Thank you for the response.
Sorry ,I quoted wrong version in the subject line in my previous post. We are using version4.2.0 recently upgraded.
Here is DEBUG log
DEBUG [SCPClient] 29 Aug 2012 06:46:00.635 : Connecting to myserver.com:22
DEBUG [StreamSocketFactory] 29 Aug 2012 06:46:00.643 : Connecting to myserver.com:22 via SOCKS4 proxy
INFO [TransportProtocolCommon] 29 Aug 2012 06:46:00.880 : Timeout=60000
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.881 : Starting transport protocol
INFO [TransportProtocolCommon] 29 Aug 2012 06:46:00.884 : Wait for state update timeout=60000
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.884 : Registering transport protocol messages with inputstream
INFO [cryptix] 29 Aug 2012 06:46:00.924 : GLOBAL_TRACE=false
INFO [cryptix] 29 Aug 2012 06:46:00.924 : GLOBAL_DEBUG=false
INFO [cryptix] 29 Aug 2012 06:46:00.924 : GLOBAL_DEBUG_SLOW=false
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.925 : Negotiating protocol version
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.925 : Local identification: SSH-2.0-edtFTPjPRO-3.1.1
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.936 : Read: 'SSH-2.0-mod_sftp/0.9.8^M'
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.936 : EOL is guessed at CR+LF
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.937 : Remote identification: 'SSH-2.0-mod_sftp/0.9.8'
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.937 : Protocol negotiation complete
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.937 : Sending SSH_MSG_KEX_INIT
INFO [TransportProtocolCommon] 29 Aug 2012 06:46:00.938 : Wait for state update timeout=60000
DEBUG [SshMsgKexInit] 29 Aug 2012 06:46:00.941 : Packetlength=484, Paddinglength=5
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.941 : Received registered message: SSH_MSG_KEX_INIT
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.941 : Received remote key exchange init message
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.941 : Starting key exchange
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.942 : Determine Algorithm
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.942 : Client Algorithms: [diffie-hellman-group1-sha1]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.942 : Server Algorithms: [diffie-hellman-group-exchange-sha256, diffie-hellman-group-exchange-sha1, diff
ie-hellman-group14-sha1, diffie-hellman-group1-sha1, rsa1024-sha1]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.942 : Returning diffie-hellman-group1-sha1
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.942 : Key exchange algorithm: diffie-hellman-group1-sha1
INFO [DhGroup1Sha1] 29 Aug 2012 06:46:00.943 : Starting client side key exchange.
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:00.979 : Sending SSH_MSG_KEXDH_INIT
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.061 : Received unregistered message: SSH_MSG_KEXDH_REPLY
DEBUG [DhGroup1Sha1] 29 Aug 2012 06:46:01.086 : calculateExchangeHash()
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.097 : Verifying host myserver.com,144.203.129.20
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.098 : Preferred algorithm null
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.098 : Determine Algorithm
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.098 : Client Algorithms: [ssh-dss, ssh-rsa]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.098 : Server Algorithms: [ssh-rsa, ssh-dss]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.098 : Returning ssh-dss
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.098 : Selected algorithm ssh-dss
DEBUG [com.enterprisedt.net.j2ssh.transport.publickey.dsa.SshDssPublicKey] 29 Aug 2012 06:46:01.108 : Signature length=55
DEBUG [com.enterprisedt.net.j2ssh.transport.publickey.dsa.SshDssPublicKey] 29 Aug 2012 06:46:01.108 : Header is ssh-dss
DEBUG [com.enterprisedt.net.j2ssh.transport.publickey.dsa.SshDssPublicKey] 29 Aug 2012 06:46:01.109 : Verifying host key signature
DEBUG [com.enterprisedt.net.j2ssh.transport.publickey.dsa.SshDssPublicKey] 29 Aug 2012 06:46:01.109 : Signature length is 40
DEBUG [com.enterprisedt.net.j2ssh.transport.publickey.dsa.SshDssPublicKey] 29 Aug 2012 06:46:01.112 : Signature: 97945Blah6FEE5B3C8A6CDF66487E023900B487FC24E9B
9BlahAC9B4766C070190576A207274D695C136
DEBUG [com.enterprisedt.net.j2ssh.transport.publickey.dsa.SshDssPublicKey] 29 Aug 2012 06:46:01.113 : Encoded: 302D02150097945Blah6FEE5B3C8A6CDF66487E023900B48
7FC202144E9B9BlahAC9B4766C070190576A207274D695C136
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.131 : Sending SSH_MSG_NEWKEYS
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.131 : Received registered message: SSH_MSG_NEWKEYS
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.132 : Completing key exchange
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.132 : Making keys from key exchange output
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.135 : Creating algorithm objects
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.135 : Determine Algorithm
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.135 : Client Algorithms: [3des-cbc, aes128-cbc, aes256-cbc, blowfish-cbc, aes192-cbc]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.135 : Server Algorithms: [aes256-ctr, blowfish-ctr, aes256-cbc, blowfish-cbc]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.135 : Returning aes256-cbc
DEBUG [com.enterprisedt.net.j2ssh.transport.cipher.SshCipherFactory] 29 Aug 2012 06:46:01.136 : Creating new aes256-cbc cipher instance
DEBUG [IJCE_Properties] 29 Aug 2012 06:46:01.152 : Successfully loaded the IJCE properties file
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.183 : Determine Algorithm
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.183 : Client Algorithms: [3des-cbc, aes128-cbc, aes256-cbc, blowfish-cbc, aes192-cbc]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.183 : Server Algorithms: [aes256-ctr, blowfish-ctr, aes256-cbc, blowfish-cbc]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.183 : Returning aes256-cbc
DEBUG [com.enterprisedt.net.j2ssh.transport.cipher.SshCipherFactory] 29 Aug 2012 06:46:01.183 : Creating new aes256-cbc cipher instance
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.187 : Determine Algorithm
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.187 : Client Algorithms: [hmac-sha1, hmac-md5-96, hmac-md5, hmac-sha1-96]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.187 : Server Algorithms: [hmac-sha1, hmac-sha1-96, hmac-md5, hmac-md5-96, hmac-ripemd160]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.187 : Returning hmac-sha1
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.190 : Determine Algorithm
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.190 : Client Algorithms: [hmac-sha1, hmac-md5-96, hmac-md5, hmac-sha1-96]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.190 : Server Algorithms: [hmac-sha1, hmac-sha1-96, hmac-md5, hmac-md5-96, hmac-ripemd160]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.190 : Returning hmac-sha1
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.191 : Determine Algorithm
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.191 : Client Algorithms: [none, zlib]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.191 : Server Algorithms: [zlib@openssh.com, zlib, none]
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.191 : Returning none
DEBUG [TransportProtocolCommon] 29 Aug 2012 06:46:01.191 : Determine Algorithm
DEBUG [TransportProtocolCommon] 29 Aug