[ 
https://issues.apache.org/jira/browse/SSHD-701?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Goldstein Lyor updated SSHD-701:
--------------------------------
    Priority: Minor  (was: Major)

> IllegalArgumentException processing SSH_MSG_CHANNEL_OPEN_CONFIRMATION with 
> initial window size of -1
> ----------------------------------------------------------------------------------------------------
>
>                 Key: SSHD-701
>                 URL: https://issues.apache.org/jira/browse/SSHD-701
>             Project: MINA SSHD
>          Issue Type: Improvement
>    Affects Versions: 1.2.0
>            Reporter: Roger Hart
>            Priority: Minor
>
> We're using Apache MINA SSHD 1.2.0 successfully except for one server which 
> sends an init window size of -1 in the SSH_MSG_CHANNEL_OPEN_CONFIRMATION 
> message (other servers send 0). This causes SSHD to throw an 
> IllegalArgumentException here: 
> ValidateUtils.checkTrue(window >= 0, "Negative window size: %d", window);
> I'm able to send files to this server using the Win SCP command line client.
> It would be nice if SSHD was more robust and treated a negative window size 
> as 0.
> Here's the SSHD log entries:
> 10:56:13.296 23-Sep-16 -0700 | (ultConfigFileHostEntryResolver) 
> resolveEffectiveHost(XXXXXXXX@/X.XX.XXX.XX:22) => null
> 10:56:13.296 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) 
> connect(XXXXXXXX@/X.XX.XXX.XX:22) no overrides
> 10:56:13.296 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) Connecting to 
> /X.XX.XXX.XX:22
> 10:56:13.297 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) 
> setOption(SO_REUSEADDR)[true] from property=socket-reuseaddr
> 10:56:13.389 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Creating 
> IoSession on /0:0:0:0:0:0:0:0:57579 from /X.XX.XXX.XX:22
> 10:56:13.390 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) Client 
> session created: Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]
> 10:56:13.391 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> ClientUserAuthService(ClientSessionImpl[null@/X.XX.XXX.XX:22]) client 
> methods: [publickey, keyboard-interactive, password]
> 10:56:13.391 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) 
> sessionCreated(ClientSessionImpl[null@/X.XX.XXX.XX:22]) tracking
> 10:56:13.391 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> sendIdentification(ClientSessionImpl[null@/X.XX.XXX.XX:22]): 
> SSH-2.0-SSHD-CORE-1.2.0
> 10:56:13.391 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 25 
> bytes
> 10:56:13.392 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> sendKexInit(ClientSessionImpl[null@/X.XX.XXX.XX:22]) Send SSH_MSG_KEXINIT
> 10:56:13.392 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 592 
> bytes
> 10:56:13.393 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> auth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] send 
> SSH_MSG_USERAUTH_REQUEST for 'none'
> 10:56:13.393 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=25
> 10:56:13.395 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> writePacket(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[SSH_MSG_USERAUTH_REQUEST]
>  Start flagging packets as pending until key exchange is done
> 10:56:13.396 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=592
> 10:56:13.480 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 568 bytes
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> doReadIdentification(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> line='SSH-2.0-mod_sftp/0.9.7'
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> readIdentification(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Server 
> version string: SSH-2.0-mod_sftp/0.9.7
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleKexInit(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) SSH_MSG_KEXINIT
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> setNegotiationResult(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Kex: 
> server->client aes128-ctr hmac-sha1 none
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> setNegotiationResult(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Kex: 
> client->server aes128-ctr hmac-sha1 none
> 10:56:13.480 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) 
> init(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send 
> SSH_MSG_KEX_DH_GEX_REQUEST
> 10:56:13.480 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 32 
> bytes
> 10:56:13.481 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=32
> 10:56:13.575 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 536 bytes
> 10:56:13.575 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) 
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
>  process command=SSH_MSG_KEX_DH_GEX_GROUP
> 10:56:13.731 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) 
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
>  Send SSH_MSG_KEX_DH_GEX_INIT
> 10:56:13.732 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 536 
> bytes
> 10:56:13.732 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleKexMessage(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[diffie-hellman-group-exchange-sha256]
>  more KEX packets expected after cmd=31
> 10:56:13.732 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=536
> 10:56:13.859 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 1088 bytes
> 10:56:13.859 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) 
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
>  process command=SSH_MSG_KEX_DH_GEX_REPLY
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleKexMessage(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[diffie-hellman-group-exchange-sha256]
>  KEX processing complete after cmd=33
> 10:56:14.033 23-Sep-16 -0700 | (ier.AcceptAllServerKeyVerifier) Server at 
> /X.XX.XXX.XX:22 presented unverified RSA key: 
> SHA256:WrrMne/bbQyBS9h+NICa1AhbA/Lt2uzZNtcd0J+DVWI
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> checkKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> key=ssh-rsa-SHA256:WrrMne/bbQyBS9h+NICa1AhbA/Lt2uzZNtcd0J+DVWI, verified=true
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> sendNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send SSH_MSG_NEWKEYS
