These are timing issues, have you tried to run these in a loop? It happens to me in rate of 1:4.
On 25 November 2015 at 14:08, Lyor Goldstein <[email protected]> wrote: > > Don't know what to say - all these tests pass without a problem. There may be > a timing issue, but I can't tell for sure... > > -----Original Message----- > From: Alon Bar-Lev [mailto:[email protected]] > Sent: Tuesday, November 24, 2015 20:14 > To: [email protected] > Cc: Lyor Goldstein <[email protected]> > Subject: Re: KeyReExchangeTest::nio2 occasionally fails > > Another example, different test, same issue at sshd side. > > Tests run: 6, Failures: 1, Errors: 0, Skipped: 0, Time elapsed: 6.974 sec <<< > FAILURE! - in org.apache.sshd.KeyReExchangeTest > testReExchangeFromServerBySize(org.apache.sshd.KeyReExchangeTest) > Time elapsed: 0.419 sec <<< FAILURE! > java.lang.AssertionError: Expected rekeying at > org.apache.sshd.KeyReExchangeTest.testReExchangeFromServerBySize(KeyReExchangeTest.java:360) > > > Starting org.apache.sshd.KeyReExchangeTest:testReExchangeFromServerBySize... > > 2015-11-24 19:42:14,460 | INFO | main | SshServer > | org.apache.sshd.server.SshServer > 319 | start() listen on auto-allocated port=40137 > 2015-11-24 19:42:14,463 | INFO | f]-nio2-thread-1 | ServerSessionImpl > | org.apache.sshd.server.session.ServerSessionImpl > 63 | Server session created from /127.0.0.1:44413 > 2015-11-24 19:42:14,820 | WARN | a]-nio2-thread-3 | > AcceptAllServerKeyVerifier | > org.apache.sshd.client.keyverifier.StaticServerKeyVerifier 59 > | Server at /127.0.0.1:40137 presented unverified RSA key: > SHA256:O+mQa3lnlP0xduo5W2bnNHOINv1Mi77gls5cl/3rDys > 2015-11-24 19:42:14,822 | INFO | f]-nio2-thread-1 | > ServerUserAuthService | > org.apache.sshd.server.session.ServerUserAuthService 240 > | Session testReExchangeFromServerBySize@/127.0.0.1:44413 > authenticated > 2015-11-24 19:42:14,864 | INFO | EchoShell | ServerSessionImpl > | org.apache.sshd.common.session.AbstractSession > 1524 | Initiating key re-exchange > 2015-11-24 19:42:14,865 | WARN | f]-nio2-thread-4 | ServerSessionImpl > | org.apache.sshd.common.session.AbstractSession > 577 | Exception caught > java.lang.IllegalArgumentException: No current KEX future at > org.apache.sshd.common.util.ValidateUtils.throwIllegalArgumentException(ValidateUtils.java:138) > at org.apache.sshd.common.util.ValidateUtils.checkTrue(ValidateUtils.java:115) > at > org.apache.sshd.common.util.ValidateUtils.checkNotNull(ValidateUtils.java:34) > at > org.apache.sshd.common.session.AbstractSession.reExchangeKeys(AbstractSession.java:1538) > at > org.apache.sshd.server.session.ServerSessionImpl.checkRekey(ServerSessionImpl.java:97) > at > org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:428) > at > org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:358) > at > org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:934) > at > org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:338) > at > org.apache.sshd.common.session.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:59) > at > org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:220) > at > org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:212) > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:37) > at java.security.AccessController.doPrivileged(Native Method) at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:34) > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126) > at sun.nio.ch.Invoker$2.run(Invoker.java:218) > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112) > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) > at java.lang.Thread.run(Thread.java:745) > > Finished org.apache.sshd.KeyReExchangeTest:testReExchangeFromServerBySize > in 411 ms > > > > On 24 November 2015 at 19:25, Alon Bar-Lev <[email protected]> wrote: > > > > Hi, > > > > In 1:4 attempts I get the following exception, it may also explain why > > scp tests also occasionally fail. > > > > Any clue? any information I can provide? > > > > Regards, > > Alon Bar-Lev > > > > exception > > --- > > Tests run: 6, Failures: 1, Errors: 0, Skipped: 0, Time elapsed: 5.098 > > sec <<< FAILURE! - in org.apache.sshd.KeyReExchangeTest > > testReExchangeFromServerBySize(org.apache.sshd.KeyReExchangeTest) > > Time elapsed: 0.211 sec <<< FAILURE! > > java.lang.AssertionError: Mismatched sent data length expected:<10034> > > but was:<1020> at > > org.apache.sshd.KeyReExchangeTest.testReExchangeFromServerBySize(KeyRe > > ExchangeTest.java:361) > > --- > > > > > > output > > --- > > Starting org.apache.sshd.KeyReExchangeTest:testReExchangeFromServerBySize... > > > > 2015-11-24 19:17:34,548 | INFO | main | SshServer > > | org.apache.sshd.server.SshServer > > 319 | start() listen on auto-allocated port=49792 > > 2015-11-24 19:17:34,550 | INFO | 0]-nio2-thread-1 | ServerSessionImpl > > | org.apache.sshd.server.session.ServerSessionImpl > > 63 | Server session created from /127.0.0.1:47036 > > 2015-11-24 19:17:34,574 | WARN | f]-nio2-thread-3 | > > AcceptAllServerKeyVerifier | > > org.apache.sshd.client.keyverifier.StaticServerKeyVerifier 59 > > | Server at /127.0.0.1:49792 presented unverified RSA key: > > SHA256:O+mQa3lnlP0xduo5W2bnNHOINv1Mi77gls5cl/3rDys > > 2015-11-24 19:17:34,576 | INFO | 0]-nio2-thread-1 | > > ServerUserAuthService | > > org.apache.sshd.server.session.ServerUserAuthService 240 > > | Session testReExchangeFromServerBySize@/127.0.0.1:47036 > > authenticated > > 2015-11-24 19:17:34,618 | INFO | 0]-nio2-thread-4 | ServerSessionImpl > > | org.apache.sshd.common.session.AbstractSession > > 1524 | Initiating key re-exchange > > org.apache.sshd.common.SshException > > at > > org.apache.sshd.common.channel.ChannelOutputStream.flush(ChannelOutput > > Stream.java:191) at > > org.apache.sshd.util.test.EchoShell.run(EchoShell.java:108) > > at java.lang.Thread.run(Thread.java:745) > > Caused by: java.lang.IllegalArgumentException: No current KEX future > > at > > org.apache.sshd.common.util.ValidateUtils.throwIllegalArgumentExceptio > > n(ValidateUtils.java:138) at > > org.apache.sshd.common.util.ValidateUtils.checkTrue(ValidateUtils.java > > :115) at > > org.apache.sshd.common.util.ValidateUtils.checkNotNull(ValidateUtils.j > > ava:34) at > > org.apache.sshd.common.session.AbstractSession.reExchangeKeys(Abstract > > Session.java:1538) at > > org.apache.sshd.server.session.ServerSessionImpl.checkRekey(ServerSess > > ionImpl.java:97) at > > org.apache.sshd.common.session.AbstractSession.writePacket(AbstractSes > > sion.java:677) at > > org.apache.sshd.common.channel.AbstractChannel.writePacket(AbstractCha > > nnel.java:422) at > > org.apache.sshd.common.channel.ChannelOutputStream.flush(ChannelOutput > > Stream.java:178) > > ... 2 more > > 2015-11-24 19:17:34,711 | WARN | f]-nio2-thread-5 | > > AcceptAllServerKeyVerifier | > > org.apache.sshd.client.keyverifier.StaticServerKeyVerifier 59 > > | Server at /127.0.0.1:49792 presented unverified RSA key: > > SHA256:O+mQa3lnlP0xduo5W2bnNHOINv1Mi77gls5cl/3rDys > > > > Finished > > org.apache.sshd.KeyReExchangeTest:testReExchangeFromServerBySize > > in 207 ms > > ---
