Hello.
I'm attempting to connect via Ansible to a remote linux based server. When
I attempt:
ansible all -m ping -u <username>
I receive the following errors:
*X.X.X.X | UNREACHABLE! => {*
* "changed": false, *
* "msg": "Failed to connect to the host via ssh: <username>@x.x.x.x:
Permission denied (publickey,password).", *
* "unreachable": true*
*}*
(IP and username were discarded for confidentiality purposes.)
I'm able to execute the command successfully if I use the --ask-pass
option, however; I was hoping to get it to automatically authorize PC
machine via ssh keys.
On the Linux Server, I am able to see my PC's ssh key under: '
~/.ssh/authorized_keys'
>From my understanding, the server would need the ssh key of my PC for my PC
to authenticate with it? OR is it the other way around? My MAC-Book does
not have an authorized_keys file.
Here is a result from the command 'ansible all -m ping -u oblong -vvvv'
<X.X.X.X> (255, '', 'OpenSSH_7.9p1, LibreSSL 2.7.3\r\ndebug1: Reading
configuration data /etc/ssh/ssh_config\r\ndebug1: /etc/ssh/ssh_config line
48: Applying options for *\r\ndebug2: resolve_canonicalize: hostname
X.X.X.X is address\r\ndebug1: auto-mux: Trying existing master\r\ndebug1:
Control socket "/Users/<username>/.ansible/cp/3c7f159221" does not
exist\r\ndebug2: ssh_connect_direct\r\ndebug1: Connecting to X.X.X.X
[X.X.X.X] port 22.\r\ndebug2: fd 3 setting O_NONBLOCK\r\ndebug1: fd 3
clearing O_NONBLOCK\r\ndebug1: Connection established.\r\ndebug3: timeout:
9988 ms remain after connect\r\ndebug1: identity file
/Users/<username>/.ssh/id_rsa
type 0\r\ndebug1: identity file /Users/<username>/.ssh/id_rsa-cert type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_dsa type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_dsa-cert type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_ecdsa type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_ecdsa-cert type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_ed25519 type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_ed25519-cert type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_xmss type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_xmss-cert type
-1\r\ndebug1: Local version string SSH-2.0-OpenSSH_7.9\r\ndebug1: Remote
protocol version 2.0, remote software version OpenSSH_7.2p2
Ubuntu-4ubuntu2.4\r\ndebug1: match: OpenSSH_7.2p2 Ubuntu-4ubuntu2.4 pat
OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7*
compat 0x04000002\r\ndebug2: fd 3 setting O_NONBLOCK\r\ndebug1:
Authenticating to X.X.X.X:22 as \'oblong\'\r\ndebug3: hostkeys_foreach:
reading file "/Users/<username>/.ssh/known_hosts"\r\ndebug3:
record_hostkey: found key type ECDSA in file
/Users/<username>/.ssh/known_hosts:8\r\ndebug3:
load_hostkeys: loaded 1 keys from X.X.X.X\r\ndebug3: order_hostkeyalgs:
prefer hostkeyalgs:
[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521\r\ndebug3:
send packet: type 20\r\ndebug1: SSH2_MSG_KEXINIT sent\r\ndebug3: receive
packet: type 20\r\ndebug1: SSH2_MSG_KEXINIT received\r\ndebug2: local
client KEXINIT proposal\r\ndebug2: KEX algorithms:
curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c\r\ndebug2:
host key algorithms:
[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],[email protected],[email protected],ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa\r\ndebug2:
ciphers ctos:
[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]\r\ndebug2:
ciphers stoc:
[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]\r\ndebug2:
MACs ctos:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1\r\ndebug2:
MACs stoc:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1\r\ndebug2:
compression ctos: [email protected],zlib,none\r\ndebug2: compression stoc:
[email protected],zlib,none\r\ndebug2: languages ctos: \r\ndebug2: languages
stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug2:
peer server KEXINIT proposal\r\ndebug2: KEX algorithms:
[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1\r\ndebug2:
host key algorithms:
ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256\r\ndebug2: ciphers
ctos:
[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]\r\ndebug2:
ciphers stoc:
[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]\r\ndebug2:
MACs ctos:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1\r\ndebug2:
MACs stoc:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1\r\ndebug2:
compression ctos: none,[email protected]\r\ndebug2: compression stoc:
none,[email protected]\r\ndebug2: languages ctos: \r\ndebug2: languages
stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug1:
kex: algorithm: [email protected]\r\ndebug1: kex: host key
algorithm: ecdsa-sha2-nistp256\r\ndebug1: kex: server->client cipher:
[email protected] MAC: <implicit> compression:
[email protected]\r\ndebug1: kex: client->server cipher:
[email protected] MAC: <implicit> compression:
[email protected]\r\ndebug3: send packet: type 30\r\ndebug1: expecting
SSH2_MSG_KEX_ECDH_REPLY\r\ndebug3: receive packet: type 31\r\ndebug1:
Server host key: ecdsa-sha2-nistp256
SHA256:Sbj/CzXhgjACsdDKFB/JyY5Lmmo1F48OSfWqZNd/kA8\r\ndebug3:
hostkeys_foreach: reading file "/Users/<username>/.ssh/known_hosts"\r\ndebug3:
record_hostkey: found key type ECDSA in file
/Users/<username>/.ssh/known_hosts:8\r\ndebug3:
load_hostkeys: loaded 1 keys from X.X.X.X\r\ndebug1: Host \'X.X.X.X\' is
known and matches the ECDSA host key.\r\ndebug1: Found key in /Users/
<username>/.ssh/known_hosts:8\r\ndebug3: send packet: type 21\r\ndebug2:
set_newkeys: mode 1\r\ndebug1: rekey after 134217728 blocks\r\ndebug1:
SSH2_MSG_NEWKEYS sent\r\ndebug1: expecting SSH2_MSG_NEWKEYS\r\ndebug3:
receive packet: type 21\r\ndebug1: SSH2_MSG_NEWKEYS received\r\ndebug2:
set_newkeys: mode 0\r\ndebug1: rekey after 134217728 blocks\r\ndebug1: Will
attempt key: /Users/<username>/.ssh/id_rsa RSA
SHA256:3GuYcoWr1vKUN3QNr7wdwfBahviqIuNYZnXGhrFGR/0\r\ndebug1: Will attempt
key: /Users/<username>/.ssh/id_dsa \r\ndebug1: Will attempt key: /Users/
<username>/.ssh/id_ecdsa \r\ndebug1: Will attempt key:
/Users/<username>/.ssh/id_ed25519
\r\ndebug1: Will attempt key: /Users/<username>/.ssh/id_xmss \r\ndebug2:
pubkey_prepare: done\r\ndebug3: send packet: type 5\r\ndebug3: receive
packet: type 7\r\ndebug1: SSH2_MSG_EXT_INFO received\r\ndebug1:
kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512>\r\ndebug3:
receive packet: type 6\r\ndebug2: service_accept: ssh-userauth\r\ndebug1:
SSH2_MSG_SERVICE_ACCEPT received\r\ndebug3: send packet: type 50\r\ndebug3:
receive packet: type 51\r\ndebug1: Authentications that can continue:
publickey,password\r\ndebug3: start over, passed a different list
publickey,password\r\ndebug3: preferred
gssapi-with-mic,gssapi-keyex,hostbased,publickey\r\ndebug3:
authmethod_lookup publickey\r\ndebug3: remaining preferred:
,gssapi-keyex,hostbased,publickey\r\ndebug3: authmethod_is_enabled
publickey\r\ndebug1: Next authentication method: publickey\r\ndebug1:
Offering public key: /Users/<username>/.ssh/id_rsa RSA
SHA256:3GuYcoWr1vKUN3QNr7wdwfBahviqIuNYZnXGhrFGR/0\r\ndebug3: send packet:
type 50\r\ndebug2: we sent a publickey packet, wait for reply\r\ndebug3:
receive packet: type 51\r\ndebug1: Authentications that can continue:
publickey,password\r\ndebug1: Trying private key:
/Users/<username>/.ssh/id_dsa\r\ndebug3:
no such identity: /Users/<username>/.ssh/id_dsa: No such file or
directory\r\ndebug1: Trying private key:
/Users/<username>/.ssh/id_ecdsa\r\ndebug3:
no such identity: /Users/<username>/.ssh/id_ecdsa: No such file or
directory\r\ndebug1: Trying private key:
/Users/<username>/.ssh/id_ed25519\r\ndebug3:
no such identity: /Users/<username>/.ssh/id_ed25519: No such file or
directory\r\ndebug1: Trying private key:
/Users/<username>/.ssh/id_xmss\r\ndebug3:
no such identity: /Users/<username>/.ssh/id_xmss: No such file or
directory\r\ndebug2: we did not send a packet, disable method\r\ndebug1: No
more authentication methods to try.\r\[email protected]: Permission denied
(publickey,password).\r\n')
*X.X.X.X | UNREACHABLE! => {*
* "changed": false,*
* "msg": "Failed to connect to the host via ssh: OpenSSH_7.9p1, LibreSSL
2.7.3\r\ndebug1: Reading configuration data /etc/ssh/ssh_config\r\ndebug1:
/etc/ssh/ssh_config line 48: Applying options for *\r\ndebug2:
resolve_canonicalize: hostname X.X.X.X is address\r\ndebug1: auto-mux:
Trying existing master\r\ndebug1: Control socket
\"/Users/<username>/.ansible/cp/3c7f159221\" does not exist\r\ndebug2:
ssh_connect_direct\r\ndebug1: Connecting to X.X.X.X [X.X.X.X] port
22.\r\ndebug2: fd 3 setting O_NONBLOCK\r\ndebug1: fd 3 clearing
O_NONBLOCK\r\ndebug1: Connection established.\r\ndebug3: timeout: 9988 ms
remain after connect\r\ndebug1: identity file /Users/<username>/.ssh/id_rsa
type 0\r\ndebug1: identity file /Users/<username>/.ssh/id_rsa-cert type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_dsa type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_dsa-cert type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_ecdsa type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_ecdsa-cert type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_ed25519 type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_ed25519-cert type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_xmss type
-1\r\ndebug1: identity file /Users/<username>/.ssh/id_xmss-cert type
-1\r\ndebug1: Local version string SSH-2.0-OpenSSH_7.9\r\ndebug1: Remote
protocol version 2.0, remote software version OpenSSH_7.2p2
Ubuntu-4ubuntu2.4\r\ndebug1: match: OpenSSH_7.2p2 Ubuntu-4ubuntu2.4 pat
OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7*
compat 0x04000002\r\ndebug2: fd 3 setting O_NONBLOCK\r\ndebug1:
Authenticating to X.X.X.X:22 as 'oblong'\r\ndebug3: hostkeys_foreach:
reading file \"/Users/<username>/.ssh/known_hosts\"\r\ndebug3:
record_hostkey: found key type ECDSA in file
/Users/<username>/.ssh/known_hosts:8\r\ndebug3: load_hostkeys: loaded 1
keys from X.X.X.X\r\ndebug3: order_hostkeyalgs: prefer hostkeyalgs:
[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521\r\ndebug3:
send packet: type 20\r\ndebug1: SSH2_MSG_KEXINIT sent\r\ndebug3: receive
packet: type 20\r\ndebug1: SSH2_MSG_KEXINIT received\r\ndebug2: local
client KEXINIT proposal\r\ndebug2: KEX algorithms:
curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c\r\ndebug2:
host key algorithms:
[email protected],[email protected],[email protected],ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,[email protected],[email protected],[email protected],[email protected],ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa\r\ndebug2:
ciphers ctos:
[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]\r\ndebug2:
ciphers stoc:
[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]\r\ndebug2:
MACs ctos:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1\r\ndebug2:
MACs stoc:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1\r\ndebug2:
compression ctos: [email protected],zlib,none\r\ndebug2: compression stoc:
[email protected],zlib,none\r\ndebug2: languages ctos: \r\ndebug2: languages
stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug2:
peer server KEXINIT proposal\r\ndebug2: KEX algorithms:
[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1\r\ndebug2:
host key algorithms:
ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256\r\ndebug2: ciphers
ctos:
[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]\r\ndebug2:
ciphers stoc:
[email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected]\r\ndebug2:
MACs ctos:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1\r\ndebug2:
MACs stoc:
[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],[email protected],hmac-sha2-256,hmac-sha2-512,hmac-sha1\r\ndebug2:
