Created
December 1, 2014 21:47
-
-
Save ptrlv/f43020e4b0d1e2e7f4b4 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[plove@aiadm054 ops]$ ansible -vvvv test -o --sudo -m ping | |
<aipanda017.cern.ch> ESTABLISH CONNECTION FOR USER: plove | |
<aipanda017.cern.ch> REMOTE_MODULE ping | |
<aipanda017.cern.ch> EXEC ['ssh', '-C', '-tt', '-vvv', '-o', 'ControlMaster=auto', '-o', 'ControlPersist=60s', '-o', 'ControlPath=/afs/cern.ch/user/p/plove/.ansible/cp/ansible-ssh-%h-%p-%r', '-o', 'KbdInteractiveAuthentication=no', '-o', 'PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey', '-o', 'PasswordAuthentication=no', '-o', 'ConnectTimeout=5', 'aipanda017.cern.ch', "/bin/sh -c 'mkdir -p /tmp/ansible/$USER/ansible-tmp-1417470380.34-257132056167384 && chmod a+rx /tmp/ansible/$USER/ansible-tmp-1417470380.34-257132056167384 && echo /tmp/ansible/$USER/ansible-tmp-1417470380.34-257132056167384'"] | |
aipanda017.cern.ch | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_5.3p1, OpenSSL 1.0.1e-fips 11 Feb 2013 | |
debug1: Reading configuration data /etc/ssh/ssh_config | |
debug1: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/afs/cern.ch/user/p/plove/.ansible/cp/ansible-ssh-aipanda017.cern.ch-22-plove" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to aipanda017.cern.ch [128.142.153.132] port 22. | |
debug2: fd 4 setting O_NONBLOCK | |
debug1: fd 4 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 4999 ms remain after connect | |
debug1: identity file /afs/cern.ch/user/p/plove/.ssh/identity type -1 | |
debug1: identity file /afs/cern.ch/user/p/plove/.ssh/identity-cert type -1 | |
debug1: identity file /afs/cern.ch/user/p/plove/.ssh/id_rsa type -1 | |
debug1: identity file /afs/cern.ch/user/p/plove/.ssh/id_rsa-cert type -1 | |
debug1: identity file /afs/cern.ch/user/p/plove/.ssh/id_dsa type -1 | |
debug1: identity file /afs/cern.ch/user/p/plove/.ssh/id_dsa-cert type -1 | |
debug1: identity file /afs/cern.ch/user/p/plove/.ssh/id_ecdsa type -1 | |
debug1: identity file /afs/cern.ch/user/p/plove/.ssh/id_ecdsa-cert type -1 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.3 | |
debug1: match: OpenSSH_5.3 pat OpenSSH* | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_5.3 | |
debug2: fd 4 setting O_NONBLOCK | |
debug1: SSH2_MSG_KEXINIT sent | |
debug3: Wrote 960 bytes for a total of 981 | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: server->client aes128-ctr hmac-md5 zlib@openssh.com | |
debug2: mac_setup: found hmac-md5 | |
debug1: kex: client->server aes128-ctr hmac-md5 zlib@openssh.com | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug3: Wrote 24 bytes for a total of 1005 | |
debug2: dh_gen_key: priv key bits set: 140/256 | |
debug2: bits set: 513/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug3: Wrote 144 bytes for a total of 1149 | |
debug3: check_host_in_hostfile: host aipanda017.cern.ch filename /afs/cern.ch/user/p/plove/.ssh/known_hosts | |
debug3: check_host_in_hostfile: host aipanda017.cern.ch filename /afs/cern.ch/user/p/plove/.ssh/known_hosts | |
debug3: check_host_in_hostfile: match line 9 | |
debug3: check_host_in_hostfile: host 128.142.153.132 filename /afs/cern.ch/user/p/plove/.ssh/known_hosts | |
debug3: check_host_in_hostfile: host 128.142.153.132 filename /afs/cern.ch/user/p/plove/.ssh/known_hosts | |
debug3: check_host_in_hostfile: match line 29 | |
debug1: Host 'aipanda017.cern.ch' is known and matches the RSA host key. | |
debug1: Found key in /afs/cern.ch/user/p/plove/.ssh/known_hosts:9 | |
debug2: bits set: 510/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug3: Wrote 16 bytes for a total of 1165 | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug3: Wrote 48 bytes for a total of 1213 | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: /Users/peterlove/.ssh/id_rsa (0x7fa845f3ccd0) | |
debug2: key: /afs/cern.ch/user/p/plove/.ssh/identity ((nil)) | |
debug2: key: /afs/cern.ch/user/p/plove/.ssh/id_rsa ((nil)) | |
debug2: key: /afs/cern.ch/user/p/plove/.ssh/id_dsa ((nil)) | |
debug2: key: /afs/cern.ch/user/p/plove/.ssh/id_ecdsa ((nil)) | |
debug3: Wrote 64 bytes for a total of 1277 | |
debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive | |
debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup gssapi-with-mic | |
debug3: remaining preferred: gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled gssapi-with-mic | |
debug1: Next authentication method: gssapi-with-mic | |
debug3: Trying to reverse map address 128.142.153.132. | |
debug2: we sent a gssapi-with-mic packet, wait for reply | |
debug3: Wrote 96 bytes for a total of 1373 | |
debug1: Delegating credentials | |
debug3: Wrote 7008 bytes for a total of 8381 | |
debug1: Delegating credentials | |
debug3: Wrote 64 bytes for a total of 8445 | |
debug1: Enabling compression at level 6. | |
debug1: Authentication succeeded (gssapi-with-mic). | |
debug1: setting up multiplex master socket | |
debug3: muxserver_listen: temporary control path /afs/cern.ch/user/p/plove/.ansible/cp/ansible-ssh-aipanda017.cern.ch-22-plove.Y3gKotIg0gYodaiU | |
muxserver_listen bind(): Operation not permitted |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment