> I am following the instructions mentioned in
> https://github.com/osrg/ryu/wiki/Test-OF-Config-with-LINC but after sending
> the "Hello message" from Ryu controller the SSH connection gets terminated
> with the following message.
> 
> On the Linc Switch Side -
> 
> [info] SSH connection with subsystem: enetconf_ssh terminated with state:
> {state,<0.1402.0>,0,1,enetconf_fm_eom,{eom_parser,<<>>},linc_ofconfig}
> 
> 
> It is able to make the SSH connection and send the Hello message but
> getting terminated intermittently, I have taken the same sample sys.config
> file mentioned in the link. Is there a way to get out of this situation
> or at least see the full trace of error.
> 
> 
> Log on Ryu Controller side -
> 
> *instantiating app ryu/tests/integrated/test_of_config.py of OFConfigClient*
> 
> *<SSHSession(session, initial daemon)> created:
> client_capabilities=['urn:ietf:params:netconf:capability:writable-running:1.0',
> 'urn:ietf:params:netconf:capability:rollback-on-error:1.0',
> 'urn:ietf:params:netconf:capability:validate:1.0',
> 'urn:ietf:params:netconf:capability:confirmed-commit:1.0',
> 'urn:ietf:params:netconf:capability:url:1.0?scheme=http,ftp,file,https,sftp',
> 'urn:ietf:params:netconf:base:1.0',
> 'urn:liberouter:params:netconf:capability:power-control:1.0',
> 'urn:ietf:params:netconf:capability:candidate:1.0',
> 'urn:ietf:params:netconf:capability:xpath:1.0',
> 'urn:ietf:params:netconf:capability:startup:1.0',
> 'urn:ietf:params:netconf:capability:interleave:1.0']*
> 
> *starting thread (client mode): 0x1c9ec50L*
> 
> *Connected (version 2.0, client Erlang)*
> 
> *kex algos:['diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss']
> client encrypt:['aes128-cbc', '3des-cbc'] server encrypt:['aes128-cbc',
> '3des-cbc'] client mac:['hmac-sha1'] server mac:['hmac-sha1'] client
> compress:['none', 'zlib'] server compress:['none', 'zlib'] client lang:['']
> server lang:[''] kex follows?False*
> 
> *Ciphers agreed: local=aes128-cbc, remote=aes128-cbc*
> 
> *using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher:
> local aes128-cbc, remote aes128-cbc; mac: local hmac-sha1, remote
> hmac-sha1; compression: local none, remote none*
> 
> *Switch to new keys ...*
> 
> *Trying discovered key 5539f76da9fc2bba95f6ce7d75b667c7 in
> /home/srikanth/.ssh/id_rsa*
> 
> *userauth is OK*
> 
> *Authentication (publickey) failed.*
> 
> *Authentication failed.*
> 
> *userauth is OK*
> 
> *Authentication (password) successful!*
> 
> *[chan 1] Max packet in: 34816 bytes*
> 
> *[chan 1] Max packet out: 32768 bytes*
> 
> *Secsh channel 1 opened.*
> 
> *[chan netconf] Sesch channel 1 request ok*
> 
> *installing listener <ncclient.transport.session.HelloHandler object at
> 0x1cae250>*
> 
> *queueing <?xml version='1.0' encoding='UTF-8'?>*
> 
> *<nc:hello
> xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"><nc:capabilities><nc:capability>urn:ietf:params:netconf:capability:writable-running:1.0</nc:capability><nc:capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</nc:capability><nc:capability>urn:ietf:params:netconf:capability:validate:1.0</nc:capability><nc:capability>urn:ietf:params:netconf:capability:confirmed-commit:1.0</nc:capability><nc:capability>urn:ietf:params:netconf:capability:url:1.0?scheme=http,ftp,file,https,sftp</nc:capability><nc:capability>urn:ietf:params:netconf:base:1.0</nc:capability><nc:capability>urn:liberouter:params:netconf:capability:power-control:1.0</nc:capability><nc:capability>urn:ietf:params:netconf:capability:candidate:1.0</nc:capability><nc:capability>urn:ietf:params:netconf:capability:xpath:1.0</nc:capability><nc:capability>urn:ietf:params:netconf:capability:startup:1.0</nc:capability><nc:capability>urn:ietf:params:netconf:capability:interleave:1.0</nc:capability></nc:capabiliti
 es></nc:
 hello>*
> 
> *starting main loop*
> 
> *parsed new message*
> 
> *dispatching message to <ncclient.transport.session.HelloHandler object at
> 0x1cae250>: <?xml version="1.0" encoding="UTF-8"?><hello
> xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"><capabilities><capability>urn:ietf:params:netconf:base:1.1</capability><capability>urn:ietf:params:netconf:capability:startup:1.0</capability><capability>urn:ietf:params:netconf:capability:writable-running:1.0</capability></capabilities><session-id>1</session-id></hello>*
> 
> *Sending message*
> 
> *discarding listener <ncclient.transport.session.HelloHandler object at
> 0x1cae250>*
> 
> *initialized: session-id=1 |
> server_capabilities=['urn:ietf:params:netconf:capability:startup:1.0',
> 'urn:ietf:params:netconf:capability:writable-running:1.0',
> 'urn:ietf:params:netconf:base:1.1']*
> 
> *BRICK OFConfigClient*
> 
> *installing listener <ncclient.operations.rpc.RPCReplyListener object at
> 0x1cae590>*
> 
> *Requesting 'Get'*
> 
> *queueing <?xml version='1.0' encoding='UTF-8'?>*
> 
> *<nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"
> message-id="urn:uuid:88eec61a-87e0-11e3-980b-7054d2c54258"><nc:get
> /></nc:rpc>*
> 
> *Sync request, will wait for timeout=30*
> 
> 
> But it is short of desired output given in the link.

ryu-manager exits at this point?
due to the recent changes, it exits while the test app is still running.
you can workaround the problem by having a dummy service run as the
following.

PYTHONPATH=. ./bin/ryu-manager --verbose ryu.tests.integrated.test_of_config 
ryu.app.rest

YAMAMOTO Takashi

> 
> 
> Thanks,
> 
> Srikanth.

------------------------------------------------------------------------------
WatchGuard Dimension instantly turns raw network data into actionable 
security intelligence. It gives you real-time visual feedback on key
security issues and trends.  Skip the complicated setup - simply import
a virtual appliance and go from zero to informed in seconds.
http://pubads.g.doubleclick.net/gampad/clk?id=123612991&iu=/4140/ostg.clktrk
_______________________________________________
Ryu-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ryu-devel

Reply via email to