[ https://issues.apache.org/jira/browse/SSHD-701?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15536985#comment-15536985 ]
Roger Hart commented on SSHD-701: --------------------------------- [~lgoldstein] I tested your change and it worked great! Thanks again. > IllegalArgumentException processing SSH_MSG_CHANNEL_OPEN_CONFIRMATION with > initial window size of -1 > ---------------------------------------------------------------------------------------------------- > > Key: SSHD-701 > URL: https://issues.apache.org/jira/browse/SSHD-701 > Project: MINA SSHD > Issue Type: Improvement > Affects Versions: 1.2.0 > Reporter: Roger Hart > Assignee: Goldstein Lyor > Priority: Minor > Fix For: 1.4.0 > > > We're using Apache MINA SSHD 1.2.0 successfully except for one server which > sends an init window size of -1 in the SSH_MSG_CHANNEL_OPEN_CONFIRMATION > message (other servers send 0). This causes SSHD to throw an > IllegalArgumentException here: > ValidateUtils.checkTrue(window >= 0, "Negative window size: %d", window); > I'm able to send files to this server using the Win SCP command line client. > It would be nice if SSHD was more robust and treated a negative window size > as 0. > Here's the SSHD log entries: > 10:56:13.296 23-Sep-16 -0700 | (ultConfigFileHostEntryResolver) > resolveEffectiveHost(XXXXXXXX@/X.XX.XXX.XX:22) => null > 10:56:13.296 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) > connect(XXXXXXXX@/X.XX.XXX.XX:22) no overrides > 10:56:13.296 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) Connecting to > /X.XX.XXX.XX:22 > 10:56:13.297 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) > setOption(SO_REUSEADDR)[true] from property=socket-reuseaddr > 10:56:13.389 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Creating > IoSession on /0:0:0:0:0:0:0:0:57579 from /X.XX.XXX.XX:22 > 10:56:13.390 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) Client > session created: Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22] > 10:56:13.391 23-Sep-16 -0700 | (.session.ClientUserAuthService) > ClientUserAuthService(ClientSessionImpl[null@/X.XX.XXX.XX:22]) client > methods: [publickey, keyboard-interactive, password] > 10:56:13.391 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) > sessionCreated(ClientSessionImpl[null@/X.XX.XXX.XX:22]) tracking > 10:56:13.391 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > sendIdentification(ClientSessionImpl[null@/X.XX.XXX.XX:22]): > SSH-2.0-SSHD-CORE-1.2.0 > 10:56:13.391 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 25 > bytes > 10:56:13.392 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > sendKexInit(ClientSessionImpl[null@/X.XX.XXX.XX:22]) Send SSH_MSG_KEXINIT > 10:56:13.392 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 592 > bytes > 10:56:13.393 23-Sep-16 -0700 | (.session.ClientUserAuthService) > auth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] send > SSH_MSG_USERAUTH_REQUEST for 'none' > 10:56:13.393 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=25 > 10:56:13.395 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > writePacket(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[SSH_MSG_USERAUTH_REQUEST] > Start flagging packets as pending until key exchange is done > 10:56:13.396 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=592 > 10:56:13.480 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) read 568 bytes > 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > doReadIdentification(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) > line='SSH-2.0-mod_sftp/0.9.7' > 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > readIdentification(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Server > version string: SSH-2.0-mod_sftp/0.9.7 > 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > handleKexInit(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) SSH_MSG_KEXINIT > 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > setNegotiationResult(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Kex: > server->client aes128-ctr hmac-sha1 none > 10:56:13.480 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > setNegotiationResult(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Kex: > client->server aes128-ctr hmac-sha1 none > 10:56:13.480 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) > init(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send > SSH_MSG_KEX_DH_GEX_REQUEST > 10:56:13.480 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 32 > bytes > 10:56:13.481 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=32 > 10:56:13.575 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) read 536 bytes > 10:56:13.575 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) > next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]] > process command=SSH_MSG_KEX_DH_GEX_GROUP > 10:56:13.731 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) > next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]] > Send SSH_MSG_KEX_DH_GEX_INIT > 10:56:13.732 