简体   繁体   English

Karaf客户端无法连接到Linux下的服务器

[英]Karaf client failes to connect to a server under linux

I am trying to access an opendaylight server running on Linux in a back round process. 我正在尝试通过回程访问Linux上运行的opendaylight服务器。 I am running a distribution-karaf-0.2.1-Helium-SR1. 我正在运行发行版Karaf-0.2.1-Helium-SR1。

From what I understand in case you are trying to connect from the same machine all you need to do is run 据我了解,万一您尝试从同一台计算机进行连接,则只需运行

./client and the connection will be done. ./client并完成连接。

However all I get is : 但是我得到的是:

[root@d20-srv-81-32 bin]# ./client Logging in as karaf 258 [pool-2-thread-2] WARN org.apache.sshd.client.keyverifier.AcceptAllServerKeyVerifier - Server at /0.0.0.0:8101 presented unverified key: [root@d20-srv-81-32 bin]# [root @ d20-srv-81-32 bin]#./client以karaf 258身份登录[pool-2-thread-2] WARN org.apache.sshd.client.keyverifier.AcceptAllServerKeyVerifier-服务器位于/0.0.0.0: 8101提出了未验证的密钥:[root @ d20-srv-81-32 bin]#

When I to try to connect using a simple ssh: ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -p 8101 karaf@localhost the operation is successful. 当我尝试使用简单的ssh连接时:ssh -o UserKnownHostsFile = / dev / null -o StrictHostKeyChecking = no -p 8101 karaf @ localhost,该操作成功。

Has any one encountered the issue? 有没有人遇到这个问题?

more info ./client -v result 更多信息./client -v结果

[root@d20-srv-81-32 bin]# ./client -v
23 [main] INFO org.apache.sshd.common.util.SecurityUtils - BouncyCastle not registered, using the default JCE provider
207 [pool-2-thread-1] INFO org.apache.sshd.client.session.ClientSessionImpl - Session created...
Logging in as karaf
215 [pool-2-thread-1] INFO org.apache.sshd.client.session.ClientSessionImpl - Server version string: SSH-2.0-SSHD-CORE-0.12.0
216 [pool-2-thread-1] INFO org.apache.sshd.client.session.ClientSessionImpl - Received SSH_MSG_KEXINIT
227 [pool-2-thread-1] INFO org.apache.sshd.client.kex.DHG1 - Send SSH_MSG_KEXDH_INIT
234 [pool-2-thread-2] INFO org.apache.sshd.client.kex.DHG1 - Received SSH_MSG_KEXDH_REPLY
241 [pool-2-thread-2] WARN org.apache.sshd.client.keyverifier.AcceptAllServerKeyVerifier - Server at /0.0.0.0:8101 presented unverified key:
241 [pool-2-thread-2] INFO org.apache.sshd.client.session.ClientSessionImpl - Received SSH_MSG_NEWKEYS
245 [pool-2-thread-2] INFO org.apache.sshd.client.session.ClientSessionImpl - Send SSH_MSG_SERVICE_REQUEST for ssh-userauth
248 [main] INFO org.apache.sshd.client.auth.UserAuthAgent - Send SSH_MSG_USERAUTH_REQUEST for publickey
256 [pool-2-thread-5] INFO org.apache.sshd.client.auth.UserAuthAgent - Received SSH_MSG_USERAUTH_SUCCESS
306 [main] INFO org.apache.sshd.client.channel.ChannelShell - Send SSH_MSG_CHANNEL_OPEN on channel 101
307 [pool-2-thread-2] INFO org.apache.sshd.client.channel.ChannelShell - Send agent forwarding request
308 [pool-2-thread-2] INFO org.apache.sshd.client.channel.ChannelShell - Send SSH_MSG_CHANNEL_REQUEST pty-req
308 [pool-2-thread-2] INFO org.apache.sshd.client.channel.ChannelShell - Send SSH_MSG_CHANNEL_REQUEST env
309 [pool-2-thread-2] INFO org.apache.sshd.client.channel.ChannelShell - Send SSH_MSG_CHANNEL_REQUEST shell

[root@d20-srv-81-32 bin]# [root @ d20-srv-81-32 bin]#

in the end the issue was caused because i used the zip release of open day light helium. 最后,问题是由我使用开放日光氦气的拉链释放引起的。

on the opendaylight download page there are two versions. 在opendaylight下载页面上,有两个版本。 one compressed as a zip and the other as tar.gz. 一个压缩为zip,另一个压缩为tar.gz。 from what i found there are system differences between them the zip is for windows and the tar for Linux. 从我发现它们之间存在系统差异,zip是针对Windows的,tar是针对Linux的。

when i deployed the tar version on Linux the issue did not reproduce. 当我在Linux上部署tar版本时,问题没有重现。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM