Question:
I'm running the SFTP Public-Key Authentication example for VB.net. The FromOpenSshPrivateKey returns false, but LastErrorText seems to say everything succeeded. I'm not sure what to make of the return value. Here is the LastErrorText:
ChilkatLog:
Connect:
DllDate: Aug 3 2011
UnlockPrefix: UPSDEUSSH
Username: KYLOULAPP5K8Q:app1dak
Architecture: Little Endian; 32-bit
Language: .NET 2.0
SftpVersion: 0
ChilkatObjectID: 4532
hostname: 193.191.216.90
port: 22
ConnectTimeoutMs: 5000
calling ConnectSocket2
This is an IPV4 numeric address...
AddrInfoList:
AddrInfo:
ai_flags: 4
ai_family: 2
ai_socktype: 1
ai_protocol: 0
ai_addrlen: 16
ai_canonname: (NULL)
Connect using IPV4.
ipAddress1: 193.191.216.90
myIP_3: 10.123.10.45
myPort_3: 62024
connect successful.
Established TCP/IP connection with SSH server
clientIdentifier: SSH-2.0-PuTTY_Local:_May_11_2009_17:22:38
initialDataFromSshServer: SSH-2.0-SFTP Server
serverVersion: SSH-2.0-SFTP Server
KeyExchangeAlgs:
algorithm: diffie-hellman-group1-sha1
algorithm: diffie-hellman-group14-sha1
algorithm: diffie-hellman-group-exchange-sha1
algorithm: diffie-hellman-group-exchange-sha256
HostKeyAlgs:
algorithm: ssh-rsa
EncCS:
algorithm: blowfish-cbc
algorithm: 3des-ctr
algorithm: aes128-ctr
algorithm: aes192-ctr
algorithm: aes256-ctr
algorithm: 3des-cbc
algorithm: aes128-cbc
algorithm: aes192-cbc
algorithm: aes256-cbc
algorithm: arcfour
algorithm: arcfour128
algorithm: arcfour256
algorithm: twofish256-cbc
algorithm: twofish192-cbc
algorithm: twofish128-cbc
algorithm: cast128-cbc
EncSC:
algorithm: blowfish-cbc
algorithm: 3des-ctr
algorithm: aes128-ctr
algorithm: aes192-ctr
algorithm: aes256-ctr
algorithm: 3des-cbc
algorithm: aes128-cbc
algorithm: aes192-cbc
algorithm: aes256-cbc
algorithm: arcfour
algorithm: arcfour128
algorithm: arcfour256
algorithm: twofish256-cbc
algorithm: twofish192-cbc
algorithm: twofish128-cbc
algorithm: cast128-cbc
MacCS:
algorithm: hmac-sha1
algorithm: hmac-md5
algorithm: hmac-md5-96
algorithm: hmac-sha1-96
algorithm: hmac-sha256
algorithm: hmac-sha2-256
algorithm: hmac-sha256@ssh.com
MacSC:
algorithm: hmac-sha1
algorithm: hmac-md5
algorithm: hmac-md5-96
algorithm: hmac-sha1-96
algorithm: hmac-sha256
algorithm: hmac-sha2-256
algorithm: hmac-sha256@ssh.com
CompCS:
algorithm: none
algorithm: zlib
CompSC:
algorithm: none
algorithm: zlib
Encryption: 256-bit AES
Encryption: 256-bit AES
MAC: HMAC-SHA1
MAC: HMAC-SHA1
Compression: none
Compression: none
Key Exchange: DH Group Exchange SHA256
Host Key Algorithm: RSA
numBits: 256
pbits: 4096
Using GEX Group.
Sending KEX_DH_GEX_REQUEST...
pbits: 4096
Received GEX Group.
Sent e to server.
Using SHA256 for Exchange Hash
RSA host key parsed successfully.
keyXml: <RSAKeyValue><Modulus>h8ASEtD1JwXo1cqi9uFZm6op9TeSx1YGqFj4DKZiyElNaVx81tP3OVpuv1STZU5MmFgWD3DA36/4i3ra0MfUK2+Nx7IC+NjgBMfqIbGIqNP4WrNLWopjoVwpzqhTMhJ8U+a4BmH+hyL4FrF34XGsSJEaR5ru1up6AGnWbeLzECiEv3COP9U7IszongCbF7E2d1Da2RChNFk8JBRa8sgFc1v+7aN9yIj0fpivNMDq2h76mL4edQlf5Pamg/AaFve6wS6f6pfaVSwJyFVHh5avsYJmx/5jE3nmrPYhiX3VeIJEMXDRMKvwuG3mi1wjj82KfQzh/RRGaUcwC4t4PkBu6Q==</Modulus><Exponent>AQAB</Exponent></RSAKeyValue>
HostKeyNumBits: 2048
RSA signature verification success.
Sending newkeys to server...
Expecting newkeys from server...
SSH Key Exchange Success.
Outgoing encryption is now AES 256
algorithm: aes
keyLength: 256
Success.
You are showing the LastErrorText for the ssh object, not the key object. The name of the method is in the 2nd line of the LastErrorText. If you called FromOpenSshPrivateKey, and you do not see "FromOpenSshPrivateKey" in the 2nd line, then you're NOT looking at the LastErrorText for that particular method call.
DllDate: Aug 3 2011Have you tried the current release? This is almost 5 years old.