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 536 > bytes > 10:56:13.732 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > handleKexMessage(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[diffie-hellman-group-exchange-sha256] > more KEX packets expected after cmd=31 > 10:56:13.732 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=536 > 10:56:13.859 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) read 1088 bytes > 10:56:13.859 23-Sep-16 -0700 | (he.sshd.client.kex.DHGEXClient) > next(DHGEXClient[diffie-hellman-group-exchange-sha256])[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]] > process command=SSH_MSG_KEX_DH_GEX_REPLY > 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > handleKexMessage(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[diffie-hellman-group-exchange-sha256] > KEX processing complete after cmd=33 > 10:56:14.033 23-Sep-16 -0700 | (ier.AcceptAllServerKeyVerifier) Server at > /X.XX.XXX.XX:22 presented unverified RSA key: > SHA256:WrrMne/bbQyBS9h+NICa1AhbA/Lt2uzZNtcd0J+DVWI > 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > checkKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) > key=ssh-rsa-SHA256:WrrMne/bbQyBS9h+NICa1AhbA/Lt2uzZNtcd0J+DVWI, verified=true > 10:56:14.033 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > sendNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send SSH_MSG_NEWKEYS > 10:56:14.033 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 16 > bytes > 10:56:14.034 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=16 > 10:56:14.121 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) read 16 bytes > 10:56:14.121 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > handleNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) SSH_MSG_NEWKEYS > command=SSH_MSG_NEWKEYS > 10:56:14.121 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > receiveNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) session > ID=a9:7b:cf:a5:ca:c5:d9:f2:1a:c9:aa:e7:55:94:6f:01:e0:65:07:e1:b6:fb:ed:35:8b:86:3f:10:17:fe:9b:96 > 10:56:14.122 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > receiveNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) > inCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], > outCipher=BaseCipher[AES,16,16,AES/CTR/NoPadding], recommended blocks > limit=4294967296, actual=4294967296 > 10:56:14.122 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > sendInitialServiceRequest(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Send > SSH_MSG_SERVICE_REQUEST for ssh-userauth > 10:56:14.122 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 68 > bytes > 10:56:14.122 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=68 > 10:56:14.123 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > handleNewKeys(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Dequeing 1 pending > packets > 10:56:14.123 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 84 > bytes > 10:56:14.123 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=84 > 10:56:14.210 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) read 52 bytes > 10:56:14.210 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > handleServiceAccept(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) > SSH_MSG_SERVICE_ACCEPT service=ssh-userauth > 10:56:14.300 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) read 68 bytes > 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) > processUserAuth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Received > SSH_MSG_USERAUTH_FAILURE - partial=false, methods=publickey,password > 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) > tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) starting authentication > mechanisms: client=[publickey, keyboard-interactive, password], > server=[publickey, password] > 10:56:14.300 23-Sep-16 -0700 | (.session.ClientUserAuthService) > tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) attempting > method=publickey > 10:56:14.300 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) > loadKeys(C:\Users\rhart\.ssh\id_rsa) no key loaded > 10:56:14.301 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) > loadKeys(C:\Users\rhart\.ssh\id_dsa) no key loaded > 10:56:14.301 23-Sep-16 -0700 | (DefaultClientIdentitiesWatcher) > loadKeys(C:\Users\rhart\.ssh\id_ecdsa) no key loaded > 10:56:14.301 23-Sep-16 -0700 | (.auth.pubkey.UserAuthPublicKey) > sendAuthDataRequest(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] > no more keys to send > 10:56:14.301 23-Sep-16 -0700 | (.session.ClientUserAuthService) > tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) no initial request sent > by method=publickey > 10:56:14.301 23-Sep-16 -0700 | (.auth.pubkey.UserAuthPublicKey) > destroy(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] > 10:56:14.301 23-Sep-16 -0700 | (.session.ClientUserAuthService) > tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) attempting > method=password > 10:56:14.301 23-Sep-16 -0700 | (auth.password.UserAuthPassword) > sendPassword(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] > send