Contact Us 1-800-596-4880

Troubleshooting Cryptography Module

To troubleshoot Cryptography Module, become familiar with app logs, PGP protocol, attached and detached signatures, and interpreting commonly thrown messages.

View the App Log

If you encounter problems while running your Mule runtime engine (Mule) app, you can view the app log as follows:

  • If you’re running the app from Anypoint Platform, the output is visible in the Anypoint Studio console window.

  • If you’re running the app using Mule from the command line, the app log is visible in your OS console.

Unless the log file path is customized in the app’s log file log4j2.xml, view the app log in the default location MULE_HOME/logs/<app-name>.log.

Enable Cryptography Module Debug Logging

To begin troubleshooting the Cryptography module, enable debug logging to see the exact error messages:

  1. Access Anypoint Studio and navigate to the Package Explorer view.

  2. Open your application by clicking the project name.

  3. Open the src/main/resources path folder.

  4. Open the log4j2.xml file inside the folder.

  5. Add the following line:

    <AsyncLogger name="com.mulesoft.modules.cryptography" level="DEBUG" />

  1. Save your changes.

  2. Click the project name in Package Explorer and then click Run > Run As > Mule Application.

    In FIPS-enabled environments, not all PGP operations are equally supported. Refer to the Cryptography Module migration guide for a full FIPS support matrix by operation.

Understand PGP Encryption and Decryption Configuration

During PGP encryption, the sender of the message must encrypt its content using the receiver’s public key. To encrypt messages in your Mule app using someone else’s public key, in the Crypto Pgp global configuration add the receiver public keyring file in the Public keyring field.

During PGP decryption, the receiver of the message must use its private key to decrypt the contents of a message that was encrypted using a public key. To decrypt the message, in the Crypto Pgp global configuration add the receiver private keyring file in the Private keyring field.

Global element properties for Crypto PGP with keyring details
Figure 1. Crypto Pgp Global configuration with Public keyring and Private keyring fields

Understand PGP Signature Configuration

In addition to encrypting, you can sign a message. The signature provides an integrity check of the original message.

To create a signature, in the Crypto Pgp global configuration add the sender private keyring file in the Private keyring field.

To validate a signature, in the Crypto Pgp global configuration add the sender public keyring file in the Public keyring field.

PGP Signature Types and Operations

The Cryptography module has two PGP signature operations:

  • Pgp sign: Creates a PGP armored signature in ASCII format.

  • Pgp sign binary: Creates a PGP binary signature.

In both cases, signing includes the private key of the sender, so the secret passphrase must be provided.

There are two types of signatures:

  • Attached signature
    Generates a single document file that contains both the signature and the original document.

  • Detached signature
    Generates a single document file that contains only the signature, which is stored and transmitted separately from the document the signature signs.

Currently, the Cryptography module supports validation of detached signatures only.

Troubleshoot RSA PKCS#1 v1.5 Encryption Disallowed Error

The error RSA PKCS#1 v1.5 encryption disallowed applies to Cryptography Module 2.1.0 and later versions in FIPS-enabled environments.

The PGP Encrypt operation triggers this error when attempting to use RSA PKCS#1 v1.5 for session key encryption. While the OpenPGP standard (RFC 4880) mandates this specific mechanism, FIPS-approved mode explicitly disallows it due to security constraints. Some key considerations:

  • PGP Encrypt operations are unsupported in FIPS mode because the mandated OpenPGP mechanism violates FIPS security constraints.

  • No configuration workarounds exist to enable PGP encryption within a FIPS boundary due to protocol-level limitations.

  • PGP Decrypt and Validate operations remain functional for legacy data as long as the underlying cryptographic material complies with FIPS standards.

If your integration requires PGP encryption, you must perform the encryption step outside of the FIPS-compliant boundary.

Understand Common Throws

Here is a list of common throw messages and how to interpret them:

  • CRYPTO:PARAMETERS
    The operation is configured using invalid parameters. This typically occurs when:

    • Invalid algorithm names are provided

    • Invalid transformation strings are used

    • Required parameters are missing or have incorrect values

    • Element paths in XML operations are invalid or blank

  • CRYPTO:KEY
    General key-related problems. This is a parent error type that encompasses more specific key errors.

  • CRYPTO:MISSING_KEY
    A key required for the operation was not found. This typically occurs when:

    • The specified key alias does not exist in the keystore

    • The keyId referenced in the operation is not configured

    • The keystore file cannot be found or loaded

    • The key identifier (fingerprint, principal, etc.) does not match any key in the keyring

  • CRYPTO:PASSPHRASE
    The unlocking password is invalid. This typically occurs when:

    • The password provided for a private key is incorrect

    • The keystore password is wrong

    • The passphrase for a PGP key is incorrect

  • CRYPTO:CHECKSUM
    An error occurred during an attempt to calculate a checksum. This typically occurs when:

    • The checksum algorithm is not supported

    • The input data is invalid or corrupted

    • There are issues with the underlying cryptographic provider

  • CRYPTO:ENCRYPTION
    An error occurred during an attempt to encrypt data. This typically occurs when:

    • The encryption algorithm is not supported or invalid

    • The key provided is not suitable for encryption

    • The key size is incompatible with the algorithm

    • The payload data is invalid or corrupted

    • Issues with the cryptographic provider configuration

  • CRYPTO:DECRYPTION
    An error occurred during an attempt to decrypt data. This typically occurs when:

    • The decryption algorithm does not match the encryption algorithm used

    • The key provided is incorrect or not suitable for decryption

    • The encrypted data is corrupted or invalid

    • The initialization vector (IV) is missing or incorrect

    • Issues with the cryptographic provider configuration

  • CRYPTO:TRANSFORMATION
    An error occurred during an attempt to transform binary to ASCII to build the ASCII Armor file. This typically occurs when:

    • Issues converting PGP binary data to armored format

    • Problems with Base64 encoding/decoding

    • Data corruption during transformation

  • CRYPTO:SIGNATURE
    An error occurred during an attempt to create a signature. This typically occurs when:

    • The signature algorithm is not supported or invalid

    • The key provided is not suitable for signing

    • The key is missing or not accessible

    • Issues with the cryptographic provider configuration

    • The key type does not match the signature algorithm requirements

  • CRYPTO:VALIDATION
    The signature cannot be validated against the data. This typically occurs when:

    • The signature is invalid or corrupted

    • The data has been modified after signing

    • The public key used for validation does not match the private key used for signing

    • The signature algorithm does not match

    • The certificate has expired or is not yet valid

View on GitHub