cloudstack-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Girish Shilamkar (JIRA)" <j...@apache.org>
Subject [jira] [Resolved] (CLOUDSTACK-4309) [Automation] TestVMPasswordEnabled.test_11_get_vm_password failed during ssh connection
Date Tue, 17 Dec 2013 13:04:07 GMT

     [ https://issues.apache.org/jira/browse/CLOUDSTACK-4309?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Girish Shilamkar resolved CLOUDSTACK-4309.
------------------------------------------

    Resolution: Not A Problem

Not seen in VMware, Xen  or KVM

> [Automation] TestVMPasswordEnabled.test_11_get_vm_password failed during ssh connection
> ---------------------------------------------------------------------------------------
>
>                 Key: CLOUDSTACK-4309
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-4309
>             Project: CloudStack
>          Issue Type: Test
>      Security Level: Public(Anyone can view this level - this is the default.) 
>          Components: Automation, Test
>    Affects Versions: 4.2.0
>            Reporter: Rayees Namathponnan
>            Assignee: Rayees Namathponnan
>             Fix For: 4.3.0
>
>
> Test cases integration.component.test_vm_passwdenabled.TestVMPasswordEnabled.test_11_get_vm_password
failed with below error 
> SSH into VM: 10.223.122.79 failed
> -------------------- >> begin captured logging << --------------------
> paramiko.transport: DEBUG: starting thread (client mode): 0xe944290L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.122.68: 0f8b3ff9dc4dce10340227dab3cac032
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) successful!
> sshClient: DEBUG: SSH connect: root@10.223.122.68 with passwd password
> paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 1 opened.
> paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
> paramiko.transport: DEBUG: [chan 1] EOF received (1)
> sshClient: DEBUG: {Cmd: cd /etc/init.d;wget http://people.apache.org/~tsp/cloud-set-guest-password
via Host: 10.223.122.68} {returns: ['--2013-08-13 06:01:11--  http://people.apache.org/~tsp/cloud-set-guest-password',
'Resolving people.apache.org... 140.211.11.9', 'Connecting to people.apache.org|140.211.11.9|:80...
failed: Connection timed out.', 'Retrying.', '', '--2013-08-13 06:04:31--  (try: 2)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:07:42--  (try: 3)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:10:54--  (try: 4)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:14:07--  (try: 5)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:17:21--  (try: 6)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:20:36--  (try: 7)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:23:52--  (try: 8)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:27:09--  (try: 9)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:30:27--  (try:10)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:33:46--  (try:11)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:37:05--  (try:12)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:40:24--  (try:13)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:43:43--  (try:14)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:47:02--  (try:15)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:50:21--  (try:16)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:53:40--  (try:17)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 06:56:59--  (try:18)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 07:00:18--  (try:19)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Retrying.',
'', '--2013-08-13 07:03:37--  (try:20)  http://people.apache.org/~tsp/cloud-set-guest-password',
'Connecting to people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Giving
up.', '']}
> paramiko.transport: DEBUG: [chan 2] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 1] EOF sent (1)
> paramiko.transport: DEBUG: [chan 2] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 2 opened.
> paramiko.transport: DEBUG: [chan 2] Sesch channel 2 request ok
> paramiko.transport: DEBUG: [chan 2] EOF received (2)
> paramiko.transport: DEBUG: [chan 2] EOF sent (2)
> sshClient: DEBUG: {Cmd: chmod +x /etc/init.d/cloud-set-guest-password via Host: 10.223.122.68}
{returns: ["chmod: cannot access `/etc/init.d/cloud-set-guest-password': No such file or directory"]}
> paramiko.transport: DEBUG: [chan 3] Max packet in: 34816 bytes
> paramiko.transport: DEBUG: [chan 3] Max packet out: 32768 bytes
> paramiko.transport: INFO: Secsh channel 3 opened.
> paramiko.transport: DEBUG: [chan 3] Sesch channel 3 request ok
> paramiko.transport: DEBUG: [chan 3] EOF received (3)
> paramiko.transport: DEBUG: [chan 3] EOF sent (3)
> sshClient: DEBUG: {Cmd: chkconfig --add cloud-set-guest-password via Host: 10.223.122.68}
{returns: ['error reading information on service cloud-set-guest-password: No such file or
directory']}
> paramiko.transport: DEBUG: EOF in transport thread
> testclient.testcase.TestVMPasswordEnabled: DEBUG: Stopping VM: 39d3f3f4-e954-467d-938d-0424ade54a1c
> testclient.testcase.TestVMPasswordEnabled: DEBUG: Resetting VM password for VM: 39d3f3f4-e954-467d-938d-0424ade54a1c
> testclient.testcase.TestVMPasswordEnabled: DEBUG: Password reset to: wH4apdskz
> testclient.testcase.TestVMPasswordEnabled: DEBUG: Starting VM to verify new password..
> testclient.testcase.TestVMPasswordEnabled: DEBUG: VM - 39d3f3f4-e954-467d-938d-0424ade54a1c
stated!
> testclient.testcase.TestVMPasswordEnabled: DEBUG: SSHing into VM: 10.223.122.79
> paramiko.transport: DEBUG: starting thread (client mode): 0xe944cd0L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.122.79: 0f8b3ff9dc4dce10340227dab3cac032
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: starting thread (client mode): 0xe945250L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: starting thread (client mode): 0xe945490L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: starting thread (client mode): 0xe945850L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: EOF in transport thread
> paramiko.transport: DEBUG: starting thread (client mode): 0xe945190L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: EOF in transport thread
> paramiko.transport: DEBUG: starting thread (client mode): 0xe945a10L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: EOF in transport thread
> paramiko.transport: DEBUG: starting thread (client mode): 0xe945f50L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: EOF in transport thread
> paramiko.transport: DEBUG: starting thread (client mode): 0xe994510L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: EOF in transport thread
> paramiko.transport: DEBUG: starting thread (client mode): 0xe994a10L
> paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
> paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1',
'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc',
'3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc',
'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server
encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256',
'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr',
'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com',
'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none',
'zlib@openssh.com'] client lang:[''] server lang:[''] kex follows?False
> paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
> paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key type ssh-rsa;
cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression:
local none, remote none
> paramiko.transport: DEBUG: Switch to new keys ...
> paramiko.transport: DEBUG: Trying discovered key 76be480fa6b8ad3b78082d6d19e4ee44 in
/root/.ssh/id_rsa
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (publickey) failed.
> paramiko.transport: DEBUG: userauth is OK
> paramiko.transport: INFO: Authentication (password) failed.
> paramiko.transport: DEBUG: EOF in transport thread
> paramiko.transport: DEBUG: EOF in transport thread
> paramiko.transport: DEBUG: EOF in transport thread
> paramiko.transport: DEBUG: EOF in transport thread
> --------------------- >> end captured logging << ---------------------
> Stacktrace
>   File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run
>     testMethod()
>   File "/Repo_30X/ipcl/cloudstack/test/integration/component/test_vm_passwdenabled.py",
line 289, in test_11_get_vm_password
>     self.fail("SSH into VM: %s failed" % self.vm.ssh_ip)
>   File "/usr/local/lib/python2.7/unittest/case.py", line 393, in fail
>     raise self.failureException(msg)
> SSH into VM: 10.223.122.79 failed



--
This message was sent by Atlassian JIRA
(v6.1.4#6159)

Mime
View raw message