SSH_MSG_USERAUTH_REQUEST for password - modified=false > 10:56:14.301 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 116 > bytes > 10:56:14.302 23-Sep-16 -0700 | (.session.ClientUserAuthService) > tryNext(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) successfully processed > initial buffer by method=password > 10:56:14.302 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=116 > 10:56:14.396 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) read 36 bytes > 10:56:14.396 23-Sep-16 -0700 | (.session.ClientUserAuthService) > processUserAuth(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) > SSH_MSG_USERAUTH_SUCCESS Succeeded with password > 10:56:14.396 23-Sep-16 -0700 | (auth.password.UserAuthPassword) > destroy(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[ssh-connection] > 10:56:18.185 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) init() > service=ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]] > session=ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22] id=0 > 10:56:18.186 23-Sep-16 -0700 | (che.sshd.common.channel.Window) > init(Window[client/local](ChannelSubsystem[id=0, > recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])) > size=2097152, max=2097152, packet=32768 > 10:56:18.186 23-Sep-16 -0700 | (ession.ClientConnectionService) > registerChannel(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])[id=0] > ChannelSubsystem[id=0, > recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp] > 10:56:18.186 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > createSubsystemChannel(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[sftp] > created id=0 > 10:56:18.186 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) > open(ChannelSubsystem[id=0, > recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) Send > SSH_MSG_CHANNEL_OPEN - type=session > 10:56:18.186 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) Writing 68 > bytes > 10:56:18.187 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleCompletedWriteCycle(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) finished writing len=68 > 10:56:18.274 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > handleReadCycleCompletion(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) read 52 bytes > 10:56:29.816 23-Sep-16 -0700 | (ession.ClientConnectionService) > channelOpenConfirmation(ChannelSubsystem[id=0, > recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) > SSH_MSG_CHANNEL_OPEN_CONFIRMATION sender=0, window-size=-1, packet-size=32768 > 10:56:29.816 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) > setRecipient(ChannelSubsystem[id=0, > recipient=-1]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) recipient=0 > 10:57:05.327 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > exceptionCaught(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22]) caught IllegalArgumentException[Illegal initial > size: -1] - calling handler > 10:58:34.920 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > signalAuthFailure(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) > type=IllegalArgumentException, signalled=false, message="Illegal initial > size: -1" > 10:58:47.260 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > exceptionCaught(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[state=Opened] > IllegalArgumentException: Illegal initial size: -1 > 10:58:49.222 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > exceptionCaught(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[state=Opened] > details > java.lang.IllegalArgumentException: Illegal initial size: -1 > at > org.apache.sshd.common.util.ValidateUtils.throwIllegalArgumentException(ValidateUtils.java:138) > at > org.apache.sshd.common.util.ValidateUtils.checkTrue(ValidateUtils.java:121) > at org.apache.sshd.common.channel.Window.init(Window.java:112) > at > org.apache.sshd.client.channel.AbstractClientChannel.handleOpenSuccess(AbstractClientChannel.java:336) > at > org.apache.sshd.common.session.helpers.AbstractConnectionService.channelOpenConfirmation(AbstractConnectionService.java:354) > at > org.apache.sshd.common.session.helpers.AbstractConnectionService.process(AbstractConnectionService.java:281) > at > org.apache.sshd.common.session.helpers.AbstractSession.doHandleMessage(AbstractSession.java:530) > at > org.apache.sshd.common.session.helpers.AbstractSession.handleMessage(AbstractSession.java:463) > at > org.apache.sshd.common.session.helpers.AbstractSession.decode(AbstractSession.java:1325) > at > org.apache.sshd.common.session.helpers.AbstractSession.messageReceived(AbstractSession.java:424) > at > org.apache.sshd.common.session.helpers.AbstractSessionIoHandler.messageReceived(AbstractSessionIoHandler.java:67) > at > org.apache.sshd.common.io.nio2.Nio2Session.handleReadCycleCompletion(Nio2Session.java:285) > at > org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:265) > at > org.apache.sshd.common.io.nio2.Nio2Session$2.onCompleted(Nio2Session.java:262) > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler$1.run(Nio2CompletionHandler.java:37) > at