Created
March 19, 2015 22:50
-
-
Save syang/c7b84e97988aaa63b1f9 to your computer and use it in GitHub Desktop.
Ansible can't ssh to vagrant boxes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
shuoy$ ansible -m ping -i test_inventory.yml all -i test_inventory.yml -vvvv | |
<192.168.33.11> | |
<192.168.33.12> | |
<192.168.33.13> | |
<192.168.33.11> | |
<---> | |
<192.168.33.14> | |
<192.168.33.13> | |
<---> | |
<192.168.33.14> | |
<192.168.33.12> | |
<192.168.33.13> IdentityFile=/Users/shuoy/.vagrant.d/insecure_private_key ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no User=vagrant ControlPath=/Users/shuoy/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey StrictHostKeyChecking=no ControlMaster=auto ControlPersist=60s | |
<192.168.33.11> IdentityFile=/Users/shuoy/.vagrant.d/insecure_private_key ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no User=vagrant ControlPath=/Users/shuoy/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey StrictHostKeyChecking=no ControlMaster=auto ControlPersist=60s | |
<192.168.33.14> IdentityFile=/Users/shuoy/.vagrant.d/insecure_private_key ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no User=vagrant ControlPath=/Users/shuoy/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey StrictHostKeyChecking=no ControlMaster=auto ControlPersist=60s | |
<---> IdentityFile=/Users/shuoy/.vagrant.d/insecure_private_key ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no User=vagrant ControlPath=/Users/shuoy/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey StrictHostKeyChecking=no ControlMaster=auto ControlPersist=60s | |
<192.168.33.12> IdentityFile=/Users/shuoy/.vagrant.d/insecure_private_key ConnectTimeout=10 PasswordAuthentication=no KbdInteractiveAuthentication=no User=vagrant ControlPath=/Users/shuoy/.ansible/cp/ansible-ssh-%h-%p-%r PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey StrictHostKeyChecking=no ControlMaster=auto ControlPersist=60s | |
--- | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 | |
ssh: illegal option -- - | |
usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] | |
[-D [bind_address:]port] [-e escape_char] [-F configfile] | |
[-I pkcs11] [-i identity_file] | |
[-L [bind_address:]port:host:hostport] | |
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] | |
[-R [bind_address:]port:host:hostport] [-S ctl_path] | |
[-W host:port] [-w local_tun[:remote_tun]] | |
[user@]hostname [command] | |
host3 | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: /etc/ssh_config line 20: Applying options for * | |
debug1: /etc/ssh_config line 102: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/Users/shuoy/.ansible/cp/ansible-ssh-192.168.33.13-22-vagrant" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to 192.168.33.13 [192.168.33.13] port 22. | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 10000 ms remain after connect | |
debug3: Incorrect RSA1 identifier | |
debug3: Could not load "/Users/shuoy/.vagrant.d/insecure_private_key" as a RSA1 public key | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key type -1 | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_6.2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6p1 Ubuntu-2ubuntu1 | |
debug1: match: OpenSSH_6.6p1 Ubuntu-2ubuntu1 pat OpenSSH* | |
debug2: fd 3 setting O_NONBLOCK | |
debug3: load_hostkeys: loading entries for host "192.168.33.13" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: found key type RSA in file /Users/shuoy/.ssh/known_hosts:3 | |
debug3: load_hostkeys: loaded 1 keys | |
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 123/256 | |
debug2: bits set: 519/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Server host key: RSA 30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9 | |
debug3: load_hostkeys: loading entries for host "192.168.33.13" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: found key type RSA in file /Users/shuoy/.ssh/known_hosts:3 | |
debug3: load_hostkeys: loaded 1 keys | |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | |
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ | |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | |
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! | |
Someone could be eavesdropping on you right now (man-in-the-middle attack)! | |
It is also possible that a host key has just been changed. | |
The fingerprint for the RSA key sent by the remote host is | |
30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9. | |
Please contact your system administrator. | |
Add correct host key in /Users/shuoy/.ssh/known_hosts to get rid of this message. | |
Offending RSA key in /Users/shuoy/.ssh/known_hosts:3 | |
Challenge/response authentication is disabled to avoid man-in-the-middle attacks. | |
debug2: bits set: 501/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fd170413bf0), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fd170414200), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fd1704145d0), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fd170414870), | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fd170414c20), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fd170414dd0), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fd170415090), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fd170415330), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fd170415600), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fd170415890), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fd170415b40), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fd170415e10), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fd1704160a0), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fd170416350), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fd170416620), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fd1704168b0), | |
debug2: key: /Users/shuoy/.vagrant.d/insecure_private_key (0x0), explicit | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node3/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node4/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
Received disconnect from 192.168.33.13: 2: Too many authentication failures for vagrant | |
host1 | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: /etc/ssh_config line 20: Applying options for * | |
debug1: /etc/ssh_config line 102: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/Users/shuoy/.ansible/cp/ansible-ssh-192.168.33.11-22-vagrant" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to 192.168.33.11 [192.168.33.11] port 22. | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 10000 ms remain after connect | |
debug3: Incorrect RSA1 identifier | |
