Please answer the questions below, it helps us to track the issue.
Which driver are you using and version of it (Ex: PostgreSQL 10.0): Mysql 8.0.22
Which TablePlus build number are you using (the number on the welcome screen, Ex: build 81): Build 262 - WINDOWS 10
The steps to reproduce this issue:
I purchased a TablePlus license but I'm getting an SSH Error - Invalid private key error.
I have already uninstalled and reinstalled the software, but the problem persists. The private key I'm using is working normally.
LOG:
[23:18:32.414240] getai: host 000.00.000.00 (omitted) matches an IP address
[23:18:32.415228] ssh_socket_connect: Nonblocking connection socket: 3624
[23:18:32.415228] ssh_connect: Socket connecting, now waiting for the callbacks to work
[23:18:32.415228] ssh_connect: Actual timeout : 120000
[23:18:32.538927] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0
[23:18:32.538927] ssh_socket_pollcallback: Received POLLOUT in connecting state
[23:18:32.538927] socket_callback_connected: Socket connection callback: 1 (0)
[23:18:32.538927] ssh_socket_unbuffered_write: Enabling POLLOUT for socket
[23:18:32.538927] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0
[23:18:32.668006] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0
[23:18:32.668938] callback_receive_banner: Received banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11
[23:18:32.668938] ssh_client_connection_callback: SSH server banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11
[23:18:32.668938] ssh_analyze_banner: Analyzing banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11
[23:18:32.668938] ssh_analyze_banner: We are talking to an OpenSSH client version: 8.2 (80200)
[23:18:32.669938] ssh_client_select_hostkeys: Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss"
[23:18:32.670937] ssh_known_hosts_read_entries: Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory
[23:18:32.670937] ssh_client_select_hostkeys: No key found in known_hosts; changing host key method to "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss"
[23:18:32.670937] ssh_list_kex: kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c
[23:18:32.670937] ssh_list_kex: server host key algo: ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss
[23:18:32.670937] ssh_list_kex: encryption client->server: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc
[23:18:32.670937] ssh_list_kex: encryption server->client: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc
[23:18:32.670937] ssh_list_kex: mac algo client->server: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[23:18:32.670937] ssh_list_kex: mac algo server->client: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[23:18:32.670937] ssh_list_kex: compression algo client->server: none
[23:18:32.670937] ssh_list_kex: compression algo server->client: none
[23:18:32.670937] ssh_list_kex: languages client->server:
[23:18:32.670937] ssh_list_kex: languages server->client:
[23:18:32.671924] ssh_socket_unbuffered_write: Enabling POLLOUT for socket
[23:18:32.671924] packet_send2: packet: wrote [type=20, len=972, padding_size=10, comp=961, payload=961]
[23:18:32.671924] ssh_send_kex: SSH_MSG_KEXINIT sent
[23:18:32.671924] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0
[23:18:32.671924] ssh_socket_pollcallback: sending control flow event
[23:18:32.671924] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback
[23:18:32.791206] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0
[23:18:32.792196] ssh_packet_socket_callback: packet: read type 20 [len=1076,padding=5,comp=1070,payload=1070]
[23:18:32.792196] ssh_packet_process: Dispatching handler for packet type 20
[23:18:32.792196] ssh_list_kex: kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,kex-strict-s-v00@openssh.com
[23:18:32.792196] ssh_list_kex: server host key algo: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519
[23:18:32.792196] ssh_list_kex: encryption client->server: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
[23:18:32.792196] ssh_list_kex: encryption server->client: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com
[23:18:32.792196] ssh_list_kex: mac algo client->server: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[23:18:32.792196] ssh_list_kex: mac algo server->client: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[23:18:32.792196] ssh_list_kex: compression algo client->server: none,zlib@openssh.com
[23:18:32.792196] ssh_list_kex: compression algo server->client: none,zlib@openssh.com
[23:18:32.792196] ssh_list_kex: languages client->server:
[23:18:32.792196] ssh_list_kex: languages server->client:
[23:18:32.793185] ssh_kex_select_methods: Negotiated curve25519-sha256,ssh-ed25519,aes256-gcm@openssh.com,aes256-gcm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-256-etm@openssh.com,none,none,,
[23:18:32.801182] ssh_socket_unbuffered_write: Enabling POLLOUT for socket
[23:18:32.801182] packet_send2: packet: wrote [type=30, len=44, padding_size=6, comp=37, payload=37]
[23:18:32.801182] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0
[23:18:32.801182] ssh_socket_pollcallback: sending control flow event