java.security.AccessController.doPrivileged(Native Method) > at > org.apache.sshd.common.io.nio2.Nio2CompletionHandler.completed(Nio2CompletionHandler.java:34) > at sun.nio.ch.Invoker.invokeUnchecked(Invoker.java:126) > at sun.nio.ch.Invoker$2.run(Invoker.java:218) > at > sun.nio.ch.AsynchronousChannelGroupImpl$1.run(AsynchronousChannelGroupImpl.java:112) > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142) > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617) > at java.lang.Thread.run(Thread.java:745) > 10:59:43.694 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) > sessionException(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) > IllegalArgumentException: Illegal initial size: -1 > 10:59:43.694 23-Sep-16 -0700 | (helpers.SessionTimeoutListener) > sessionClosed(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) un-tracked > 10:59:53.332 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) Closing immediately > 10:59:53.332 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > signalAuthFailure(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]) > type=SshException, signalled=false, message="Session is being closed" > 10:59:53.333 23-Sep-16 -0700 | (ession.ClientConnectionService) > close(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]]) > Closing immediately > 10:59:53.333 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) > close(ChannelSubsystem[id=0, > recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) prevent > sending EOF > 10:59:53.333 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) > close(ChannelSubsystem[id=0, > recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) Closing > immediately > 10:59:53.333 23-Sep-16 -0700 | (che.sshd.common.channel.Window) Closing > Window[client/local](ChannelSubsystem[id=0, > recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) > 10:59:53.333 23-Sep-16 -0700 | (che.sshd.common.channel.Window) Closing > Window[client/remote](ChannelSubsystem[id=0, > recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) > 10:59:53.333 23-Sep-16 -0700 | (ession.ClientConnectionService) > unregisterChannel(ChannelSubsystem[id=0, > recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp]) > result=ChannelSubsystem[id=0, > recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp] > 10:59:53.333 23-Sep-16 -0700 | (annel$GracefulChannelCloseable) > close(ChannelSubsystem[id=0, > recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])[immediately=true] > processing > 10:59:53.334 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) > signal close complete > 10:59:53.334 23-Sep-16 -0700 | (lient.channel.ChannelSubsystem) > close(ChannelSubsystem[id=0, > recipient=0]-ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22][sftp])[Immediately] > closed > 10:59:53.334 23-Sep-16 -0700 | (ession.ClientConnectionService) > close(ClientConnectionService[ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22]])[Immediately] > closed > 10:59:53.334 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > close(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, remote=/X.XX.XXX.XX:22]) > Closing immediately > 10:59:53.335 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Immediately] state already > Immediate > 10:59:53.335 23-Sep-16 -0700 | (shd.common.io.nio2.Nio2Session) > close(Nio2Session[local=/0:0:0:0:0:0:0:0:57579, > remote=/X.XX.XXX.XX:22])[Immediately] closed > 10:59:53.335 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) > signal close complete > 10:59:53.335 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Immediately] closed > 11:00:52.865 23-Sep-16 -0700 | (ient.session.ClientSessionImpl) > close(ClientSessionImpl[XXXXXXXX@/X.XX.XXX.XX:22])[Graceful] state already > Closed > 11:00:52.865 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) > close(SshClient[2c14dcc4]) Closing immediately > 11:00:52.866 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) > close(org.apache.sshd.common.io.nio2.Nio2Connector@6097b457) Closing > immediately > 11:00:52.866 23-Sep-16 -0700 | (d.common.io.nio2.Nio2Connector) > close(org.apache.sshd.common.io.nio2.Nio2Connector@6097b457)[Immediately] > closed > 11:00:52.866 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) > close(org.apache.sshd.common.io.nio2.Nio2ServiceFactory@601ac0d6) Closing > immediately > 11:00:52.866 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) Shutdown group > 11:00:52.891 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) Group > successfully shut down > 11:00:52.892 23-Sep-16 -0700 | (mon.io.nio2.Nio2ServiceFactory) > close(org.apache.sshd.common.io.nio2.Nio2ServiceFactory@601ac0d6)[Immediately] > closed > 11:00:52.892 23-Sep-16 -0700 | (.closeable.SequentialCloseable) doClose(true) > signal close complete > 11:00:52.892 23-Sep-16 -0700 | (g.apache.sshd.client.SshClient) > close(SshClient[2c14dcc4])[Immediately] closed -- This message was sent by Atlassian JIRA (v6.3.4#6332)