debug3: Could not load "/Users/shuoy/.vagrant.d/insecure_private_key" as a RSA1 public key | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key type -1 | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_6.2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6p1 Ubuntu-2ubuntu1 | |
debug1: match: OpenSSH_6.6p1 Ubuntu-2ubuntu1 pat OpenSSH* | |
debug2: fd 3 setting O_NONBLOCK | |
debug3: load_hostkeys: loading entries for host "192.168.33.11" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: found key type RSA in file /Users/shuoy/.ssh/known_hosts:2 | |
debug3: load_hostkeys: loaded 1 keys | |
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 125/256 | |
debug2: bits set: 524/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Server host key: RSA 30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9 | |
debug3: load_hostkeys: loading entries for host "192.168.33.11" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: found key type RSA in file /Users/shuoy/.ssh/known_hosts:2 | |
debug3: load_hostkeys: loaded 1 keys | |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | |
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ | |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | |
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! | |
Someone could be eavesdropping on you right now (man-in-the-middle attack)! | |
It is also possible that a host key has just been changed. | |
The fingerprint for the RSA key sent by the remote host is | |
30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9. | |
Please contact your system administrator. | |
Add correct host key in /Users/shuoy/.ssh/known_hosts to get rid of this message. | |
Offending RSA key in /Users/shuoy/.ssh/known_hosts:2 | |
Challenge/response authentication is disabled to avoid man-in-the-middle attacks. | |
debug2: bits set: 477/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fbaa0701360), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fbaa0701280), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fbaa0700110), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fbaa07003c0), | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fbaa0700690), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fbaa0700920), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fbaa0700bd0), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fbaa0701790), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fbaa0701a20), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fbaa0701cd0), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fbaa0701fa0), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fbaa0702230), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fbaa07024e0), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fbaa07027b0), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fbaa0702a40), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fbaa0702cf0), | |
debug2: key: /Users/shuoy/.vagrant.d/insecure_private_key (0x0), explicit | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node3/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node4/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
Received disconnect from 192.168.33.11: 2: Too many authentication failures for vagrant | |
host4 | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: /etc/ssh_config line 20: Applying options for * | |
debug1: /etc/ssh_config line 102: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/Users/shuoy/.ansible/cp/ansible-ssh-192.168.33.14-22-vagrant" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to 192.168.33.14 [192.168.33.14] port 22. | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 9995 ms remain after connect | |
debug3: Incorrect RSA1 identifier | |
debug3: Could not load "/Users/shuoy/.vagrant.d/insecure_private_key" as a RSA1 public key | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key type -1 | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_6.2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6p1 Ubuntu-2ubuntu1 | |
debug1: match: OpenSSH_6.6p1 Ubuntu-2ubuntu1 pat OpenSSH* | |
debug2: fd 3 setting O_NONBLOCK | |
debug3: load_hostkeys: loading entries for host "192.168.33.14" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: found key type RSA in file /Users/shuoy/.ssh/known_hosts:5 | |
debug3: load_hostkeys: loaded 1 keys | |
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 139/256 | |
debug2: bits set: 505/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Server host key: RSA 30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9 | |
debug3: load_hostkeys: loading entries for host "192.168.33.14" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: found key type RSA in file /Users/shuoy/.ssh/known_hosts:5 | |
debug3: load_hostkeys: loaded 1 keys | |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | |
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ | |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | |
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! | |
Someone could be eavesdropping on you right now (man-in-the-middle attack)! | |
It is also possible that a host key has just been changed. | |
The fingerprint for the RSA key sent by the remote host is | |
30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9. | |
Please contact your system administrator. | |
Add correct host key in /Users/shuoy/.ssh/known_hosts to get rid of this message. | |
Offending RSA key in /Users/shuoy/.ssh/known_hosts:5 | |
Challenge/response authentication is disabled to avoid man-in-the-middle attacks. | |
debug2: bits set: 525/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fd6a85001a0), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fd6a85006b0), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fd6a8501640), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fd6a8500f80), | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fd6a8501210), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fd6a8501b30), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fd6a8500c20), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fd6a8501ee0), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fd6a8502160), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fd6a8502430), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fd6a85026c0), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fd6a8502970), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fd6a8502c40), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fd6a8502ed0), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fd6a8503180), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fd6a8503450), | |