> 10:56:14.033 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 16 
> bytes
> 10:56:14.034 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=16
> 10:56:14.121 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 16 bytes
> 10:56:14.121 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) SSH_MSG_NEWKEYS 
> command=SSH_MSG_NEWKEYS
> 10:56:14.121 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> receiveNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) session 
> ID=a9:7b:cf:a5:ca:c5:d9:f2:1a:c9:aa:e7:55:94:6f:01:e0:65:07:e1:b6:fb:ed:35:8b:86:3f:10:17:fe:9b:96
> 10:56:14.122 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> receiveNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> inCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], 
> outCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], recommended blocks 
> limit=4294967296, actual=4294967296
> 10:56:14.122 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> sendInitialServiceRequest(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send 
> SSH_MSG_SERVICE_REQUEST for ssh-userauth
> 10:56:14.122 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 68 
> bytes
> 10:56:14.122 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=68
> 10:56:14.123 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Dequeing 1 pending 
> packets
> 10:56:14.123 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 84 
> bytes
> 10:56:14.123 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=84
> 10:56:14.210 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 52 bytes
> 10:56:14.210 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleServiceAccept(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> SSH_MSG_SERVICE_ACCEPT service=ssh-userauth
> 10:56:14.300 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 68 bytes
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> processUserAuth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Received 
> SSH_MSG_USERAUTH_FAILURE - partial=false, methods=publickey,password
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) starting authentication 
> mechanisms: client=[publickey, keyboard-interactive, password], 
> server=[publickey, password]
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) attempting 
> method=publickey
> 10:56:14.300 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) 
> loadKeys(C:\Users\rhart\.ssh\id_rsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) 
> loadKeys(C:\Users\rhart\.ssh\id_dsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) 
> loadKeys(C:\Users\rhart\.ssh\id_ecdsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (.auth.pubkey.UserAuthPublicKey) 
> sendAuthDataRequest(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
>  no more keys to send
> 10:56:14.301 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) no initial request sent 
> by method=publickey
> 10:56:14.301 23-Sep-16 -0700 | (.auth.pubkey.UserAuthPublicKey) 
> destroy(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
> 10:56:14.301 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) attempting 
> method=password
> 10:56:14.301 23-Sep-16 -0700 | (auth.password.UserAuthPassword) 
> sendPassword(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] 
> send SSH_MSG_USERAUTH_REQUEST for password - modified=false
> 10:56:14.301 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 116 
> bytes
> 10:56:14.302 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) successfully processed 
> initial buffer by method=password
> 10:56:14.302 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=116
> 10:56:14.396 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 36 bytes
> 10:56:14.396 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> processUserAuth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> SSH_MSG_USERAUTH_SUCCESS Succeeded with password
> 10:56:14.396 23-Sep-16 -0700 | (auth.password.UserAuthPassword) 
> destroy(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
> 10:56:18.185 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) init() 
> service=ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]] 
> session=ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22] id=0
> 10:56:18.186 23-Sep-16 -0700 | (che.sshd.common.channel.Window) 
> init(Window[client/local](ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])) 
> size=2097152, max=2097152, packet=32768
> 10:56:18.186 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> registerChannel(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])[id=0]
>  ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]
> 10:56:18.186 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> createSubsystemChannel(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[sftp] 
> created id=0
> 10:56:18.186 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> open(ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) Send 
> SSH_MSG_CHANNEL_OPEN - type=session
> 10:56:18.186 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 68 
> bytes
> 10:56:18.187 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=68
> 10:56:18.274 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 52 bytes
> 10:56:29.816 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> channelOpenConfirmation(ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) 
> SSH_MSG_CHANNEL_OPEN_CONFIRMATION sender=0, window-size=-1, packet-size=32768
> 10:56:29.816 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> setRecipient(ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) recipient=0
> 10:57:05.327 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> exceptionCaught(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) caught IllegalArgumentException[Illegal initial 
> size: -1] - calling handler
> 10:58:34.920 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> signalAuthFailure(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> type=IllegalArgumentException, signalled=false, message="Illegal initial 
> size: -1"
> 10:58:47.260 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> exceptionCaught(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[state=Opened] 
> IllegalArgumentException: Illegal initial size: -1
