[
https://issues.apache.org/jira/browse/SSHD-701?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Goldstein Lyor resolved SSHD-701.
---------------------------------
Resolution: Fixed
Fix Version/s: 1.4.0
> IllegalArgumentException processing SSH_MSG_CHANNEL_OPEN_CONFIRMATION with
> initial window size of -1
> ----------------------------------------------------------------------------------------------------
>
> Key: SSHD-701
> URL: https://issues.apache.org/jira/browse/SSHD-701
> Project: MINA SSHD
> Issue Type: Improvement
> Affects Versions: 1.2.0
> Reporter: Roger Hart
> Assignee: Goldstein Lyor
> Priority: Minor
> Fix For: 1.4.0
>
>
> We're using Apache MINA SSHD 1.2.0 successfully except for one server which
> sends an init window size of -1 in the SSH_MSG_CHANNEL_OPEN_CONFIRMATION
> message (other servers send 0). This causes SSHD to throw an
> IllegalArgumentException here:
> ValidateUtils.checkTrue(window >= 0, "Negative window size: %d", window);
> I'm able to send files to this server using the Win SCP command line client.
> It would be nice if SSHD was more robust and treated a negative window size
> as 0.
> Here's the SSHD log entries:
> 10:56:13.296 23-Sep-16 -0700 | (ultConfigFileHostEntryResolver)
> resolveEffectiveHost(XXXXXXXX@/X.XX.XXX.XX:22) => null
> 10:56:13.296 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient)
> connect(XXXXXXXX@/X.XX.XXX.XX:22) no overrides
> 10:56:13.296 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) Connecting to
> /X.XX.XXX.XX:22
> 10:56:13.297 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector)
> setOption(SO_REUSEADDR)[true] from property=socket-reuseaddr
> 10:56:13.389 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Creating
> IoSession on /0:0:0:0:0:0:0:0:57579 from /X.XX.XXX.XX:22
> 10:56:13.390 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) Client
> session created: Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]
> 10:56:13.391 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> ClientUserAuthService(ClientSessionImpl[null@/X.XX.XXX.XX:22]) client
> methods: [publickey, keyboard-interactive, password]
> 10:56:13.391 23-Sep-16 -0700 | (helpers.SessionTimeoutListener)
> sessionCreated(ClientSessionImpl[null@/X.XX.XXX.XX:22]) tracking
> 10:56:13.391 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> sendIdentification(ClientSessionImpl[null@/X.XX.XXX.XX:22]):
> SSH-2.0-SSHD-CORE-1.2.0
> 10:56:13.391 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 25
> bytes
> 10:56:13.392 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> sendKexInit(ClientSessionImpl[null@/X.XX.XXX.XX:22]) Send SSH_MSG_KEXINIT
> 10:56:13.392 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 592
> bytes
> 10:56:13.393 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> auth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] send
> SSH_MSG_USERAUTH_REQUEST for 'none'
> 10:56:13.393 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=25
> 10:56:13.395 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> writePacket(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[SSH_MSG_USERAUTH_REQUEST]
> Start flagging packets as pending until key exchange is done
> 10:56:13.396 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=592
> 10:56:13.480 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) read 568 bytes
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> doReadIdentification(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])
> line='SSH-2.0-mod_sftp/0.9.7'
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> readIdentification(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Server
> version string: SSH-2.0-mod_sftp/0.9.7
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> handleKexInit(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) SSH_MSG_KEXINIT
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> setNegotiationResult(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Kex:
> server->client aes128-ctr hmac-sha1 none
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> setNegotiationResult(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Kex:
> client->server aes128-ctr hmac-sha1 none
> 10:56:13.480 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient)
> init(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send
> SSH_MSG_KEX_DH_GEX_REQUEST
> 10:56:13.480 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 32
> bytes
> 10:56:13.481 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=32
> 10:56:13.575 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) read 536 bytes
> 10:56:13.575 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient)
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
> process command=SSH_MSG_KEX_DH_GEX_GROUP
> 10:56:13.731 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient)
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
> Send SSH_MSG_KEX_DH_GEX_INIT
> 10:56:13.732 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 536
> bytes
> 10:56:13.732 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> handleKexMessage(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[diffie-hellman-group-exchange-sha256]
> more KEX packets expected after cmd=31
> 10:56:13.732 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=536
> 10:56:13.859 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) read 1088 bytes
> 10:56:13.859 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient)
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
> process command=SSH_MSG_KEX_DH_GEX_REPLY
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> handleKexMessage(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[diffie-hellman-group-exchange-sha256]
> KEX processing complete after cmd=33
> 10:56:14.033 23-Sep-16 -0700 | (ier.AcceptAllServerKeyVerifier) Server at
> /X.XX.XXX.XX:22 presented unverified RSA key:
> SHA256:WrrMne/bbQyBS9h+NICa1AhbA/Lt2uzZNtcd0J+DVWI
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> checkKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])
> key=ssh-rsa-SHA256:WrrMne/bbQyBS9h+NICa1AhbA/Lt2uzZNtcd0J+DVWI, verified=true
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> sendNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send SSH_MSG_NEWKEYS
> 10:56:14.033 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 16
> bytes
> 10:56:14.034 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=16
