2016-05-17 33 views
7

Pobrałem nowe zadanie pobierania JSch 0.1.53 library i JSch (sftp) już nie działa. To wydanie kończy się niepowodzeniem w przypadku funkcji session.connect(), powodującej błąd: Session.connect: java.io.IOException: End of IO Stream Read.JSch 0.1.53 session.connect() wyrzuca "Koniec strumienia IO Czytaj"

Mój stary jsch.jar (2011-10-06) działa dobrze na tym samym hoście, może brakuje mi nowych rekwizytów konfiguracyjnych?

Session session=null; 
ChannelSftp channel=null; 
try { 
    JSch.setLogger(SSHUtil.createJschLogger()); 

    JSch jsch=new JSch(); 
    session=jsch.getSession("myuser", "11.22.33.44", 22); 
    session.setConfig("StrictHostKeyChecking", "no"); 
    session.setPassword("mypwd"); 
    session.connect(2000); // <-- FAILS HERE 
    channel = (ChannelSftp)session.openChannel("sftp"); 
    channel.connect(2000); 
    ... 

To jest obszerna rejestracja JSch wskazująca, co się dzieje.

INFO : Connecting to 11.22.33.44 port 22 
INFO : Connection established 
INFO : Remote version string: SSH-2.0-OpenSSH_6.6.1 
INFO : Local version string: SSH-2.0-JSCH-0.1.53 
INFO : CheckCiphers: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-ctr,arcfour,arcfour128,arcfour256 
INFO : aes256-ctr is not available. 
INFO : aes192-ctr is not available. 
INFO : aes256-cbc is not available. 
INFO : aes192-cbc is not available. 
INFO : CheckKexes: diffie-hellman-group14-sha1,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521 
INFO : diffie-hellman-group14-sha1 is not available. 
INFO : ecdh-sha2-nistp256 is not available. 
INFO : ecdh-sha2-nistp384 is not available. 
INFO : ecdh-sha2-nistp521 is not available. 
INFO : CheckSignatures: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 
INFO : ecdsa-sha2-nistp256 is not available. 
INFO : ecdsa-sha2-nistp384 is not available. 
INFO : ecdsa-sha2-nistp521 is not available. 
INFO : SSH_MSG_KEXINIT sent 
INFO : SSH_MSG_KEXINIT received 
INFO : kex: server: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 
INFO : kex: server: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 
INFO : kex: server: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,[email protected],[email protected],[email protected],aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] 
INFO : kex: server: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,[email protected],[email protected],[email protected],aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] 
INFO : kex: server: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-md5,hmac-sha1,[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 
INFO : kex: server: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-md5,hmac-sha1,[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 
INFO : kex: server: none,[email protected] 
INFO : kex: server: none,[email protected] 
INFO : kex: server: 
INFO : kex: server: 
INFO : kex: client: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 
INFO : kex: client: ssh-rsa,ssh-dss 
INFO : kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc 
INFO : kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc 
INFO : kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96 
INFO : kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96 
INFO : kex: client: none 
INFO : kex: client: none 
INFO : kex: client: 
INFO : kex: client: 
INFO : kex: server->client aes128-ctr hmac-md5 none 
INFO : kex: client->server aes128-ctr hmac-md5 none 
INFO : SSH_MSG_KEX_DH_GEX_REQUEST(1024<1024<1024) sent 
INFO : expecting SSH_MSG_KEX_DH_GEX_GROUP 
INFO : Disconnecting from 11.22.33.44 port 22 
Exception in thread "main" com.jcraft.jsch.JSchException: Session.connect: java.io.IOException: End of IO Stream Read 
     at com.jcraft.jsch.Session.connect(Session.java:558) 
     at com.jcraft.jsch.Session.connect(Session.java:183) 
     at my.test.DownloadSFTP.main(DownloadSFTP.java:37) 
Caused by: java.io.IOException: End of IO Stream Read 
     at com.jcraft.jsch.IO.getByte(IO.java:84) 
     at com.jcraft.jsch.Session.read(Session.java:918) 
     at com.jcraft.jsch.Session.connect(Session.java:323) 

Mam też bardzo stare Jsch.jar (2011-10-06) gdzie pobieranie zadanie działa dobrze, to jest log. Powodem, dla którego chciałem uaktualnić, jest bardzo wolny transfer plików. Nowe wydanie powinno zrobić lepiej, co przeczytałem.

