如何解决SFTP 连接超时
使用 pysftp 包(paramiko SSH 客户端的包装器),我在建立连接时遇到超时。这大约在 80% 的时间内有效,但在另外 20% 的时间内失败(每天运行,每周失败 1-2 次)。 pysftp 版本是 0.2.9,在 RHEL 7.7 上运行。连接位于公司网络内(无防火墙或代理)。
connection_options = pysftp.CnOpts()
if args.debug:
connection_options.log = True
sftp = pysftp.Connection(host = 'server_name',username='xxxxx',private_key = file_name,private_key_pass = 'passphrase',cnopts=connection_options)
调试日志(最后两行显示超时):
2021-06-25 20:00:07,918:DEBUG:transport.py:33388:_log:1819:starting thread (client mode): 0xfcc96550
2021-06-25 20:00:07,919:DEBUG:transport.py:33388:_log:1819:Local version/idstring: SSH-2.0-paramiko_2.7.2
2021-06-25 20:00:07,992:DEBUG:transport.py:33388:_log:1819:Remote version/idstring: SSH-2.0-WRQReflectionforSecureIT_8.1 Build 94
2021-06-25 20:00:07,992:INFO:transport.py:33388:_log:1819:Connected (version 2.0,client WRQReflectionforSecureIT_8.1)
2021-06-25 20:00:08,000:DEBUG:transport.py:33388:_log:1819:kex algos:['diffie-hellman-group1-sha1','diffie-hellman-group14-sha1','diffie-hellman-group-exchange-sha1','diffie-hellman-group-exchange-sha256','gss-group1-sha1-toWM5Slw5Ew8Mqkay+al2g==','gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g=='] server key:['ssh-rsa-sha2-256@attachmate.com','ssh-rsa'] client encrypt:['aes128-ctr','aes192-ctr','aes256-ctr','aes128-cbc','aes192-cbc','aes256-cbc','3des-cbc','blowfish-cbc','cast128-cbc','arcfour256','arcfour128','arcfour'] server encrypt:['aes128-ctr','arcfour'] client mac:['hmac-sha256','hmac-sha2-256','hmac-sha1','hmac-md5','hmac-sha1-96','hmac-md5-96','hmac-ripemd160','hmac-sha512','hmac-sha2-512'] server mac:['hmac-sha256','hmac-sha2-512'] client compress:['zlib','none'] server compress:['zlib','none'] client lang:[''] server lang:[''] kex follows?False
2021-06-25 20:00:08,000:DEBUG:transport.py:33388:_log:1819:Kex agreed: diffie-hellman-group-exchange-sha256
2021-06-25 20:00:08,000:DEBUG:transport.py:33388:_log:1819:HostKey agreed: ssh-rsa
2021-06-25 20:00:08,001:DEBUG:transport.py:33388:_log:1819:Cipher agreed: aes128-ctr
2021-06-25 20:00:08,001:DEBUG:transport.py:33388:_log:1819:MAC agreed: hmac-sha2-256
2021-06-25 20:00:08,001:DEBUG:transport.py:33388:_log:1819:Compression agreed: none
2021-06-25 20:00:08,365:DEBUG:transport.py:33388:_log:1819:Got server p (2048 bits)
2021-06-25 20:00:08,538:DEBUG:transport.py:33388:_log:1819:kex engine KexGexSHA256 specified hash_algo <built-in function openssl_sha256>
2021-06-25 20:00:08,539:DEBUG:transport.py:33388:_log:1819:Switch to new keys ...
2021-06-25 20:00:08,539:DEBUG:transport.py:33388:_log:1819:Host key verified (ssh-rsa)
2021-06-25 20:00:08,540:DEBUG:transport.py:33388:_log:1819:Attempting public-key auth...
2021-06-25 20:00:08,908:DEBUG:transport.py:33388:_log:1819:userauth is OK
2021-06-25 20:00:38,585:ERROR:mylogins_extract.py:33388:mylogins_extract:180:Authentication timeout.
版权声明:本文内容由互联网用户自发贡献,该文观点与技术仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 dio@foxmail.com 举报,一经查实,本站将立刻删除。