> 10:56:14.121 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) read 16 bytes
> 10:56:14.121 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> handleNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) SSH_MSG_NEWKEYS
> command=SSH_MSG_NEWKEYS
> 10:56:14.121 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> receiveNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) session
> ID=a9:7b:cf:a5:ca:c5:d9:f2:1a:c9:aa:e7:55:94:6f:01:e0:65:07:e1:b6:fb:ed:35:8b:86:3f:10:17:fe:9b:96
> 10:56:14.122 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> receiveNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])
> inCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding],
> outCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], recommended blocks
> limit=4294967296, actual=4294967296
> 10:56:14.122 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> sendInitialServiceRequest(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send
> SSH_MSG_SERVICE_REQUEST for ssh-userauth
> 10:56:14.122 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 68
> bytes
> 10:56:14.122 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=68
> 10:56:14.123 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> handleNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Dequeing 1 pending
> packets
> 10:56:14.123 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 84
> bytes
> 10:56:14.123 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=84
> 10:56:14.210 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) read 52 bytes
> 10:56:14.210 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> handleServiceAccept(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])
> SSH_MSG_SERVICE_ACCEPT service=ssh-userauth
> 10:56:14.300 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) read 68 bytes
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> processUserAuth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Received
> SSH_MSG_USERAUTH_FAILURE - partial=false, methods=publickey,password
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) starting authentication
> mechanisms: client=[publickey, keyboard-interactive, password],
> server=[publickey, password]
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) attempting
> method=publickey
> 10:56:14.300 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher)
> loadKeys(C:\Users\rhart\.ssh\id_rsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher)
> loadKeys(C:\Users\rhart\.ssh\id_dsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher)
> loadKeys(C:\Users\rhart\.ssh\id_ecdsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (.auth.pubkey.UserAuthPublicKey)
> sendAuthDataRequest(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
> no more keys to send
> 10:56:14.301 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) no initial request sent
> by method=publickey
> 10:56:14.301 23-Sep-16 -0700 | (.auth.pubkey.UserAuthPublicKey)
> destroy(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
> 10:56:14.301 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) attempting
> method=password
> 10:56:14.301 23-Sep-16 -0700 | (auth.password.UserAuthPassword)
> sendPassword(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
> send SSH_MSG_USERAUTH_REQUEST for password - modified=false
> 10:56:14.301 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 116
> bytes
> 10:56:14.302 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) successfully processed
> initial buffer by method=password
> 10:56:14.302 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=116
> 10:56:14.396 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) read 36 bytes
> 10:56:14.396 23-Sep-16 -0700 | (.session.ClientUserAuthService)
> processUserAuth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])
> SSH_MSG_USERAUTH_SUCCESS Succeeded with password
> 10:56:14.396 23-Sep-16 -0700 | (auth.password.UserAuthPassword)
> destroy(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
> 10:56:18.185 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) init()
> service=ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
> session=ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22] id=0
> 10:56:18.186 23-Sep-16 -0700 | (che.sshd.common.channel.Window)
> init(Window[client/local](ChannelSubsystem[id=0,
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]))
> size=2097152, max=2097152, packet=32768
> 10:56:18.186 23-Sep-16 -0700 | (ession.ClientConnectionService)
> registerChannel(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])[id=0]
> ChannelSubsystem[id=0,
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]
> 10:56:18.186 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> createSubsystemChannel(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[sftp]
> created id=0
> 10:56:18.186 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem)
> open(ChannelSubsystem[id=0,
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) Send
> SSH_MSG_CHANNEL_OPEN - type=session
> 10:56:18.186 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 68
> bytes
> 10:56:18.187 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) finished writing len=68
> 10:56:18.274 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) read 52 bytes
> 10:56:29.816 23-Sep-16 -0700 | (ession.ClientConnectionService)
> channelOpenConfirmation(ChannelSubsystem[id=0,
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])
> SSH_MSG_CHANNEL_OPEN_CONFIRMATION sender=0, window-size=-1, packet-size=32768
> 10:56:29.816 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem)
> setRecipient(ChannelSubsystem[id=0,
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) recipient=0
> 10:57:05.327 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> exceptionCaught(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22]) caught IllegalArgumentException[Illegal initial
> size: -1] - calling handler
> 10:58:34.920 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> signalAuthFailure(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])
> type=IllegalArgumentException, signalled=false, message="Illegal initial
> size: -1"
> 10:58:47.260 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> exceptionCaught(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[state=Opened]
> IllegalArgumentException: Illegal initial size: -1
