Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- import pysftp
- upftp=FTP(host=ftp_ip, user=ftp_name, passwd=ftp_passwd, acct=ftp_port, timeout=None)
- ...
- try:
- upftp.storbinary('STOR %s'%obj[2], fp, 8192, self.callpecent)
- except Exception as error:
- fp.close()
- self.endit(upftp, 1, '%s,%s'%(obj[2],error), '%s,%s'%(obj[2],error)
- 2015-03-24 09:43:05 DEBUG - Rekeying (hit 32729 packets, 536900100 bytes sent)
- 2015-03-24 09:43:05 DEBUG - Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
- 2015-03-24 09:43:05 DEBUG - using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none
- 2015-03-24 09:43:05 ERROR - Exception: Expecting packet from (31,), got 94
- 2015-03-24 09:43:05 ERROR - Traceback (most recent call last):
- 2015-03-24 09:43:05 ERROR - File "D:Python34libsite-packagesparamiko-1.14.0-py3.4.eggparamikotransport.py", line 1435, in run
- 2015-03-24 09:43:05 ERROR - raise SSHException('Expecting packet from %r, got %d' % (self._expected_packet, ptype))
- 2015-03-24 09:43:05 ERROR - paramiko.ssh_exception.SSHException: Expecting packet from (31,), got 94
- 2015-03-24 09:43:05 ERROR -
- 2015-03-24 09:43:05 DEBUG - Dropping user packet because connection is dead.
- 2015-03-24 09:43:05 DEBUG - [chan 1] close(b'd40b000000000000')
- 2015-03-24 09:43:05 INFO - [chan 1] sftp session closed.
- self.ssh_client.connect(...)
- transport = self.ssh_client.get_transport()
- transport.default_window_size = 2147483647
- transport.packetizer.REKEY_BYTES = pow(2, 40)
- transport.packetizer.REKEY_PACKETS = pow(2, 40)
- self.sftp_client = self.ssh_client.open_sftp()
- print(self.sft_client.get_channel().in_window_size)
- print(sftp_connection.get_channel().in_max_packet_size)
- # Output
- 2147483647
- 32768
- in the paramiko/packet.py
- REKEY_PACKETS = pow(2, 29)
- REKEY_BYTES = pow(2, 29)
- REKEY_PACKETS_OVERFLOW_MAX = pow(2, 29) # Allow receiving this many packets after a re-key request before terminating
- REKEY_BYTES_OVERFLOW_MAX = pow(2, 29) # Allow receiving this many bytes after a re-key request before terminating
- def _trigger_rekey(self):
- # outside code should check for this flag
- self.__need_rekey = True
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement