Are all these signatures cryptographically legitimate for a similar inputs? In that case, how can totally different implementations produce totally different signatures?
Sure. ECDSA as initially and formally outlined (like the sooner DSA utilizing Z_p it’s primarily based on) is randomized; see step 3 at https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm .
A tweak to make it deterministic, however nonetheless safe aside from leaking duplicates, was outlined subsequently in https://www.rfc-editor.org/data/rfc6979 . (For information, Thomas Pornin is a longtime and highranked contributor on https://crypto.stackexchange.com .) Signer implementations, together with these for bitcoin, might use this if the developer chooses; you could find out by doing a number of signature operations on the identical information (or ‘consultant’ hash) and key with the identical implementation and seeing whether or not it repeats.
As well as, ECDSA signatures have the property that the “s” discipline will be negated modulo the subgroup order n and each variations fulfill the verification equation. Years in the past this was utilized in some assaults, and because of this bitcoin now strongly prefers “low s” signatures — your 4 examples all do have “low s” (although that is not a big sufficient pattern to soundly set up these implementations’ conformance with out taking a look at their internals or specs).
Is ECDSA signing deterministic internally, however the signature illustration permits for mathematical equivalence that produces totally different legitimate encodings?
No. Given a specific semantic signature (i.e. values of r and s), the DER encoding is exclusive. (So is the ‘plain’/P1363/PKCS11 encoding used for bitcoin message signatures versus transactions, and in another purposes like JWS.)
Would all these signatures be accepted by Bitcoin community nodes?
Sure, assuming you computed the hash as SHA256d over the proper information.

