Last active
August 29, 2015 14:17
-
-
Save syang/3cba2bd7e1b74503f151 to your computer and use it in GitHub Desktop.
error when running ansible with vagrant boxes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
huoy$ ansible -m ping masters -i test_inventory.yml -vvvv | |
<192.168.33.12> | |
<192.168.33.11> | |
<192.168.33.12> | |
<192.168.33.13> | |
<192.168.33.11> | |
<192.168.33.13> | |
<192.168.33.12> IdentityFile=/Users/shuoy/.vagrant.d/insecure_private_key ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no User=vagrant ControlPath=/Users/shuoy/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey StrictHostKeyChecking=no ControlMaster=auto ControlPersist=60s | |
<192.168.33.11> IdentityFile=/Users/shuoy/.vagrant.d/insecure_private_key ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no User=vagrant ControlPath=/Users/shuoy/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey StrictHostKeyChecking=no ControlMaster=auto ControlPersist=60s | |
<192.168.33.13> IdentityFile=/Users/shuoy/.vagrant.d/insecure_private_key ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no User=vagrant ControlPath=/Users/shuoy/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey StrictHostKeyChecking=no ControlMaster=auto ControlPersist=60s | |
host1 | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: /etc/ssh_config line 20: Applying options for * | |
debug1: /etc/ssh_config line 102: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/Users/shuoy/.ansible/cp/ansible-ssh-192.168.33.11-22-vagrant" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to 192.168.33.11 [192.168.33.11] port 22. | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 10000 ms remain after connect | |
debug3: Incorrect RSA1 identifier | |
debug3: Could not load "/Users/shuoy/.vagrant.d/insecure_private_key" as a RSA1 public key | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key type -1 | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_6.2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6p1 Ubuntu-2ubuntu1 | |
debug1: match: OpenSSH_6.6p1 Ubuntu-2ubuntu1 pat OpenSSH* | |
debug2: fd 3 setting O_NONBLOCK | |
debug3: load_hostkeys: loading entries for host "192.168.33.11" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: loaded 0 keys | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 124/256 | |
debug2: bits set: 502/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Server host key: RSA 30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9 | |
debug3: load_hostkeys: loading entries for host "192.168.33.11" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: loaded 0 keys | |
Warning: Permanently added '192.168.33.11' (RSA) to the list of known hosts. | |
debug2: bits set: 515/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7f9789600660), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7f97896007f0), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7f9789600ac0), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7f9789600d60), | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7f9789601000), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7f97896012d0), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7f9789601560), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7f9789601810), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7f9789601ae0), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7f9789601d70), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7f9789602020), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7f97896022f0), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7f9789602580), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7f9789602830), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7f9789602b00), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7f9789602d90), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7f9789603040), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7f9789603310), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7f97896035a0), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7f9789603850), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7f9789603b20), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7f9789603db0), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7f9789604060), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7f9789604330), | |
debug2: key: /Users/shuoy/.vagrant.d/insecure_private_key (0x0), explicit | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node3/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node4/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
Received disconnect from 192.168.33.11: 2: Too many authentication failures for vagrant | |
host3 | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: /etc/ssh_config line 20: Applying options for * | |
debug1: /etc/ssh_config line 102: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/Users/shuoy/.ansible/cp/ansible-ssh-192.168.33.13-22-vagrant" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to 192.168.33.13 [192.168.33.13] port 22. | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 10000 ms remain after connect | |
debug3: Incorrect RSA1 identifier | |
debug3: Could not load "/Users/shuoy/.vagrant.d/insecure_private_key" as a RSA1 public key | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key type -1 | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_6.2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6p1 Ubuntu-2ubuntu1 | |
debug1: match: OpenSSH_6.6p1 Ubuntu-2ubuntu1 pat OpenSSH* | |
debug2: fd 3 setting O_NONBLOCK | |
debug3: load_hostkeys: loading entries for host "192.168.33.13" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: loaded 0 keys | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 116/256 | |
debug2: bits set: 505/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Server host key: RSA 30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9 | |
debug3: load_hostkeys: loading entries for host "192.168.33.13" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: loaded 0 keys | |
Warning: Permanently added '192.168.33.13' (RSA) to the list of known hosts. | |
debug2: bits set: 512/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fa56bd13220), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fa56bd14440), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fa56bd137c0), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fa56bd13570), | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fa56bd13c00), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fa56bd13e90), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fa56bd14380), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fa56bd14d00), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fa56bd14f90), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fa56bd15260), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fa56bd154f0), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fa56bd157a0), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fa56bd15a70), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fa56bd15d00), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fa56bd15fb0), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fa56bd16280), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fa56bd16510), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fa56bd167c0), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fa56bd16a90), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fa56bd16d20), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fa56bd16fd0), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fa56bd172a0), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fa56bd17530), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fa56bd177e0), | |
debug2: key: /Users/shuoy/.vagrant.d/insecure_private_key (0x0), explicit | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node3/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node4/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
Received disconnect from 192.168.33.13: 2: Too many authentication failures for vagrant | |
host2 | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: /etc/ssh_config line 20: Applying options for * | |
debug1: /etc/ssh_config line 102: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/Users/shuoy/.ansible/cp/ansible-ssh-192.168.33.12-22-vagrant" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to 192.168.33.12 [192.168.33.12] port 22. | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 10000 ms remain after connect | |
debug3: Incorrect RSA1 identifier | |
debug3: Could not load "/Users/shuoy/.vagrant.d/insecure_private_key" as a RSA1 public key | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key type -1 | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_6.2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6p1 Ubuntu-2ubuntu1 | |
debug1: match: OpenSSH_6.6p1 Ubuntu-2ubuntu1 pat OpenSSH* | |
debug2: fd 3 setting O_NONBLOCK | |
debug3: load_hostkeys: loading entries for host "192.168.33.12" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: loaded 0 keys | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-rsa,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 112/256 | |
debug2: bits set: 513/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Server host key: RSA 30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9 | |
debug3: load_hostkeys: loading entries for host "192.168.33.12" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: loaded 0 keys | |
Warning: Permanently added '192.168.33.12' (RSA) to the list of known hosts. | |
debug2: bits set: 519/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fa29b414140), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fa29b414770), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fa29b4142f0), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fa29b413610), | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fa29b414ac0), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fa29b414d90), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fa29b415020), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fa29b4152d0), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fa29b4155a0), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fa29b415830), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fa29b415ae0), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fa29b415db0), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fa29b416260), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fa29b4162f0), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fa29b4165b0), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fa29b416850), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fa29b416b20), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fa29b416db0), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fa29b417060), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fa29b417330), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fa29b4175c0), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fa29b417870), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fa29b417b40), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fa29b417dd0), | |
debug2: key: /Users/shuoy/.vagrant.d/insecure_private_key (0x0), explicit | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node3/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node4/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
Received disconnect from 192.168.33.12: 2: Too many authentication failures for vagrant |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment