paramiko socket.timeout

Bug #1858713 reported by Danilo G. Baio
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Duplicity
Fix Released
Medium
Unassigned

Bug Description

duplicity 0.8.09
Python 3.7.6
FreeBSD 13.0-CURRENT
py37-paramiko-2.6.0
py37-scp-0.13.2

duplicity $version ($reldate)
Args: /usr/local/bin/duplicity full -v9 --encrypt-key=REDACTED --encrypt-sign-key=REDACTED /home/test paramiko+scp://REDACTED//home/test/dup
FreeBSD t480.local 13.0-CURRENT FreeBSD 13.0-CURRENT #9 r355478: Fri Dec 6 23:47:27 -03 2019
<email address hidden>:/usr/obj/usr/src/amd64.amd64/sys/GENERIC-NODEBUG amd64 amd64 /usr/local/bin/python3.7 3.7.6 (default, Dec 26 2019, 01:38:38)
[Clang 9.0.1 (<email address hidden>:llvm/llvm-project.git c1a0a213378a458fbea1a5c77b31
[...]
ssh: [chan 1] Max packet in: 32768 bytes
ssh: [chan 1] Max packet out: 32768 bytes
ssh: Secsh channel 1 opened.
ssh: [chan 1] Sesch channel 1 request ok
ssh: [chan 1] EOF received (1)
ssh: [chan 1] EOF sent (1)
[...]
ssh: [chan 3] Max packet in: 32768 bytes
ssh: [chan 3] Max packet out: 32768 bytes
ssh: Secsh channel 3 opened.
ssh: [chan 3] Sesch channel 3 request ok
ssh: Sending global request "<email address hidden>"
ssh: Sending global request "<email address hidden>"
Backtrace of previous error: Traceback (innermost last):
  File "/usr/local/lib/python3.7/site-packages/duplicity/backend.py", line 374, in inner_retry
    return fn(self, *args)
  File "/usr/local/lib/python3.7/site-packages/duplicity/backend.py", line 534, in put
    self.__do_put(source_path, remote_filename)
  File "/usr/local/lib/python3.7/site-packages/duplicity/backend.py", line 520, in __do_put
    self.backend._put(source_path, remote_filename)
  File "/usr/local/lib/python3.7/site-packages/duplicity/backends/ssh_paramiko_backend.py", line 312, in _put
    raise BackendException(u"scp remote error: %s" % chan.recv(-1))
  File "/usr/local/lib/python3.7/site-packages/paramiko/channel.py", line 701, in recv
    raise socket.timeout()
 socket.timeout

With pexpect+scp:// works fine.

I tried paramiko-2.6.0 and paramiko-2.7.1 and I saw this issue after updating Python from 3.6 to 3.7 on my box.

Thanks for your time.

Changed in duplicity:
status: New → Incomplete
status: Incomplete → Fix Committed
importance: Undecided → Medium
milestone: none → 0.8.10
Changed in duplicity:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.