TablePlus / TablePlus-Windows

TablePlus Windows issue tracker
https://tableplus.com
187 stars 3 forks source link

SSH Error Invalid private key #658

Open glaucosydow opened 7 months ago

glaucosydow commented 7 months ago

Please answer the questions below, it helps us to track the issue.

  1. Which driver are you using and version of it (Ex: PostgreSQL 10.0): Mysql 8.0.22

  2. Which TablePlus build number are you using (the number on the welcome screen, Ex: build 81): Build 262 - WINDOWS 10

  3. The steps to reproduce this issue:

I purchased a TablePlus license but I'm getting an SSH Error - Invalid private key error. I have already uninstalled and reinstalled the software, but the problem persists. The private key I'm using is working normally.

LOG: [23:18:32.414240] getai: host 000.00.000.00 (omitted) matches an IP address [23:18:32.415228] ssh_socket_connect: Nonblocking connection socket: 3624 [23:18:32.415228] ssh_connect: Socket connecting, now waiting for the callbacks to work [23:18:32.415228] ssh_connect: Actual timeout : 120000 [23:18:32.538927] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0 [23:18:32.538927] ssh_socket_pollcallback: Received POLLOUT in connecting state [23:18:32.538927] socket_callback_connected: Socket connection callback: 1 (0) [23:18:32.538927] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [23:18:32.538927] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0 [23:18:32.668006] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0 [23:18:32.668938] callback_receive_banner: Received banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11 [23:18:32.668938] ssh_client_connection_callback: SSH server banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11 [23:18:32.668938] ssh_analyze_banner: Analyzing banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11 [23:18:32.668938] ssh_analyze_banner: We are talking to an OpenSSH client version: 8.2 (80200) [23:18:32.669938] ssh_client_select_hostkeys: Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [23:18:32.670937] ssh_known_hosts_read_entries: Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory [23:18:32.670937] ssh_client_select_hostkeys: No key found in known_hosts; changing host key method to "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [23:18:32.670937] ssh_list_kex: kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c [23:18:32.670937] ssh_list_kex: server host key algo: ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss [23:18:32.670937] ssh_list_kex: encryption client->server: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [23:18:32.670937] ssh_list_kex: encryption server->client: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [23:18:32.670937] ssh_list_kex: mac algo client->server: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [23:18:32.670937] ssh_list_kex: mac algo server->client: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [23:18:32.670937] ssh_list_kex: compression algo client->server: none [23:18:32.670937] ssh_list_kex: compression algo server->client: none [23:18:32.670937] ssh_list_kex: languages client->server: [23:18:32.670937] ssh_list_kex: languages server->client: [23:18:32.671924] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [23:18:32.671924] packet_send2: packet: wrote [type=20, len=972, padding_size=10, comp=961, payload=961] [23:18:32.671924] ssh_send_kex: SSH_MSG_KEXINIT sent [23:18:32.671924] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0 [23:18:32.671924] ssh_socket_pollcallback: sending control flow event [23:18:32.671924] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [23:18:32.791206] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0 [23:18:32.792196] ssh_packet_socket_callback: packet: read type 20 [len=1076,padding=5,comp=1070,payload=1070] [23:18:32.792196] ssh_packet_process: Dispatching handler for packet type 20 [23:18:32.792196] ssh_list_kex: kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,kex-strict-s-v00@openssh.com [23:18:32.792196] ssh_list_kex: server host key algo: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [23:18:32.792196] ssh_list_kex: encryption client->server: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [23:18:32.792196] ssh_list_kex: encryption server->client: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [23:18:32.792196] ssh_list_kex: mac algo client->server: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [23:18:32.792196] ssh_list_kex: mac algo server->client: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [23:18:32.792196] ssh_list_kex: compression algo client->server: none,zlib@openssh.com [23:18:32.792196] ssh_list_kex: compression algo server->client: none,zlib@openssh.com [23:18:32.792196] ssh_list_kex: languages client->server: [23:18:32.792196] ssh_list_kex: languages server->client: [23:18:32.793185] ssh_kex_select_methods: Negotiated curve25519-sha256,ssh-ed25519,aes256-gcm@openssh.com,aes256-gcm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-256-etm@openssh.com,none,none,, [23:18:32.801182] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [23:18:32.801182] packet_send2: packet: wrote [type=30, len=44, padding_size=6, comp=37, payload=37] [23:18:32.801182] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0 [23:18:32.801182] ssh_socket_pollcallback: sending control flow event [23:18:32.801182] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [23:18:32.935344] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0 [23:18:32.935344] ssh_packet_socket_callback: packet: read type 31 [len=188,padding=8,comp=179,payload=179] [23:18:32.935344] ssh_packet_process: Dispatching handler for packet type 31 [23:18:32.944437] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [23:18:32.944437] packet_send2: packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1] [23:18:32.944437] ssh_packet_set_newkeys: called, direction = OUT [23:18:32.945403] crypt_set_algorithms2: Set output algorithm to aes256-gcm@openssh.com [23:18:32.945403] crypt_set_algorithms2: Set HMAC output algorithm to aead-gcm [23:18:32.945403] crypt_set_algorithms2: Set input algorithm to aes256-gcm@openssh.com [23:18:32.945403] crypt_set_algorithms2: Set HMAC input algorithm to aead-gcm [23:18:32.946436] ssh_init_rekey_state: Set rekey after 4294967296 blocks [23:18:32.946436] ssh_init_rekey_state: Set rekey after 4294967296 blocks [23:18:32.946436] ssh_packet_client_curve25519_reply: SSH_MSG_NEWKEYS sent [23:18:32.946436] ssh_packet_socket_callback: Processing 244 bytes left in socket buffer [23:18:32.946436] ssh_packet_socket_callback: packet: read type 21 [len=12,padding=10,comp=1,payload=1] [23:18:32.946436] ssh_packet_process: Dispatching handler for packet type 21 [23:18:32.946436] ssh_packet_newkeys: Received SSH_MSG_NEWKEYS [23:18:32.946436] ssh_pki_signature_verify: Going to verify a ssh-ed25519 type signature [23:18:32.956436] ssh_packet_newkeys: Signature verified and valid [23:18:32.956436] ssh_packet_set_newkeys: called, direction = IN [23:18:32.956436] ssh_packet_socket_callback: Processing 228 bytes left in socket buffer [23:18:32.956436] ssh_packet_socket_callback: packet: read type 7 [len=208,padding=4,comp=203,payload=203] [23:18:32.956436] ssh_packet_process: Dispatching handler for packet type 7 [23:18:32.956436] ssh_packet_ext_info: Received SSH_MSG_EXT_INFO [23:18:32.956436] ssh_packet_ext_info: Follows 1 extensions [23:18:32.956436] ssh_packet_ext_info: Extension: server-sig-algs=ssh-ed25519,[sk-ssh-ed25519@openssh.com](mailto:sk-ssh-ed25519@openssh.com),ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[sk-ecdsa-sha2-nistp256@openssh.com](mailto:sk-ecdsa-sha2-nistp256@openssh.com) [23:18:32.957389] ssh_connect: current state : 7 [23:18:32.957389] ssh_userauth_publickey: Invalid private key Noted: If the bug is related to data, please attach an example SQL data.

huyphams commented 7 months ago

The console log show that: ssh_userauth_publickey: Invalid private key

May I ask which private key type are you using? RSA, openSSH?