These are timing issues, have you tried to run these in a loop?
It happens to me in rate of 1:4.

On 25 November 2015 at 14:08, Lyor Goldstein <[email protected]> wrote:
>
> Don't know what to say - all these tests pass without a problem. There may be 
> a timing issue, but I can't tell for sure...
>
> -----Original Message-----
> From: Alon Bar-Lev [mailto:[email protected]]
> Sent: Tuesday, November 24, 2015 20:14
> To: [email protected]
> Cc: Lyor Goldstein <[email protected]>
> Subject: Re: KeyReExchangeTest::nio2 occasionally fails
>
> Another example, different test, same issue at sshd side.
>
> Tests run: 6, Failures: 1, Errors: 0, Skipped: 0, Time elapsed: 6.974 sec <<< 
> FAILURE! - in org.apache.sshd.KeyReExchangeTest
> testReExchangeFromServerBySize(org.apache.sshd.KeyReExchangeTest)
> Time elapsed: 0.419 sec  <<< FAILURE!
> java.lang.AssertionError: Expected rekeying at 
> org.apache.sshd.KeyReExchangeTest.testReExchangeFromServerBySize(KeyReExchangeTest.java:360)
>
>
> Starting org.apache.sshd.KeyReExchangeTest:testReExchangeFromServerBySize...
>
> 2015-11-24 19:42:14,460 | INFO  | main             | SshServer
>                | org.apache.sshd.server.SshServer
>             319 | start() listen on auto-allocated port=40137
> 2015-11-24 19:42:14,463 | INFO  | f]-nio2-thread-1 | ServerSessionImpl
>                | org.apache.sshd.server.session.ServerSessionImpl
>              63 | Server session created from /127.0.0.1:44413
> 2015-11-24 19:42:14,820 | WARN  | a]-nio2-thread-3 |
> AcceptAllServerKeyVerifier       |
> org.apache.sshd.client.keyverifier.StaticServerKeyVerifier         59
> | Server at /127.0.0.1:40137 presented unverified RSA key:
> SHA256:O+mQa3lnlP0xduo5W2bnNHOINv1Mi77gls5cl/3rDys
> 2015-11-24 19:42:14,822 | INFO  | f]-nio2-thread-1 |
> ServerUserAuthService            |
> org.apache.sshd.server.session.ServerUserAuthService              240
> | Session testReExchangeFromServerBySize@/127.0.0.1:44413
> authenticated
> 2015-11-24 19:42:14,864 | INFO  | EchoShell        | ServerSessionImpl
>                | org.apache.sshd.common.session.AbstractSession
>            1524 | Initiating key re-exchange
> 2015-11-24 19:42:14,865 | WARN  | f]-nio2-thread-4 | ServerSessionImpl
>                | org.apache.sshd.common.session.AbstractSession
>             577 | Exception caught
> java.lang.IllegalArgumentException: No current KEX future at 
> org.apache.sshd.common.util.ValidateUtils.throwIllegalArgumentException(ValidateUtils.java:138)
> at org.apache.sshd.common.util.ValidateUtils.checkTrue(ValidateUtils.java:115)
> at 
> org.apache.sshd.common.util.ValidateUtils.checkNotNull(ValidateUtils.java:34)
> at 
> org.apache.sshd.common.session.AbstractSession.reExchangeKeys(AbstractSession.java:1538)
> at 
> org.apache.sshd.server.session.ServerSessionImpl.checkRekey(ServerSessionImpl.java:97)
> at 
> org.apache.sshd.common.session.AbstractSession.doHandleMessage(AbstractSession.java:428)
> at 
> org.apache.sshd.common.session.AbstractSession.handleMessage(AbstractSession.java:358)
> at 
> org.apache.sshd.common.session.AbstractSession.decode(AbstractSession.java:934)
> at 
> org.apache.sshd.common.session.AbstractSession.messageReceived(AbstractSession.java:338)
> at 
> org.apache.sshd.common.session.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:59)
> at 
> org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:220)
> at 
> org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:212)
> at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:37)
> at java.security.AccessController.doPrivileged(Native Method) at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:34)
> at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)
> at sun.nio.ch.Invoker$2.run(Invoker.java:218)
> at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)
> at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
> at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
> at java.lang.Thread.run(Thread.java:745)
>
> Finished org.apache.sshd.KeyReExchangeTest:testReExchangeFromServerBySize
> in 411 ms
>
>
>
> On 24 November 2015 at 19:25, Alon Bar-Lev <[email protected]> wrote:
> >
> > Hi,
> >
> > In 1:4 attempts I get the following exception, it may also explain why
> > scp tests also occasionally fail.
