Guest User

Untitled

a guest
Dec 9th, 2014
865
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.51 KB | None | 0 0
  1. ANSIBLE_FORCE_COLOR=true ANSIBLE_HOST_KEY_CHECKING=false PYTHONUNBUFFERED=1 ansible-playbook --private-key=/home/mehul/.vagrant.d/insecure_private_key --user=vagrant --limit='default' --inventory-file=/home/mehul/Projects/testv
  2. m/.vagrant/provisioners/ansible/inventory --extra-vars={"build_server":true,"configure_server":true} -vvvv deployment/freeswitch.yml
  3.  
  4.  
  5.  
  6. fatal: [default] => SSH encountered an unknown error. The output was:
  7. OpenSSH_6.7p1, OpenSSL 1.0.1j 15 Oct 2014
  8. debug1: Reading configuration data /etc/ssh/ssh_config
  9. debug1: auto-mux: Trying existing master
  10. debug1: Control socket "/home/mehul/.ansible/cp/ansible-ssh-127.0.0.1-2200-root" does not exist
  11. debug2: ssh_connect: needpriv 0
  12. debug1: Connecting to 127.0.0.1 [127.0.0.1] port 2200.
  13. debug2: fd 3 setting O_NONBLOCK
  14. debug1: fd 3 clearing O_NONBLOCK
  15. debug1: Connection established.
  16. debug3: timeout: 10000 ms remain after connect
  17. debug1: key_load_public: No such file or directory
  18. debug1: identity file /home/mehul/.vagrant.d/insecure_private_key type -1
  19. debug1: key_load_public: No such file or directory
  20. debug1: identity file /home/mehul/.vagrant.d/insecure_private_key-cert type -1
  21. debug1: Enabling compatibility mode for protocol 2.0
  22. debug1: Local version string SSH-2.0-OpenSSH_6.7
  23. debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u2
  24. debug1: match: OpenSSH_6.0p1 Debian-4+deb7u2 pat OpenSSH* compat 0x04000000
  25. debug2: fd 3 setting O_NONBLOCK
  26. debug3: put_host_port: [127.0.0.1]:2200
  27. debug3: load_hostkeys: loading entries for host "[127.0.0.1]:2200" from file "/home/mehul/.ssh/known_hosts"
  28. debug3: load_hostkeys: found key type ECDSA in file /home/mehul/.ssh/known_hosts:34
  29. debug3: load_hostkeys: loaded 1 keys
  30. debug3: order_hostkeyalgs: prefer hostkeyalgs: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp5
  31. 21
  32. debug1: SSH2_MSG_KEXINIT sent
  33. debug1: SSH2_MSG_KEXINIT received
  34. debug2: kex_parse_kexinit: [email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman
  35. -group1-sha1
  36. debug2: kex_parse_kexinit: [email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-
  37. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],[email protected],arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,ar
  38. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],[email protected],arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,ar
  39. 512,hmac-sha1,[email protected],[email protected],[email protected],[email protected],hmac-md5,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
  40. 512,hmac-sha1,[email protected],[email protected],[email protected],[email protected],hmac-md5,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
  41. debug2: kex_parse_kexinit: [email protected],zlib,none
  42. debug2: kex_parse_kexinit: [email protected],zlib,none
  43. debug2: kex_parse_kexinit:
  44. debug2: kex_parse_kexinit:
  45. debug2: kex_parse_kexinit: first_kex_follows 0
  46. debug2: kex_parse_kexinit: reserved 0
  47. debug2: kex_parse_kexinit: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  48. debug2: kex_parse_kexinit: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256
  49. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected]
  50. debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,[email protected]
  51. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
  52. debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,[email protected],hmac-sha2-256,hmac-sha2-256-96,hmac-sha2-512,hmac-sha2-512-96,hmac-ripemd160,[email protected],hmac-sha1-96,hmac-md5-96
  53. debug2: kex_parse_kexinit: none,[email protected]
  54. debug2: kex_parse_kexinit: none,[email protected]
  55. debug2: kex_parse_kexinit:
  56. debug2: kex_parse_kexinit:
  57. debug2: kex_parse_kexinit: first_kex_follows 0
  58. debug2: kex_parse_kexinit: reserved 0
  59. debug2: mac_setup: setup [email protected]
  60. debug1: kex: server->client aes128-ctr [email protected] [email protected]
  61. debug2: mac_setup: setup [email protected]
  62. debug1: kex: client->server aes128-ctr [email protected] [email protected]
  63. debug1: sending SSH2_MSG_KEX_ECDH_INIT
  64. debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
  65. debug1: Server host key: ECDSA ac:06:40:f2:f0:1f:19:83:7e:3a:ed:e2:2a:24:88:8c
  66. debug3: put_host_port: [127.0.0.1]:2200
  67. debug3: put_host_port: [127.0.0.1]:2200
  68. debug3: load_hostkeys: loading entries for host "[127.0.0.1]:2200" from file "/home/mehul/.ssh/known_hosts"
  69. debug3: load_hostkeys: found key type ECDSA in file /home/mehul/.ssh/known_hosts:34
  70. debug3: load_hostkeys: loaded 1 keys
  71. debug1: Host '[127.0.0.1]:2200' is known and matches the ECDSA host key.
  72. debug1: Found key in /home/mehul/.ssh/known_hosts:34
  73. debug2: kex_derive_keys
  74. debug2: set_newkeys: mode 1
  75. debug1: SSH2_MSG_NEWKEYS sent
  76. debug1: expecting SSH2_MSG_NEWKEYS
  77. debug2: set_newkeys: mode 0
  78. debug1: SSH2_MSG_NEWKEYS received
  79. debug1: Roaming not allowed by server
  80. debug1: SSH2_MSG_SERVICE_REQUEST sent
  81. debug2: service_accept: ssh-userauth
  82. debug1: SSH2_MSG_SERVICE_ACCEPT received
  83. debug2: key: /home/mehul/.vagrant.d/insecure_private_key ((nil)), explicit
  84. debug1: Authentications that can continue: publickey,password
  85. debug3: start over, passed a different list publickey,password
  86. debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey
  87. debug3: authmethod_lookup publickey
  88. debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey
  89. debug3: authmethod_is_enabled publickey
  90. debug1: Next authentication method: publickey
  91. debug1: Trying private key: /home/mehul/.vagrant.d/insecure_private_key
  92. debug3: sign_and_send_pubkey: RSA dd:3b:b8:2e:85:04:06:e9:ab:ff:a8:0a:c0:04:6e:d6
  93. debug2: we sent a publickey packet, wait for reply
  94. debug1: Authentications that can continue: publickey,password
  95. debug2: we did not send a packet, disable method
  96. debug1: No more authentication methods to try.
  97. Permission denied (publickey,password).
Advertisement
Add Comment
Please, Sign In to add comment