[23:18:32.801182] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback
[23:18:32.935344] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0
[23:18:32.935344] ssh_packet_socket_callback: packet: read type 31 [len=188,padding=8,comp=179,payload=179]
[23:18:32.935344] ssh_packet_process: Dispatching handler for packet type 31
[23:18:32.944437] ssh_socket_unbuffered_write: Enabling POLLOUT for socket
[23:18:32.944437] packet_send2: packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1]
[23:18:32.944437] ssh_packet_set_newkeys: called, direction = OUT
[23:18:32.945403] crypt_set_algorithms2: Set output algorithm to aes256-gcm@openssh.com
[23:18:32.945403] crypt_set_algorithms2: Set HMAC output algorithm to aead-gcm
[23:18:32.945403] crypt_set_algorithms2: Set input algorithm to aes256-gcm@openssh.com
[23:18:32.945403] crypt_set_algorithms2: Set HMAC input algorithm to aead-gcm
[23:18:32.946436] ssh_init_rekey_state: Set rekey after 4294967296 blocks
[23:18:32.946436] ssh_init_rekey_state: Set rekey after 4294967296 blocks
[23:18:32.946436] ssh_packet_client_curve25519_reply: SSH_MSG_NEWKEYS sent
[23:18:32.946436] ssh_packet_socket_callback: Processing 244 bytes left in socket buffer
[23:18:32.946436] ssh_packet_socket_callback: packet: read type 21 [len=12,padding=10,comp=1,payload=1]
[23:18:32.946436] ssh_packet_process: Dispatching handler for packet type 21
[23:18:32.946436] ssh_packet_newkeys: Received SSH_MSG_NEWKEYS
[23:18:32.946436] ssh_pki_signature_verify: Going to verify a ssh-ed25519 type signature
[23:18:32.956436] ssh_packet_newkeys: Signature verified and valid
[23:18:32.956436] ssh_packet_set_newkeys: called, direction = IN
[23:18:32.956436] ssh_packet_socket_callback: Processing 228 bytes left in socket buffer
[23:18:32.956436] ssh_packet_socket_callback: packet: read type 7 [len=208,padding=4,comp=203,payload=203]
[23:18:32.956436] ssh_packet_process: Dispatching handler for packet type 7
[23:18:32.956436] ssh_packet_ext_info: Received SSH_MSG_EXT_INFO
[23:18:32.956436] ssh_packet_ext_info: Follows 1 extensions
[23:18:32.956436] ssh_packet_ext_info: Extension: server-sig-algs=ssh-ed25519,[sk-ssh-ed25519@openssh.com](mailto:sk-ssh-ed25519@openssh.com),ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[sk-ecdsa-sha2-nistp256@openssh.com](mailto:sk-ecdsa-sha2-nistp256@openssh.com)
[23:18:32.957389] ssh_connect: current state : 7
[23:18:32.957389] ssh_userauth_publickey: Invalid private key
Noted: If the bug is related to data, please attach an example SQL data.
Please answer the questions below, it helps us to track the issue.
Which driver are you using and version of it (Ex: PostgreSQL 10.0): Mysql 8.0.22
Which TablePlus build number are you using (the number on the welcome screen, Ex: build 81): Build 262 - WINDOWS 10
The steps to reproduce this issue:
I purchased a TablePlus license but I'm getting an SSH Error - Invalid private key error. I have already uninstalled and reinstalled the software, but the problem persists. The private key I'm using is working normally.
LOG: [23:18:32.414240] getai: host 000.00.000.00 (omitted) matches an IP address [23:18:32.415228] ssh_socket_connect: Nonblocking connection socket: 3624 [23:18:32.415228] ssh_connect: Socket connecting, now waiting for the callbacks to work [23:18:32.415228] ssh_connect: Actual timeout : 120000 [23:18:32.538927] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0 [23:18:32.538927] ssh_socket_pollcallback: Received POLLOUT in connecting state [23:18:32.538927] socket_callback_connected: Socket connection callback: 1 (0) [23:18:32.538927] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [23:18:32.538927] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0 [23:18:32.668006] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0 [23:18:32.668938] callback_receive_banner: Received banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11 [23:18:32.668938] ssh_client_connection_callback: SSH server banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11 [23:18:32.668938] ssh_analyze_banner: Analyzing banner: SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11 [23:18:32.668938] ssh_analyze_banner: We are talking to an OpenSSH client version: 8.2 (80200) [23:18:32.669938] ssh_client_select_hostkeys: Order of wanted host keys: "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [23:18:32.670937] ssh_known_hosts_read_entries: Failed to open the known_hosts file '/etc/ssh/ssh_known_hosts': No such file or directory [23:18:32.670937] ssh_client_select_hostkeys: No key found in known_hosts; changing host key method to "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss" [23:18:32.670937] ssh_list_kex: kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,ext-info-c [23:18:32.670937] ssh_list_kex: server host key algo: ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss [23:18:32.670937] ssh_list_kex: encryption client->server: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [23:18:32.670937] ssh_list_kex: encryption server->client: aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc [23:18:32.670937] ssh_list_kex: mac algo client->server: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [23:18:32.670937] ssh_list_kex: mac algo server->client: hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [23:18:32.670937] ssh_list_kex: compression algo client->server: none [23:18:32.670937] ssh_list_kex: compression algo server->client: none [23:18:32.670937] ssh_list_kex: languages client->server: [23:18:32.670937] ssh_list_kex: languages server->client: [23:18:32.671924] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [23:18:32.671924] packet_send2: packet: wrote [type=20, len=972, padding_size=10, comp=961, payload=961] [23:18:32.671924] ssh_send_kex: SSH_MSG_KEXINIT sent [23:18:32.671924] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0 [23:18:32.671924] ssh_socket_pollcallback: sending control flow event [23:18:32.671924] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [23:18:32.791206] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0 [23:18:32.792196] ssh_packet_socket_callback: packet: read type 20 [len=1076,padding=5,comp=1070,payload=1070] [23:18:32.792196] ssh_packet_process: Dispatching handler for packet type 20 [23:18:32.792196] ssh_list_kex: kex algos: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,kex-strict-s-v00@openssh.com [23:18:32.792196] ssh_list_kex: server host key algo: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [23:18:32.792196] ssh_list_kex: encryption client->server: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [23:18:32.792196] ssh_list_kex: encryption server->client: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [23:18:32.792196] ssh_list_kex: mac algo client->server: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [23:18:32.792196] ssh_list_kex: mac algo server->client: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [23:18:32.792196] ssh_list_kex: compression algo client->server: none,zlib@openssh.com [23:18:32.792196] ssh_list_kex: compression algo server->client: none,zlib@openssh.com [23:18:32.792196] ssh_list_kex: languages client->server: [23:18:32.792196] ssh_list_kex: languages server->client: [23:18:32.793185] ssh_kex_select_methods: Negotiated curve25519-sha256,ssh-ed25519,aes256-gcm@openssh.com,aes256-gcm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-256-etm@openssh.com,none,none,, [23:18:32.801182] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [23:18:32.801182] packet_send2: packet: wrote [type=30, len=44, padding_size=6, comp=37, payload=37] [23:18:32.801182] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLOUT ), out buffer 0 [23:18:32.801182] ssh_socket_pollcallback: sending control flow event [23:18:32.801182] ssh_packet_socket_controlflow_callback: sending channel_write_wontblock callback [23:18:32.935344] ssh_socket_pollcallback: Poll callback on socket 3624 (POLLIN ), out buffer 0 [23:18:32.935344] ssh_packet_socket_callback: packet: read type 31 [len=188,padding=8,comp=179,payload=179] [23:18:32.935344] ssh_packet_process: Dispatching handler for packet type 31 [23:18:32.944437] ssh_socket_unbuffered_write: Enabling POLLOUT for socket [23:18:32.944437] packet_send2: packet: wrote [type=21, len=12, padding_size=10, comp=1, payload=1] [23:18:32.944437] ssh_packet_set_newkeys: called, direction = OUT [23:18:32.945403] crypt_set_algorithms2: Set output algorithm to aes256-gcm@openssh.com [23:18:32.945403] crypt_set_algorithms2: Set HMAC output algorithm to aead-gcm [23:18:32.945403] crypt_set_algorithms2: Set input algorithm to aes256-gcm@openssh.com [23:18:32.945403] crypt_set_algorithms2: Set HMAC input algorithm to aead-gcm [23:18:32.946436] ssh_init_rekey_state: Set rekey after 4294967296 blocks [23:18:32.946436] ssh_init_rekey_state: Set rekey after 4294967296 blocks [23:18:32.946436] ssh_packet_client_curve25519_reply: SSH_MSG_NEWKEYS sent [23:18:32.946436] ssh_packet_socket_callback: Processing 244 bytes left in socket buffer [23:18:32.946436] ssh_packet_socket_callback: packet: read type 21 [len=12,padding=10,comp=1,payload=1] [23:18:32.946436] ssh_packet_process: Dispatching handler for packet type 21 [23:18:32.946436] ssh_packet_newkeys: Received SSH_MSG_NEWKEYS [23:18:32.946436] ssh_pki_signature_verify: Going to verify a ssh-ed25519 type signature [23:18:32.956436] ssh_packet_newkeys: Signature verified and valid [23:18:32.956436] ssh_packet_set_newkeys: called, direction = IN [23:18:32.956436] ssh_packet_socket_callback: Processing 228 bytes left in socket buffer [23:18:32.956436] ssh_packet_socket_callback: packet: read type 7 [len=208,padding=4,comp=203,payload=203] [23:18:32.956436] ssh_packet_process: Dispatching handler for packet type 7 [23:18:32.956436] ssh_packet_ext_info: Received SSH_MSG_EXT_INFO [23:18:32.956436] ssh_packet_ext_info: Follows 1 extensions [23:18:32.956436] ssh_packet_ext_info: Extension: server-sig-algs=ssh-ed25519,[sk-ssh-ed25519@openssh.com](mailto:sk-ssh-ed25519@openssh.com),ssh-rsa,rsa-sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[sk-ecdsa-sha2-nistp256@openssh.com](mailto:sk-ecdsa-sha2-nistp256@openssh.com) [23:18:32.957389] ssh_connect: current state : 7 [23:18:32.957389] ssh_userauth_publickey: Invalid private key Noted: If the bug is related to data, please attach an example SQL data.