> >
> > Any clue? any information I can provide?
> >
> > Regards,
> > Alon Bar-Lev
> >
> > exception
> > ---
> > Tests run: 6, Failures: 1, Errors: 0, Skipped: 0, Time elapsed: 5.098
> > sec <<< FAILURE! - in org.apache.sshd.KeyReExchangeTest
> > testReExchangeFromServerBySize(org.apache.sshd.KeyReExchangeTest)
> > Time elapsed: 0.211 sec  <<< FAILURE!
> > java.lang.AssertionError: Mismatched sent data length expected:<10034>
> > but was:<1020> at
> > org.apache.sshd.KeyReExchangeTest.testReExchangeFromServerBySize(KeyRe
> > ExchangeTest.java:361)
> > ---
> >
> >
> > output
> > ---
> > Starting org.apache.sshd.KeyReExchangeTest:testReExchangeFromServerBySize...
> >
> > 2015-11-24 19:17:34,548 | INFO  | main             | SshServer
> >                | org.apache.sshd.server.SshServer
> >             319 | start() listen on auto-allocated port=49792
> > 2015-11-24 19:17:34,550 | INFO  | 0]-nio2-thread-1 | ServerSessionImpl
> >                | org.apache.sshd.server.session.ServerSessionImpl
> >              63 | Server session created from /127.0.0.1:47036
> > 2015-11-24 19:17:34,574 | WARN  | f]-nio2-thread-3 |
> > AcceptAllServerKeyVerifier       |
> > org.apache.sshd.client.keyverifier.StaticServerKeyVerifier         59
> > | Server at /127.0.0.1:49792 presented unverified RSA key:
> > SHA256:O+mQa3lnlP0xduo5W2bnNHOINv1Mi77gls5cl/3rDys
> > 2015-11-24 19:17:34,576 | INFO  | 0]-nio2-thread-1 |
> > ServerUserAuthService            |
> > org.apache.sshd.server.session.ServerUserAuthService              240
> > | Session testReExchangeFromServerBySize@/127.0.0.1:47036
> > authenticated
> > 2015-11-24 19:17:34,618 | INFO  | 0]-nio2-thread-4 | ServerSessionImpl
> >                | org.apache.sshd.common.session.AbstractSession
> >            1524 | Initiating key re-exchange
> > org.apache.sshd.common.SshException
> > at
> > org.apache.sshd.common.channel.ChannelOutputStream.flush(ChannelOutput
> > Stream.java:191) at
> > org.apache.sshd.util.test.EchoShell.run(EchoShell.java:108)
> > at java.lang.Thread.run(Thread.java:745)
> > Caused by: java.lang.IllegalArgumentException: No current KEX future
> > at
> > org.apache.sshd.common.util.ValidateUtils.throwIllegalArgumentExceptio
> > n(ValidateUtils.java:138) at
> > org.apache.sshd.common.util.ValidateUtils.checkTrue(ValidateUtils.java
> > :115) at
> > org.apache.sshd.common.util.ValidateUtils.checkNotNull(ValidateUtils.j
> > ava:34) at
> > org.apache.sshd.common.session.AbstractSession.reExchangeKeys(Abstract
> > Session.java:1538) at
> > org.apache.sshd.server.session.ServerSessionImpl.checkRekey(ServerSess
> > ionImpl.java:97) at
> > org.apache.sshd.common.session.AbstractSession.writePacket(AbstractSes
> > sion.java:677) at
> > org.apache.sshd.common.channel.AbstractChannel.writePacket(AbstractCha
> > nnel.java:422) at
> > org.apache.sshd.common.channel.ChannelOutputStream.flush(ChannelOutput
> > Stream.java:178)
> > ... 2 more
> > 2015-11-24 19:17:34,711 | WARN  | f]-nio2-thread-5 |
> > AcceptAllServerKeyVerifier       |
> > org.apache.sshd.client.keyverifier.StaticServerKeyVerifier         59
> > | Server at /127.0.0.1:49792 presented unverified RSA key:
> > SHA256:O+mQa3lnlP0xduo5W2bnNHOINv1Mi77gls5cl/3rDys
> >
> > Finished
> > org.apache.sshd.KeyReExchangeTest:testReExchangeFromServerBySize
> > in 207 ms
> > ---

Reply via email to