[ 
https://issues.apache.org/jira/browse/SSHD-701?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15523660#comment-15523660
 ] 

Goldstein Lyor commented on SSHD-701:
-------------------------------------

According to [RFC 4254 section 
5.1|https://tools.ietf.org/html/rfc4254#section-5.1]:
{quote}
The 'initial window size' specifies how many bytes of channel data can be sent 
to the sender of this message without adjusting the window.  The 'maximum 
packet size' specifies the maximum size of an individual data packet that can 
be sent to the sender.
{quote}
I have not found any indication that negative values mean {{Infinite}} and 
while I have not found any reference explicitly prohibiting this , neither have 
I found any reference as to what "Infinite" means. I am open to suggestion as 
to how intrepret negative values - preferably also some reference 
implementation (in C/C# or whatever language) that shows some reasonable 
handling for this case.

> IllegalArgumentException processing SSH_MSG_CHANNEL_OPEN_CONFIRMATION with 
> initial window size of -1
> ----------------------------------------------------------------------------------------------------
>
>                 Key: SSHD-701
>                 URL: https://issues.apache.org/jira/browse/SSHD-701
>             Project: MINA SSHD
>          Issue Type: Improvement
>    Affects Versions: 1.2.0
>            Reporter: Roger Hart
>            Priority: Minor
>
> We're using Apache MINA SSHD 1.2.0 successfully except for one server which 
> sends an init window size of -1 in the SSH_MSG_CHANNEL_OPEN_CONFIRMATION 
> message (other servers send 0). This causes SSHD to throw an 
> IllegalArgumentException here: 
> ValidateUtils.checkTrue(window >= 0, "Negative window size: %d", window);
> I'm able to send files to this server using the Win SCP command line client.
> It would be nice if SSHD was more robust and treated a negative window size 
> as 0.
> Here's the SSHD log entries:
> 10:56:13.296 23-Sep-16 -0700 | (ultConfigFileHostEntryResolver) 
> resolveEffectiveHost(XXXXXXXX@/X.XX.XXX.XX:22) => null
> 10:56:13.296 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) 
> connect(XXXXXXXX@/X.XX.XXX.XX:22) no overrides
> 10:56:13.296 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) Connecting to 
> /X.XX.XXX.XX:22
> 10:56:13.297 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) 
> setOption(SO_REUSEADDR)[true] from property=socket-reuseaddr
> 10:56:13.389 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Creating 
> IoSession on /0:0:0:0:0:0:0:0:57579 from /X.XX.XXX.XX:22
> 10:56:13.390 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) Client 
> session created: Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]
> 10:56:13.391 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> ClientUserAuthService(ClientSessionImpl[null@/X.XX.XXX.XX:22]) client 
> methods: [publickey, keyboard-interactive, password]
> 10:56:13.391 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) 
> sessionCreated(ClientSessionImpl[null@/X.XX.XXX.XX:22]) tracking
> 10:56:13.391 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> sendIdentification(ClientSessionImpl[null@/X.XX.XXX.XX:22]): 
> SSH-2.0-SSHD-CORE-1.2.0
> 10:56:13.391 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 25 
> bytes
> 10:56:13.392 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> sendKexInit(ClientSessionImpl[null@/X.XX.XXX.XX:22]) Send SSH_MSG_KEXINIT
> 10:56:13.392 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 592 
> bytes
> 10:56:13.393 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> auth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] send 
> SSH_MSG_USERAUTH_REQUEST for 'none'
> 10:56:13.393 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=25
> 10:56:13.395 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> writePacket(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[SSH_MSG_USERAUTH_REQUEST]
>  Start flagging packets as pending until key exchange is done
> 10:56:13.396 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=592
> 10:56:13.480 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 568 bytes
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> doReadIdentification(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> line='SSH-2.0-mod_sftp/0.9.7'
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> readIdentification(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Server 
> version string: SSH-2.0-mod_sftp/0.9.7
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleKexInit(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) SSH_MSG_KEXINIT
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> setNegotiationResult(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Kex: 
> server->client aes128-ctr hmac-sha1 none
> 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> setNegotiationResult(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Kex: 
> client->server aes128-ctr hmac-sha1 none
> 10:56:13.480 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) 
> init(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send 
> SSH_MSG_KEX_DH_GEX_REQUEST
> 10:56:13.480 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 32 
> bytes
> 10:56:13.481 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=32
> 10:56:13.575 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 536 bytes
> 10:56:13.575 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) 
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
>  process command=SSH_MSG_KEX_DH_GEX_GROUP
> 10:56:13.731 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) 
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
>  Send SSH_MSG_KEX_DH_GEX_INIT
> 10:56:13.732 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 536 
> bytes
> 10:56:13.732 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleKexMessage(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[diffie-hellman-group-exchange-sha256]
>  more KEX packets expected after cmd=31
> 10:56:13.732 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=536
> 10:56:13.859 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 1088 bytes
> 10:56:13.859 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) 
> next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]
>  process command=SSH_MSG_KEX_DH_GEX_REPLY
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleKexMessage(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[diffie-hellman-group-exchange-sha256]
>  KEX processing complete after cmd=33
> 10:56:14.033 23-Sep-16 -0700 | (ier.AcceptAllServerKeyVerifier) Server at 