debug2: key: /Users/shuoy/.vagrant.d/insecure_private_key (0x0), explicit | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node3/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node4/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
Received disconnect from 192.168.33.14: 2: Too many authentication failures for vagrant | |
host2 | FAILED => SSH encountered an unknown error. The output was: | |
OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 | |
debug1: Reading configuration data /etc/ssh_config | |
debug1: /etc/ssh_config line 20: Applying options for * | |
debug1: /etc/ssh_config line 102: Applying options for * | |
debug1: auto-mux: Trying existing master | |
debug1: Control socket "/Users/shuoy/.ansible/cp/ansible-ssh-192.168.33.12-22-vagrant" does not exist | |
debug2: ssh_connect: needpriv 0 | |
debug1: Connecting to 192.168.33.12 [192.168.33.12] port 22. | |
debug2: fd 3 setting O_NONBLOCK | |
debug1: fd 3 clearing O_NONBLOCK | |
debug1: Connection established. | |
debug3: timeout: 9999 ms remain after connect | |
debug3: Incorrect RSA1 identifier | |
debug3: Could not load "/Users/shuoy/.vagrant.d/insecure_private_key" as a RSA1 public key | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key type -1 | |
debug1: identity file /Users/shuoy/.vagrant.d/insecure_private_key-cert type -1 | |
debug1: Enabling compatibility mode for protocol 2.0 | |
debug1: Local version string SSH-2.0-OpenSSH_6.2 | |
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6p1 Ubuntu-2ubuntu1 | |
debug1: match: OpenSSH_6.6p1 Ubuntu-2ubuntu1 pat OpenSSH* | |
debug2: fd 3 setting O_NONBLOCK | |
debug3: load_hostkeys: loading entries for host "192.168.33.12" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: found key type RSA in file /Users/shuoy/.ssh/known_hosts:4 | |
debug3: load_hostkeys: loaded 1 keys | |
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa | |
debug1: SSH2_MSG_KEXINIT sent | |
debug1: SSH2_MSG_KEXINIT received | |
debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ssh-dss | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: zlib@openssh.com,zlib,none | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 | |
debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519 | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: hmac-md5-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-sha1,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: none,zlib@openssh.com | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: | |
debug2: kex_parse_kexinit: first_kex_follows 0 | |
debug2: kex_parse_kexinit: reserved 0 | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug2: mac_setup: found hmac-md5-etm@openssh.com | |
debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com zlib@openssh.com | |
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP | |
debug2: dh_gen_key: priv key bits set: 114/256 | |
debug2: bits set: 491/1024 | |
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent | |
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY | |
debug1: Server host key: RSA 30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9 | |
debug3: load_hostkeys: loading entries for host "192.168.33.12" from file "/Users/shuoy/.ssh/known_hosts" | |
debug3: load_hostkeys: found key type RSA in file /Users/shuoy/.ssh/known_hosts:4 | |
debug3: load_hostkeys: loaded 1 keys | |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | |
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ | |
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | |
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! | |
Someone could be eavesdropping on you right now (man-in-the-middle attack)! | |
It is also possible that a host key has just been changed. | |
The fingerprint for the RSA key sent by the remote host is | |
30:cc:ac:8b:a5:65:55:02:37:33:97:f5:b6:27:7d:a9. | |
Please contact your system administrator. | |
Add correct host key in /Users/shuoy/.ssh/known_hosts to get rid of this message. | |
Offending RSA key in /Users/shuoy/.ssh/known_hosts:4 | |
Challenge/response authentication is disabled to avoid man-in-the-middle attacks. | |
debug2: bits set: 524/1024 | |
debug1: ssh_rsa_verify: signature correct | |
debug2: kex_derive_keys | |
debug2: set_newkeys: mode 1 | |
debug1: SSH2_MSG_NEWKEYS sent | |
debug1: expecting SSH2_MSG_NEWKEYS | |
debug2: set_newkeys: mode 0 | |
debug1: SSH2_MSG_NEWKEYS received | |
debug1: Roaming not allowed by server | |
debug1: SSH2_MSG_SERVICE_REQUEST sent | |
debug2: service_accept: ssh-userauth | |
debug1: SSH2_MSG_SERVICE_ACCEPT received | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fcceb413c00), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fcceb413d10), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fcceb414090), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fcceb414270), | |
debug2: key: .vagrant/machines/node1/virtualbox/private_key (0x7fcceb414510), | |
debug2: key: .vagrant/machines/node2/virtualbox/private_key (0x7fcceb4147d0), | |
debug2: key: .vagrant/machines/node3/virtualbox/private_key (0x7fcceb414a70), | |
debug2: key: .vagrant/machines/node4/virtualbox/private_key (0x7fcceb414d40), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fcceb414fd0), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fcceb415280), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fcceb415550), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fcceb4157e0), | |
debug2: key: .vagrant/machines/host1/virtualbox/private_key (0x7fcceb415a90), | |
debug2: key: .vagrant/machines/host2/virtualbox/private_key (0x7fcceb415d60), | |
debug2: key: .vagrant/machines/host3/virtualbox/private_key (0x7fcceb415ff0), | |
debug2: key: .vagrant/machines/host4/virtualbox/private_key (0x7fcceb4162a0), | |
debug2: key: /Users/shuoy/.vagrant.d/insecure_private_key (0x0), explicit | |
debug1: Authentications that can continue: publickey,password | |
debug3: start over, passed a different list publickey,password | |
debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_lookup publickey | |
debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey | |
debug3: authmethod_is_enabled publickey | |
debug1: Next authentication method: publickey | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node3/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node4/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node1/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
debug1: Authentications that can continue: publickey,password | |
debug1: Offering RSA public key: .vagrant/machines/node2/virtualbox/private_key | |
debug3: send_pubkey_test | |
debug2: we sent a publickey packet, wait for reply | |
Received disconnect from 192.168.33.12: 2: Too many authentication failures for vagrant |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
did you fix it...?