cert with Harmony's keytool, I'm getting through KeyStore.getInstance and Keystore.load but then getting another exception later in the SSL handshake with a client:

javax.net.ssl.SSLHandshakeException: SSL handshake failed.
	at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:433)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.access$1200(DefaultIoFilterChain.java:46)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain$EntryImpl$1.messageReceived(DefaultIoFilterChain.java:793)
	at org.apache.mina.core.filterchain.IoFilterAdapter.messageReceived(IoFilterAdapter.java:119)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.fireMessageReceived(DefaultIoFilterChain.java:426)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.read(AbstractPollingIoProcessor.java:638)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:598)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.process(AbstractPollingIoProcessor.java:587)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor.access$400(AbstractPollingIoProcessor.java:61)
	at org.apache.mina.core.polling.AbstractPollingIoProcessor$Processor.run(AbstractPollingIoProcessor.java:969)
	at org.apache.mina.util.NamePreservingRunnable.run(NamePreservingRunnable.java:64)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1068)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:561)
	at java.lang.Thread.run(Thread.java:669)
Caused by: javax.net.ssl.SSLException: Fatal alert received decrypt_error
	at org.apache.harmony.xnet.provider.jsse.SSLEngineImpl.unwrap(SSLEngineImpl.java:499)
	at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:383)
	at org.apache.mina.filter.ssl.SslHandler.unwrap0(SslHandler.java:671)
	at org.apache.mina.filter.ssl.SslHandler.unwrapHandshake(SslHandler.java:618)
	at org.apache.mina.filter.ssl.SslHandler.handshake(SslHandler.java:480)
	at org.apache.mina.filter.ssl.SslHandler.messageReceived(SslHandler.java:299)
	at org.apache.mina.filter.ssl.SslFilter.messageReceived(SslFilter.java:414)
	at org.apache.mina.core.filterchain.DefaultIoFilterChain.callNextMessageReceived(DefaultIoFilterChain.java:434)
	... 14 more


> java.security.KeyStoreException running XMPPServer with Apache Harmony
> ----------------------------------------------------------------------
>
>                 Key: VYSPER-188
>                 URL: https://issues.apache.org/jira/browse/VYSPER-188
>             Project: VYSPER
>          Issue Type: Bug
>          Components: authentication
>         Environment: Ubuntu 9.10
> Apache Harmony harmony 5.0 M12a
>            Reporter: Jean-Sebastien Delfino
>
> Running XMPPServer on Apache Harmony 5.0 M12a causes this exception:
> java.lang.RuntimeException: java.security.KeyStoreException: KeyStore JKS implementation not found
>     at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:204)
>     at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>     at test.TestVysperServer.main(TestVysperServer.java:60)
> Caused by: java.security.KeyStoreException: KeyStore JKS implementation not found
>     at java.security.KeyStore.getInstance(KeyStore.java:120)
>     at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.createSSLContext(AbstractTLSContextFactory.java:76)
>     at org.apache.vysper.xmpp.cryptography.AbstractTLSContextFactory.getSSLContext(AbstractTLSContextFactory.java:70)
>     at org.apache.vysper.xmpp.server.DefaultServerRuntimeContext.setTlsContextFactory(DefaultServerRuntimeContext.java:202)
>     at org.apache.vysper.xmpp.server.XMPPServer.start(XMPPServer.java:117)
>     ... 1 more
> The same test [1] runs OK with other JDKs.
> Vysper currently hardcodes the Keystore type to JKS [2], which is not supported by Harmony [3] There should be a way to make this configurable and support another Keystore type like Bouncy Castle BKS (perhaps a setter method on AbstractTLSContextFactory and allow for injecting a TLSContextFactory into XMPPServer.)
> [1] http://svn.apache.org/repos/asf/tuscany/sca-cpp/trunk/components/chat/test/TestVysperServer.java
> [2] http://svn.apache.org/repos/asf/mina/sandbox/vysper/trunk/server/core/src/main/java/org/apache/vysper/xmpp/cryptography/AbstractTLSContextFactory.java
> [3] http://issues.apache.org/jira/browse/HARMONY-6098

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.