> /X.XX.XXX.XX:22 presented unverified RSA key: 
> SHA256:WrrMne/bbQyBS9h+NICa1AhbA/Lt2uzZNtcd0J+DVWI
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> checkKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> key=ssh-rsa-SHA256:WrrMne/bbQyBS9h+NICa1AhbA/Lt2uzZNtcd0J+DVWI, verified=true
> 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> sendNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send SSH_MSG_NEWKEYS
> 10:56:14.033 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 16 
> bytes
> 10:56:14.034 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=16
> 10:56:14.121 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 16 bytes
> 10:56:14.121 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) SSH_MSG_NEWKEYS 
> command=SSH_MSG_NEWKEYS
> 10:56:14.121 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> receiveNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) session 
> ID=a9:7b:cf:a5:ca:c5:d9:f2:1a:c9:aa:e7:55:94:6f:01:e0:65:07:e1:b6:fb:ed:35:8b:86:3f:10:17:fe:9b:96
> 10:56:14.122 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> receiveNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> inCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], 
> outCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], recommended blocks 
> limit=4294967296, actual=4294967296
> 10:56:14.122 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> sendInitialServiceRequest(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send 
> SSH_MSG_SERVICE_REQUEST for ssh-userauth
> 10:56:14.122 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 68 
> bytes
> 10:56:14.122 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=68
> 10:56:14.123 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Dequeing 1 pending 
> packets
> 10:56:14.123 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 84 
> bytes
> 10:56:14.123 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=84
> 10:56:14.210 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 52 bytes
> 10:56:14.210 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> handleServiceAccept(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> SSH_MSG_SERVICE_ACCEPT service=ssh-userauth
> 10:56:14.300 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 68 bytes
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> processUserAuth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Received 
> SSH_MSG_USERAUTH_FAILURE - partial=false, methods=publickey,password
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) starting authentication 
> mechanisms: client=[publickey, keyboard-interactive, password], 
> server=[publickey, password]
> 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) attempting 
> method=publickey
> 10:56:14.300 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) 
> loadKeys(C:\Users\rhart\.ssh\id_rsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) 
> loadKeys(C:\Users\rhart\.ssh\id_dsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) 
> loadKeys(C:\Users\rhart\.ssh\id_ecdsa) no key loaded
> 10:56:14.301 23-Sep-16 -0700 | (.auth.pubkey.UserAuthPublicKey) 
> sendAuthDataRequest(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
>  no more keys to send
> 10:56:14.301 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) no initial request sent 
> by method=publickey
> 10:56:14.301 23-Sep-16 -0700 | (.auth.pubkey.UserAuthPublicKey) 
> destroy(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
> 10:56:14.301 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) attempting 
> method=password
> 10:56:14.301 23-Sep-16 -0700 | (auth.password.UserAuthPassword) 
> sendPassword(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] 
> send SSH_MSG_USERAUTH_REQUEST for password - modified=false
> 10:56:14.301 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 116 
> bytes
> 10:56:14.302 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) successfully processed 
> initial buffer by method=password
> 10:56:14.302 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=116
> 10:56:14.396 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 36 bytes
> 10:56:14.396 23-Sep-16 -0700 | (.session.ClientUserAuthService) 
> processUserAuth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> SSH_MSG_USERAUTH_SUCCESS Succeeded with password
> 10:56:14.396 23-Sep-16 -0700 | (auth.password.UserAuthPassword) 
> destroy(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection]
> 10:56:18.185 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) init() 
> service=ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]] 
> session=ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22] id=0
> 10:56:18.186 23-Sep-16 -0700 | (che.sshd.common.channel.Window) 
> init(Window[client/local](ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])) 
> size=2097152, max=2097152, packet=32768
> 10:56:18.186 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> registerChannel(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])[id=0]
>  ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]
> 10:56:18.186 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> createSubsystemChannel(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[sftp] 
> created id=0
> 10:56:18.186 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> open(ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) Send 
> SSH_MSG_CHANNEL_OPEN - type=session
> 10:56:18.186 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 68 
> bytes
> 10:56:18.187 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) finished writing len=68
> 10:56:18.274 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) read 52 bytes
> 10:56:29.816 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> channelOpenConfirmation(ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) 
> SSH_MSG_CHANNEL_OPEN_CONFIRMATION sender=0, window-size=-1, packet-size=32768
> 10:56:29.816 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> setRecipient(ChannelSubsystem[id=0, 
> recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) recipient=0
> 10:57:05.327 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> exceptionCaught(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22]) caught IllegalArgumentException[Illegal initial 
> size: -1] - calling handler
> 10:58:34.920 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> signalAuthFailure(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> type=IllegalArgumentException, signalled=false, message="Illegal initial 
> size: -1"
> 10:58:47.260 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> exceptionCaught(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[state=Opened] 