> 10:58:49.222 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> exceptionCaught(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[state=Opened]
> details
> java.lang.IllegalArgumentException: Illegal initial size: -1
> at
> org.apache.sshd.common.util.ValidateUtils.throwIllegalArgumentException(ValidateUtils.java:138)
> at
> org.apache.sshd.common.util.ValidateUtils.checkTrue(ValidateUtils.java:121)
> at org.apache.sshd.common.channel.Window.init(Window.java:112)
> at
> org.apache.sshd.client.channel.AbstractClientChannel.handleOpenSuccess(AbstractClientChannel.java:336)
> at
> org.apache.sshd.common.session.helpers.AbstractConnectionService.channelOpenConfirmation(AbstractConnectionService.java:354)
> at
> org.apache.sshd.common.session.helpers.AbstractConnectionService.process(AbstractConnectionService.java:281)
> at
> org.apache.sshd.common.session.helpers.AbstractSession.doHandleMessage(AbstractSession.java:530)
> at
> org.apache.sshd.common.session.helpers.AbstractSession.handleMessage(AbstractSession.java:463)
> at
> org.apache.sshd.common.session.helpers.AbstractSession.decode(AbstractSession.java:1325)
> at
> org.apache.sshd.common.session.helpers.AbstractSession.messageReceived(AbstractSession.java:424)
> at
> org.apache.sshd.common.session.helpers.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:67)
> at
> org.apache.sshd.common.io.nio2.Nio2Session.handleReadCycleCompletion(Nio2Session.java:285)
> at
> org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:265)
> at
> org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:262)
> at
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:37)
> at java.security.AccessController.doPrivileged(Native Method)
> at
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:34)
> at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)
> at sun.nio.ch.Invoker$2.run(Invoker.java:218)
> at
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)
> at
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
> at
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
> at java.lang.Thread.run(Thread.java:745)
> 10:59:43.694 23-Sep-16 -0700 | (helpers.SessionTimeoutListener)
> sessionException(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])
> IllegalArgumentException: Illegal initial size: -1
> 10:59:43.694 23-Sep-16 -0700 | (helpers.SessionTimeoutListener)
> sessionClosed(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) un-tracked
> 10:59:53.332 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Closing immediately
> 10:59:53.332 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> signalAuthFailure(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])
> type=SshException, signalled=false, message="Session is being closed"
> 10:59:53.333 23-Sep-16 -0700 | (ession.ClientConnectionService)
> close(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])
> Closing immediately
> 10:59:53.333 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem)
> close(ChannelSubsystem[id=0,
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) prevent
> sending EOF
> 10:59:53.333 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem)
> close(ChannelSubsystem[id=0,
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) Closing
> immediately
> 10:59:53.333 23-Sep-16 -0700 | (che.sshd.common.channel.Window) Closing
> Window[client/local](ChannelSubsystem[id=0,
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])
> 10:59:53.333 23-Sep-16 -0700 | (che.sshd.common.channel.Window) Closing
> Window[client/remote](ChannelSubsystem[id=0,
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])
> 10:59:53.333 23-Sep-16 -0700 | (ession.ClientConnectionService)
> unregisterChannel(ChannelSubsystem[id=0,
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])
> result=ChannelSubsystem[id=0,
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]
> 10:59:53.333 23-Sep-16 -0700 | (annel$GracefulChannelCloseable)
> close(ChannelSubsystem[id=0,
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])[immediately=true]
> processing
> 10:59:53.334 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true)
> signal close complete
> 10:59:53.334 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem)
> close(ChannelSubsystem[id=0,
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])[Immediately]
> closed
> 10:59:53.334 23-Sep-16 -0700 | (ession.ClientConnectionService)
> close(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])[Immediately]
> closed
> 10:59:53.334 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> close(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, remote=/X.XX.XXX.XX:22])
> Closing immediately
> 10:59:53.335 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Immediately] state already
> Immediate
> 10:59:53.335 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session)
> close(Nio2Session[local=/0:0:0:0:0:0:0:0:57579,
> remote=/X.XX.XXX.XX:22])[Immediately] closed
> 10:59:53.335 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true)
> signal close complete
> 10:59:53.335 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Immediately] closed
> 11:00:52.865 23-Sep-16 -0700 | (ient.session.ClientSessionImpl)
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Graceful] state already
> Closed
> 11:00:52.865 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient)
> close(SshClient[2c14dcc4]) Closing immediately
> 11:00:52.866 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector)
> close(org.apache.sshd.common.io.nio2.Nio2Connector@6097b457) Closing
> immediately
> 11:00:52.866 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector)
> close(org.apache.sshd.common.io.nio2.Nio2Connector@6097b457)[Immediately]
> closed
> 11:00:52.866 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory)
> close(org.apache.sshd.common.io.nio2.Nio2ServiceFactory@601ac0d6) Closing
> immediately
> 11:00:52.866 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) Shutdown group
> 11:00:52.891 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) Group
> successfully shut down
> 11:00:52.892 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory)
> close(org.apache.sshd.common.io.nio2.Nio2ServiceFactory@601ac0d6)[Immediately]
> closed
> 11:00:52.892 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true)
> signal close complete
> 11:00:52.892 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient)
> close(SshClient[2c14dcc4])[Immediately] closed
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)