I am trying to configure a slave for my jenkins Master but getting following exception:

      ERROR: Unexpected error in launching a slave. This is probably a bug in Jenkins.
      java.lang.IllegalStateException: Connection is not established!
      at com.trilead.ssh2.Connection.getRemainingAuthMethods(Connection.java:1030)
      at com.cloudbees.jenkins.plugins.sshcredentials.impl.TrileadSSHPasswordAuthenticator.canAuthenticate(TrileadSSHPasswordAuthenticator.java:82)
      at com.cloudbees.jenkins.plugins.sshcredentials.SSHAuthenticator.newInstance(SSHAuthenticator.java:207)
      at com.cloudbees.jenkins.plugins.sshcredentials.SSHAuthenticator.newInstance(SSHAuthenticator.java:169)
      at hudson.plugins.sshslaves.SSHLauncher.openConnection(SSHLauncher.java:1173)
      at hudson.plugins.sshslaves.SSHLauncher$2.call(SSHLauncher.java:701)
      at hudson.plugins.sshslaves.SSHLauncher$2.call(SSHLauncher.java:696)
      at java.util.concurrent.FutureTask$Sync.innerRun(Unknown Source)
      at java.util.concurrent.FutureTask.run(Unknown Source)
      at java.util.concurrent.ThreadPoolExecutor.runWorker(Unknown Source)
      at java.util.concurrent.ThreadPoolExecutor$Worker.run(Unknown Source)
      at java.lang.Thread.run(Unknown Source)
      [01/07/15 16:51:10] Launch failed - cleaning up connection
      [01/07/15 16:51:10] [SSH] Connection closed.
      Any idea of what's the issue here?

          [JENKINS-26379] Jenkins - ssh connection exception

          John Zhang added a comment -

          I have the same error and I use IP instead of hostname, and then the problem disappeared.
          This should be fixed.

          John Zhang added a comment - I have the same error and I use IP instead of hostname, and then the problem disappeared. This should be fixed.

          macetw added a comment - - edited

          Putting in an IP address (instead of a hostname for DNS lookup) does not help my case. I'm still getting an exception:
          com.cloudbees.jenkins.plugins.sshcredentials.impl.TrileadSSHPasswordAuthenticator.canAuthenticate

          I am using Jenkins 2.19.3.

          macetw added a comment - - edited Putting in an IP address (instead of a hostname for DNS lookup) does not help my case. I'm still getting an exception: com.cloudbees.jenkins.plugins.sshcredentials.impl.TrileadSSHPasswordAuthenticator.canAuthenticate I am using Jenkins 2.19.3.

          Akash Soori added a comment -

          After adding valid Java path in Advanced... section of node configuration, above issue got resolved.

          Akash Soori added a comment - After adding valid Java path in Advanced... section of node configuration, above issue got resolved.

          Code changed in jenkins
          User: Oliver Gondža
          Path:
          src/main/java/hudson/plugins/sshslaves/SSHLauncher.java
          http://jenkins-ci.org/commit/ssh-slaves-plugin/44d7e2f9b1c768c52002e06b3ebecf5399f81cdb
          Log:
          [FIXED JENKINS-26379][FIXED JENKINS-41163]JENKINS-34100 Do not swallow IOException in case it is not recoverable.

          SCM/JIRA link daemon added a comment - Code changed in jenkins User: Oliver Gondža Path: src/main/java/hudson/plugins/sshslaves/SSHLauncher.java http://jenkins-ci.org/commit/ssh-slaves-plugin/44d7e2f9b1c768c52002e06b3ebecf5399f81cdb Log: [FIXED JENKINS-26379] [FIXED JENKINS-41163] JENKINS-34100 Do not swallow IOException in case it is not recoverable.

          I've currently got Pull Requests raised for adding newer MAC, KEX and Key Algorithms into Trilead. These will add support for:

          Key Exchange (KEX):

          MAC:

          Key Algorithms:

          I've not done anything on implementation specific variants (e.g. anything ending in @openssh.com or similar) that have been mentioned in any of the above comments

           

          Michael Clarke added a comment - I've currently got Pull Requests raised for adding newer MAC, KEX and Key Algorithms into Trilead. These will add support for: Key Exchange (KEX): diffie-hellman-group-exchange-sha256 MAC: hmac-sha2-512 hmac-sha2-256 Key Algorithms: ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 Ec25519 I've not done anything on implementation specific variants (e.g. anything ending in @openssh.com or similar) that have been mentioned in any of the above comments  

          I've currently got Pull Requests raised for adding newer MAC, KEX and Key Algorithms into Trilead. These will add support for:

          Key Exchange (KEX):

          MAC:

          Key Algorithms:

          I've not done anything on implementation specific variants (e.g. anything ending in @openssh.com or similar) that have been mentioned in any of the above comments

           

          Michael Clarke added a comment - I've currently got Pull Requests raised for adding newer MAC, KEX and Key Algorithms into Trilead. These will add support for: Key Exchange (KEX): diffie-hellman-group-exchange-sha256 MAC: hmac-sha2-512 hmac-sha2-256 Key Algorithms: ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 Ec25519 I've not done anything on implementation specific variants (e.g. anything ending in @openssh.com or similar) that have been mentioned in any of the above comments  

          paladox added a comment -

          Those pulls were merged a new release of trilead-ssh2 has been done. Jenkins will be updated shortly to use the new release.

          paladox added a comment - Those pulls were merged a new release of trilead-ssh2 has been done. Jenkins will be updated shortly to use the new release.

          Code changed in jenkins
          User: Michael Clarke
          Path:
          core/pom.xml
          http://jenkins-ci.org/commit/jenkins/b17d0763709be35d39f16d6af7afaf765ac6cf92
          Log:
          Bump Trilead version to receive a number of security enhancements
          JENKINS-41606JENKINS-33021JENKINS-26379JENKINS-31549

          SCM/JIRA link daemon added a comment - Code changed in jenkins User: Michael Clarke Path: core/pom.xml http://jenkins-ci.org/commit/jenkins/b17d0763709be35d39f16d6af7afaf765ac6cf92 Log: Bump Trilead version to receive a number of security enhancements JENKINS-41606 JENKINS-33021 JENKINS-26379 JENKINS-31549

          Oleg Nenashev added a comment -

          The fix has been integrated towards 2.58. It is not a backporting candidate

          Oleg Nenashev added a comment - The fix has been integrated towards 2.58. It is not a backporting candidate

          thanks a lot mc1arke !!!

          Arnaud Héritier added a comment - thanks a lot mc1arke !!!

            mc1arke Michael Clarke
            magneto09 Mohit Sharma
            Votes:
            10 Vote for this issue
            Watchers:
            28 Start watching this issue

              Created:
              Updated:
              Resolved: