Rayees Namathponnan created CLOUDSTACK-4309:
-----------------------------------------------

             Summary: [Automation] 
TestVMPasswordEnabled.test_11_get_vm_password failed during ssh connection
                 Key: CLOUDSTACK-4309
                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-4309
             Project: CloudStack
          Issue Type: Test
      Security Level: Public (Anyone can view this level - this is the default.)
          Components: Automation, Test
    Affects Versions: 4.2.0
            Reporter: Rayees Namathponnan
             Fix For: 4.2.0


Test cases 
integration.component.test_vm_passwdenabled.TestVMPasswordEnabled.test_11_get_vm_password
 failed with below error 



SSH into VM: 10.223.122.79 failed
-------------------- >> begin captured logging << --------------------
paramiko.transport: DEBUG: starting thread (client mode): 0xe944290L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.122.68: 
0f8b3ff9dc4dce10340227dab3cac032
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) successful!
sshClient: DEBUG: SSH connect: [email protected] with passwd password
paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 1 opened.
paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok
paramiko.transport: DEBUG: [chan 1] EOF received (1)
sshClient: DEBUG: {Cmd: cd /etc/init.d;wget 
http://people.apache.org/~tsp/cloud-set-guest-password via Host: 10.223.122.68} 
{returns: ['--2013-08-13 06:01:11--  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Resolving 
people.apache.org... 140.211.11.9', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:04:31--  (try: 2)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:07:42--  (try: 3)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:10:54--  (try: 4)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:14:07--  (try: 5)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:17:21--  (try: 6)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:20:36--  (try: 7)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:23:52--  (try: 8)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:27:09--  (try: 9)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:30:27--  (try:10)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:33:46--  (try:11)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:37:05--  (try:12)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:40:24--  (try:13)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:43:43--  (try:14)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:47:02--  (try:15)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:50:21--  (try:16)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:53:40--  (try:17)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 06:56:59--  (try:18)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 07:00:18--  (try:19)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 
'Retrying.', '', '--2013-08-13 07:03:37--  (try:20)  
http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to 
people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Giving 
up.', '']}
paramiko.transport: DEBUG: [chan 2] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 1] EOF sent (1)
paramiko.transport: DEBUG: [chan 2] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 2 opened.
paramiko.transport: DEBUG: [chan 2] Sesch channel 2 request ok
paramiko.transport: DEBUG: [chan 2] EOF received (2)
paramiko.transport: DEBUG: [chan 2] EOF sent (2)
sshClient: DEBUG: {Cmd: chmod +x /etc/init.d/cloud-set-guest-password via Host: 
10.223.122.68} {returns: ["chmod: cannot access 
`/etc/init.d/cloud-set-guest-password': No such file or directory"]}
paramiko.transport: DEBUG: [chan 3] Max packet in: 34816 bytes
paramiko.transport: DEBUG: [chan 3] Max packet out: 32768 bytes
paramiko.transport: INFO: Secsh channel 3 opened.
paramiko.transport: DEBUG: [chan 3] Sesch channel 3 request ok
paramiko.transport: DEBUG: [chan 3] EOF received (3)
paramiko.transport: DEBUG: [chan 3] EOF sent (3)
sshClient: DEBUG: {Cmd: chkconfig --add cloud-set-guest-password via Host: 
10.223.122.68} {returns: ['error reading information on service 
cloud-set-guest-password: No such file or directory']}
paramiko.transport: DEBUG: EOF in transport thread
testclient.testcase.TestVMPasswordEnabled: DEBUG: Stopping VM: 
39d3f3f4-e954-467d-938d-0424ade54a1c
testclient.testcase.TestVMPasswordEnabled: DEBUG: Resetting VM password for VM: 
39d3f3f4-e954-467d-938d-0424ade54a1c
testclient.testcase.TestVMPasswordEnabled: DEBUG: Password reset to: wH4apdskz
testclient.testcase.TestVMPasswordEnabled: DEBUG: Starting VM to verify new 
password..
testclient.testcase.TestVMPasswordEnabled: DEBUG: VM - 
39d3f3f4-e954-467d-938d-0424ade54a1c stated!
testclient.testcase.TestVMPasswordEnabled: DEBUG: SSHing into VM: 10.223.122.79
paramiko.transport: DEBUG: starting thread (client mode): 0xe944cd0L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.122.79: 
0f8b3ff9dc4dce10340227dab3cac032
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: starting thread (client mode): 0xe945250L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: starting thread (client mode): 0xe945490L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: starting thread (client mode): 0xe945850L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: EOF in transport thread
paramiko.transport: DEBUG: starting thread (client mode): 0xe945190L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: EOF in transport thread
paramiko.transport: DEBUG: starting thread (client mode): 0xe945a10L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: EOF in transport thread
paramiko.transport: DEBUG: starting thread (client mode): 0xe945f50L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: EOF in transport thread
paramiko.transport: DEBUG: starting thread (client mode): 0xe994510L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: EOF in transport thread
paramiko.transport: DEBUG: starting thread (client mode): 0xe994a10L
paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3)
paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', 
'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server 
key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 
'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 
'aes192-cbc', 'aes256-cbc', '[email protected]', 'aes128-ctr', 
'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 
'hmac-ripemd160', '[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] 
server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', 
'[email protected]', 'hmac-sha1-96', 'hmac-md5-96'] client 
compress:['none', '[email protected]'] server compress:['none', 
'[email protected]'] client lang:[''] server lang:[''] kex follows?False
paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr
paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key 
type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local 
hmac-sha1, remote hmac-sha1; compression: local none, remote none
paramiko.transport: DEBUG: Switch to new keys ...
paramiko.transport: DEBUG: Trying discovered key 
76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (publickey) failed.
paramiko.transport: DEBUG: userauth is OK
paramiko.transport: INFO: Authentication (password) failed.
paramiko.transport: DEBUG: EOF in transport thread
paramiko.transport: DEBUG: EOF in transport thread
paramiko.transport: DEBUG: EOF in transport thread
paramiko.transport: DEBUG: EOF in transport thread
--------------------- >> end captured logging << ---------------------
Stacktrace

  File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run
    testMethod()
  File 
"/Repo_30X/ipcl/cloudstack/test/integration/component/test_vm_passwdenabled.py",
 line 289, in test_11_get_vm_password
    self.fail("SSH into VM: %s failed" % self.vm.ssh_ip)
  File "/usr/local/lib/python2.7/unittest/case.py", line 393, in fail
    raise self.failureException(msg)
SSH into VM: 10.223.122.79 failed

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to