compression ctos: none,[email protected]\r\ndebug2: compression stoc:
none,[email protected]\r\ndebug2: languages ctos: \r\ndebug2: languages
stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug1:
kex: algorithm: [email protected]\r\ndebug1: kex: host key
algorithm: ecdsa-sha2-nistp256\r\ndebug1: kex: server->client cipher:
[email protected] MAC: <implicit> compression:
[email protected]\r\ndebug1: kex: client->server cipher:
[email protected] MAC: <implicit> compression:
[email protected]\r\ndebug3: send packet: type 30\r\ndebug1: expecting
SSH2_MSG_KEX_ECDH_REPLY\r\ndebug3: receive packet: type 31\r\ndebug1:
Server host key: ecdsa-sha2-nistp256
SHA256:Sbj/CzXhgjACsdDKFB/JyY5Lmmo1F48OSfWqZNd/kA8\r\ndebug3:
hostkeys_foreach: reading file
\"/Users/<username>/.ssh/known_hosts\"\r\ndebug3: record_hostkey: found key
type ECDSA in file /Users/<username>/.ssh/known_hosts:8\r\ndebug3:
load_hostkeys: loaded 1 keys from X.X.X.X\r\ndebug1: Host 'X.X.X.X' is
known and matches the ECDSA host key.\r\ndebug1: Found key in
/Users/<username>/.ssh/known_hosts:8\r\ndebug3: send packet: type
21\r\ndebug2: set_newkeys: mode 1\r\ndebug1: rekey after 134217728
blocks\r\ndebug1: SSH2_MSG_NEWKEYS sent\r\ndebug1: expecting
SSH2_MSG_NEWKEYS\r\ndebug3: receive packet: type 21\r\ndebug1:
SSH2_MSG_NEWKEYS received\r\ndebug2: set_newkeys: mode 0\r\ndebug1: rekey
after 134217728 blocks\r\ndebug1: Will attempt key:
/Users/<username>/.ssh/id_rsa RSA
SHA256:3GuYcoWr1vKUN3QNr7wdwfBahviqIuNYZnXGhrFGR/0\r\ndebug1: Will attempt
key: /Users/<username>/.ssh/id_dsa \r\ndebug1: Will attempt key:
/Users/<username>/.ssh/id_ecdsa \r\ndebug1: Will attempt key:
/Users/<username>/.ssh/id_ed25519 \r\ndebug1: Will attempt key:
/Users/<username>/.ssh/id_xmss \r\ndebug2: pubkey_prepare: done\r\ndebug3:
send packet: type 5\r\ndebug3: receive packet: type 7\r\ndebug1:
SSH2_MSG_EXT_INFO received\r\ndebug1: kex_input_ext_info:
server-sig-algs=<rsa-sha2-256,rsa-sha2-512>\r\ndebug3: receive packet: type
6\r\ndebug2: service_accept: ssh-userauth\r\ndebug1:
SSH2_MSG_SERVICE_ACCEPT received\r\ndebug3: send packet: type 50\r\ndebug3:
receive packet: type 51\r\ndebug1: Authentications that can continue:
publickey,password\r\ndebug3: start over, passed a different list
publickey,password\r\ndebug3: preferred
gssapi-with-mic,gssapi-keyex,hostbased,publickey\r\ndebug3:
authmethod_lookup publickey\r\ndebug3: remaining preferred:
,gssapi-keyex,hostbased,publickey\r\ndebug3: authmethod_is_enabled
publickey\r\ndebug1: Next authentication method: publickey\r\ndebug1:
Offering public key: /Users/<username>/.ssh/id_rsa RSA
SHA256:3GuYcoWr1vKUN3QNr7wdwfBahviqIuNYZnXGhrFGR/0\r\ndebug3: send packet:
type 50\r\ndebug2: we sent a publickey packet, wait for reply\r\ndebug3:
receive packet: type 51\r\ndebug1: Authentications that can continue:
publickey,password\r\ndebug1: Trying private key:
/Users/<username>/.ssh/id_dsa\r\ndebug3: no such identity:
/Users/<username>/.ssh/id_dsa: No such file or directory\r\ndebug1: Trying
private key: /Users/<username>/.ssh/id_ecdsa\r\ndebug3: no such identity:
/Users/<username>/.ssh/id_ecdsa: No such file or directory\r\ndebug1:
Trying private key: /Users/<username>/.ssh/id_ed25519\r\ndebug3: no such
identity: /Users/<username>/.ssh/id_ed25519: No such file or
directory\r\ndebug1: Trying private key:
/Users/<username>/.ssh/id_xmss\r\ndebug3: no such identity:
/Users/<username>/.ssh/id_xmss: No such file or directory\r\ndebug2: we did
not send a packet, disable method\r\ndebug1: No more authentication methods
to try.\r\[email protected]: Permission denied (publickey,password).",*
* "unreachable": true*
*}*
--
You received this message because you are subscribed to the Google Groups
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/ansible-project/e7bb3143-ed4b-4753-b1a0-ffcedd30b7bf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.