> IllegalArgumentException: Illegal initial size: -1
> 10:58:49.222 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> exceptionCaught(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[state=Opened] 
> details
> java.lang.IllegalArgumentException: Illegal initial size: -1
>       at 
> org.apache.sshd.common.util.ValidateUtils.throwIllegalArgumentException(ValidateUtils.java:138)
>       at 
> org.apache.sshd.common.util.ValidateUtils.checkTrue(ValidateUtils.java:121)
>       at org.apache.sshd.common.channel.Window.init(Window.java:112)
>       at 
> org.apache.sshd.client.channel.AbstractClientChannel.handleOpenSuccess(AbstractClientChannel.java:336)
>       at 
> org.apache.sshd.common.session.helpers.AbstractConnectionService.channelOpenConfirmation(AbstractConnectionService.java:354)
>       at 
> org.apache.sshd.common.session.helpers.AbstractConnectionService.process(AbstractConnectionService.java:281)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSession.doHandleMessage(AbstractSession.java:530)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSession.handleMessage(AbstractSession.java:463)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSession.decode(AbstractSession.java:1325)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSession.messageReceived(AbstractSession.java:424)
>       at 
> org.apache.sshd.common.session.helpers.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:67)
>       at 
> org.apache.sshd.common.io.nio2.Nio2Session.handleReadCycleCompletion(Nio2Session.java:285)
>       at 
> org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:265)
>       at 
> org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:262)
>       at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:37)
>       at java.security.AccessController.doPrivileged(Native Method)
>       at 
> org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:34)
>       at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126)
>       at sun.nio.ch.Invoker$2.run(Invoker.java:218)
>       at 
> sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112)
>       at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
>       at 
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
>       at java.lang.Thread.run(Thread.java:745)
> 10:59:43.694 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) 
> sessionException(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> IllegalArgumentException: Illegal initial size: -1
> 10:59:43.694 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) 
> sessionClosed(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) un-tracked
> 10:59:53.332 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Closing immediately
> 10:59:53.332 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> signalAuthFailure(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) 
> type=SshException, signalled=false, message="Session is being closed"
> 10:59:53.333 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> close(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]) 
> Closing immediately
> 10:59:53.333 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> close(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) prevent 
> sending EOF
> 10:59:53.333 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> close(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) Closing 
> immediately
> 10:59:53.333 23-Sep-16 -0700 | (che.sshd.common.channel.Window) Closing 
> Window[client/local](ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])
> 10:59:53.333 23-Sep-16 -0700 | (che.sshd.common.channel.Window) Closing 
> Window[client/remote](ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])
> 10:59:53.333 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> unregisterChannel(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) 
> result=ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]
> 10:59:53.333 23-Sep-16 -0700 | (annel$GracefulChannelCloseable) 
> close(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])[immediately=true]
>  processing
> 10:59:53.334 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) 
> signal close complete
> 10:59:53.334 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) 
> close(ChannelSubsystem[id=0, 
> recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])[Immediately] 
> closed
> 10:59:53.334 23-Sep-16 -0700 | (ession.ClientConnectionService) 
> close(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])[Immediately]
>  closed
> 10:59:53.334 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> close(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, remote=/X.XX.XXX.XX:22]) 
> Closing immediately
> 10:59:53.335 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Immediately] state already 
> Immediate
> 10:59:53.335 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) 
> close(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, 
> remote=/X.XX.XXX.XX:22])[Immediately] closed
> 10:59:53.335 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) 
> signal close complete
> 10:59:53.335 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Immediately] closed
> 11:00:52.865 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) 
> close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Graceful] state already 
> Closed
> 11:00:52.865 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) 
> close(SshClient[2c14dcc4]) Closing immediately
> 11:00:52.866 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) 
> close(org.apache.sshd.common.io.nio2.Nio2Connector@6097b457) Closing 
> immediately
> 11:00:52.866 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) 
> close(org.apache.sshd.common.io.nio2.Nio2Connector@6097b457)[Immediately] 
> closed
> 11:00:52.866 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) 
> close(org.apache.sshd.common.io.nio2.Nio2ServiceFactory@601ac0d6) Closing 
> immediately
> 11:00:52.866 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) Shutdown group
> 11:00:52.891 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) Group 
> successfully shut down
> 11:00:52.892 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) 
> close(org.apache.sshd.common.io.nio2.Nio2ServiceFactory@601ac0d6)[Immediately]
>  closed
> 11:00:52.892 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) 
> signal close complete
> 11:00:52.892 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) 
> close(SshClient[2c14dcc4])[Immediately] closed



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to