> 10:58:49.222 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> exceptionCaught(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[state=Opened] 
> details
> java.lang.IllegalArgumentException: Illegal initial size: -1
>       at 
> org.apache.sshd.common.util.ValidateUtils.throwIllegalArgumentException(ValidateUtils.java:138)
>       at 
> org.apache.sshd.common.util.ValidateUtils.checkTrue(ValidateUtils.java:121)
>       at org.apache.sshd.common.channel.Window.init(Window.java:112)
>       at 
> org.apache.sshd.client.channel.AbstractClientChannel.handleOpenSuccess(AbstractClientChannel.java:336)
>       at 
> org.apache.sshd.common.session.helpers.AbstractConnectionService.channelOpenConfirmation(AbstractConnectionService.java:354)
>       at 
> org.apache.sshd.common.session.helpers.AbstractConnectionService.process(AbstractConnectionService.java:281)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSession.doHandleMessage(AbstractSession.java:530)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSession.handleMessage(AbstractSession.java:463)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSession.decode(AbstractSession.java:1325)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSession.messageReceived(AbstractSession.java:424)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:67)
>       at 
> org.apache.sshd.common.io.nio2.Nio2Session.handleReadCycleCompletion(Nio2Session.java:285)
>       at 
> org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:265)
>       at 
> org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:262)
>       at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:37)
>       at java.security.AccessController.doPrivileged(Native Method)
>       at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:34)
>       at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)
>       at sun.nio.ch.Invoker$2.run(Invoker.java:218)
>       at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)
>       at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
>       at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
>       at java.lang.Thread.run(Thread.java:745)
> 10:59:43.694 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) 
> sessionException(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> IllegalArgumentException: Illegal initial size: -1
> 10:59:43.694 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) 
> sessionClosed(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) un-tracked
> 10:59:53.332 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Closing immediately
> 10:59:53.332 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> signalAuthFailure(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> type=SshException, signalled=false, message="Session is being closed"
> 10:59:53.333 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> close(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]) 
> Closing immediately
> 10:59:53.333 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> close(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) prevent 
> sending EOF
> 10:59:53.333 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> close(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) Closing 
> immediately
> 10:59:53.333 23-Sep-16 -0700 | (che.sshd.common.channel.Window) Closing 
> Window[client/local](ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])
> 10:59:53.333 23-Sep-16 -0700 | (che.sshd.common.channel.Window) Closing 
> Window[client/remote](ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])
> 10:59:53.333 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> unregisterChannel(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) 
> result=ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]
> 10:59:53.333 23-Sep-16 -0700 | (annel$GracefulChannelCloseable) 
> close(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])[immediately=true]
>  processing
> 10:59:53.334 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) 
> signal close complete
> 10:59:53.334 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> close(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])[Immediately] 
> closed
> 10:59:53.334 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> close(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])[Immediately]
>  closed
> 10:59:53.334 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> close(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, remote=/X.XX.XXX.XX:22]) 
> Closing immediately
> 10:59:53.335 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Immediately] state already 
> Immediate
> 10:59:53.335 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> close(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22])[Immediately] closed
> 10:59:53.335 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) 
> signal close complete
> 10:59:53.335 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Immediately] closed
> 11:00:52.865 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Graceful] state already 
> Closed
> 11:00:52.865 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) 
> close(SshClient[2c14dcc4]) Closing immediately
> 11:00:52.866 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) 
> close(org.apache.sshd.common.io.nio2.Nio2Connector@6097b457) Closing 
> immediately
> 11:00:52.866 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) 
> close(org.apache.sshd.common.io.nio2.Nio2Connector@6097b457)[Immediately] 
> closed
> 11:00:52.866 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) 
> close(org.apache.sshd.common.io.nio2.Nio2ServiceFactory@601ac0d6) Closing 
> immediately
> 11:00:52.866 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) Shutdown group
> 11:00:52.891 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) Group 
> successfully shut down
> 11:00:52.892 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) 
> close(org.apache.sshd.common.io.nio2.Nio2ServiceFactory@601ac0d6)[Immediately]
>  closed
> 11:00:52.892 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) 
> signal close complete
> 11:00:52.892 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) 
> close(SshClient[2c14dcc4])[Immediately] closed



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to