INFO : Connecting to 11.22.33.44 port 22 
INFO : Connection established 
INFO : Remote version string: SSH-2.0-OpenSSH_6.6.1 
INFO : Local version string: SSH-2.0-JSCH-0.1.44 
INFO : CheckCiphers: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-ctr,arcfour,arcfour128,arcfour256 
INFO : aes256-ctr is not available. 
INFO : aes192-ctr is not available. 
INFO : aes256-cbc is not available. 
INFO : aes192-cbc is not available. 
INFO : arcfour256 is not available. 
INFO : SSH_MSG_KEXINIT sent 
INFO : SSH_MSG_KEXINIT received 
INFO : kex: server->client aes128-ctr hmac-md5 none 
INFO : kex: client->server aes128-ctr hmac-md5 none 
INFO : SSH_MSG_KEXDH_INIT sent 
INFO : expecting SSH_MSG_KEXDH_REPLY 
INFO : ssh_rsa_verify: signature true 
WARN : Permanently added '11.22.33.44' (RSA) to the list of known hosts. 
INFO : SSH_MSG_NEWKEYS sent 
INFO : SSH_MSG_NEWKEYS received 
INFO : SSH_MSG_SERVICE_REQUEST sent 
INFO : SSH_MSG_SERVICE_ACCEPT received 
INFO : Authentications that can continue: publickey,keyboard-interactive,password 
INFO : Next authentication method: publickey 
INFO : Authentications that can continue: keyboard-interactive,password 
INFO : Next authentication method: keyboard-interactive 
INFO : Authentication succeeded (keyboard-interactive). 
INFO : Disconnecting from 11.22.33.44 port 22 
INFO : Caught an exception, leaving main loop due to socket closed 

EDIT miałem pomysł na backstep komunikaty w A Maven repository i rzeczywiście jest to bardzo nowa wersja nie działa poprawnie. Poprzednie wydanie jsch-0.1.52.jar działa dobrze. Próbuję skontaktować się z programistami bibliotek.

To jest dziennik z działającej wersji 0.1.52.

INFO : Connecting to 11.22.33.44 port 22 
INFO : Connection established 
INFO : Remote version string: SSH-2.0-OpenSSH_6.6.1 
INFO : Local version string: SSH-2.0-JSCH-0.1.52 
INFO : CheckCiphers: aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,3des-ctr,arcfour,arcfour128,arcfour256 
INFO : aes256-ctr is not available. 
INFO : aes192-ctr is not available. 
INFO : aes256-cbc is not available. 
INFO : aes192-cbc is not available. 
INFO : CheckKexes: diffie-hellman-group14-sha1,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521 
INFO : diffie-hellman-group14-sha1 is not available. 
INFO : ecdh-sha2-nistp256 is not available. 
INFO : ecdh-sha2-nistp384 is not available. 
INFO : ecdh-sha2-nistp521 is not available. 
INFO : CheckSignatures: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521 
INFO : ecdsa-sha2-nistp256 is not available. 
INFO : ecdsa-sha2-nistp384 is not available. 
INFO : ecdsa-sha2-nistp521 is not available. 
INFO : SSH_MSG_KEXINIT sent 
INFO : SSH_MSG_KEXINIT received 
INFO : kex: server: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 
INFO : kex: server: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 
INFO : kex: server: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,[email protected],[email protected],[email protected],aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] 
INFO : kex: server: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,[email protected],[email protected],[email protected],aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected] 
INFO : kex: server: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-md5,hmac-sha1,[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 
INFO : kex: server: [email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-md5,hmac-sha1,[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96 
INFO : kex: server: none,[email protected] 
INFO : kex: server: none,[email protected] 
INFO : kex: server: 
INFO : kex: server: 
INFO : kex: client: diffie-hellman-group1-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group-exchange-sha256 
INFO : kex: client: ssh-rsa,ssh-dss 
INFO : kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc 
INFO : kex: client: aes128-ctr,aes128-cbc,3des-ctr,3des-cbc,blowfish-cbc 
INFO : kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96 
INFO : kex: client: hmac-md5,hmac-sha1,hmac-sha2-256,hmac-sha1-96,hmac-md5-96 
INFO : kex: client: none 
INFO : kex: client: none 
INFO : kex: client: 
INFO : kex: client: 
INFO : kex: server->client aes128-ctr hmac-md5 none 
INFO : kex: client->server aes128-ctr hmac-md5 none 
INFO : SSH_MSG_KEXDH_INIT sent 
INFO : expecting SSH_MSG_KEXDH_REPLY 
INFO : ssh_rsa_verify: signature true 
WARN : Permanently added '11.22.33.44' (RSA) to the list of known hosts. 
INFO : SSH_MSG_NEWKEYS sent 
INFO : SSH_MSG_NEWKEYS received 
INFO : SSH_MSG_SERVICE_REQUEST sent 
INFO : SSH_MSG_SERVICE_ACCEPT received 
INFO : Authentications that can continue: publickey,keyboard-interactive,password 
INFO : Next authentication method: publickey 
INFO : Authentications that can continue: keyboard-interactive,password 
INFO : Next authentication method: keyboard-interactive 
INFO : Authentication succeeded (keyboard-interactive). 
+0

prawdopodobnie coraz odłączony od serwera. Co mówi dziennik serwera? –

+0

Dobre punkty, dodano 0.1.52 log, nowe (niepowodzenie) wydanie to plik 0.1.53.jar. Zrzut dziennika drukuje wersję biblioteki na początku. – Whome

+0

Nie używaj 'StrictHostKeyChecking = no', w ten sposób tracisz ochronę przed atakami MITM. –

Odpowiedz

8

jsch 0.1.53 podpory (i woli) Do diffie-hellman-group-exchange-sha256 KEX, co serwer twierdzi, że obsługuje też, więc jsch stara się go używać.

Z jakiegoś powodu serwer rozłączy się po tym.

Aby obejść, że zmuszają jsch używać diffie-hellman-group1-sha1 KEX, co jsch 0.1.52 woli:

session.setConfig("kex", "diffie-hellman-group1-sha1"); 
+0

To wystarczyło, a także mogę potwierdzić 0.53 o wiele szybsze pobieranie plików niż stara biblioteka 0.44. – Whome

+0

Czy mimo to jest ustawiona ta wartość "kex", gdy JSch jest używany w kontekście IDB JetBrains PyCharm? Pracuję nad tym samym zagadnieniem, w który wierzę, ale tylko z pewnymi serwerami CentOS 7, a nie z innymi i chciałbym przetestować to obejście, jeśli to możliwe. –

+0

@MarkEdington Jeśli masz dodatkowe pytanie, zadaj je. To jest strona z pytaniami i odpowiedziami, a nie forum dyskusyjne. –

4

miałem ten sam problem Właśnie zmienił wersję jsch do 0.1.54, ale rozwiązany

dodać do swojej pom.xml

<dependency> 
    <groupId>com.jcraft</groupId> 
    <artifactId>jsch</artifactId> 
    <version>0.1.54</version> 
</dependency> 
+0

Mam do czynienia z tym samym problemem z wersją 0.1.54. ("Koniec strumienia IO Czytaj") –

+0

sprawdź w wyższej wersji. @sharathchandra –