[ https://issues.apache.org/jira/browse/CLOUDSTACK-4309?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Rayees Namathponnan closed CLOUDSTACK-4309. ------------------------------------------- not found this issue in latest runs > [Automation] TestVMPasswordEnabled.test_11_get_vm_password failed during ssh > connection > --------------------------------------------------------------------------------------- > > Key: CLOUDSTACK-4309 > URL: https://issues.apache.org/jira/browse/CLOUDSTACK-4309 > Project: CloudStack > Issue Type: Test > Security Level: Public(Anyone can view this level - this is the > default.) > Components: Automation, Test > Affects Versions: 4.2.0 > Reporter: Rayees Namathponnan > Assignee: Rayees Namathponnan > Fix For: 4.3.0 > > > Test cases > integration.component.test_vm_passwdenabled.TestVMPasswordEnabled.test_11_get_vm_password > failed with below error > SSH into VM: 10.223.122.79 failed > -------------------- >> begin captured logging << -------------------- > paramiko.transport: DEBUG: starting thread (client mode): 0xe944290L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.122.68: > 0f8b3ff9dc4dce10340227dab3cac032 > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) successful! > sshClient: DEBUG: SSH connect: root@10.223.122.68 with passwd password > paramiko.transport: DEBUG: [chan 1] Max packet in: 34816 bytes > paramiko.transport: DEBUG: [chan 1] Max packet out: 32768 bytes > paramiko.transport: INFO: Secsh channel 1 opened. > paramiko.transport: DEBUG: [chan 1] Sesch channel 1 request ok > paramiko.transport: DEBUG: [chan 1] EOF received (1) > sshClient: DEBUG: {Cmd: cd /etc/init.d;wget > http://people.apache.org/~tsp/cloud-set-guest-password via Host: > 10.223.122.68} {returns: ['--2013-08-13 06:01:11-- > http://people.apache.org/~tsp/cloud-set-guest-password', 'Resolving > people.apache.org... 140.211.11.9', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:04:31-- (try: 2) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:07:42-- (try: 3) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:10:54-- (try: 4) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:14:07-- (try: 5) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:17:21-- (try: 6) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:20:36-- (try: 7) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:23:52-- (try: 8) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:27:09-- (try: 9) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:30:27-- (try:10) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:33:46-- (try:11) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:37:05-- (try:12) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:40:24-- (try:13) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:43:43-- (try:14) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:47:02-- (try:15) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:50:21-- (try:16) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:53:40-- (try:17) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 06:56:59-- (try:18) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 07:00:18-- (try:19) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', > 'Retrying.', '', '--2013-08-13 07:03:37-- (try:20) > http://people.apache.org/~tsp/cloud-set-guest-password', 'Connecting to > people.apache.org|140.211.11.9|:80... failed: Connection timed out.', 'Giving > up.', '']} > paramiko.transport: DEBUG: [chan 2] Max packet in: 34816 bytes > paramiko.transport: DEBUG: [chan 1] EOF sent (1) > paramiko.transport: DEBUG: [chan 2] Max packet out: 32768 bytes > paramiko.transport: INFO: Secsh channel 2 opened. > paramiko.transport: DEBUG: [chan 2] Sesch channel 2 request ok > paramiko.transport: DEBUG: [chan 2] EOF received (2) > paramiko.transport: DEBUG: [chan 2] EOF sent (2) > sshClient: DEBUG: {Cmd: chmod +x /etc/init.d/cloud-set-guest-password via > Host: 10.223.122.68} {returns: ["chmod: cannot access > `/etc/init.d/cloud-set-guest-password': No such file or directory"]} > paramiko.transport: DEBUG: [chan 3] Max packet in: 34816 bytes > paramiko.transport: DEBUG: [chan 3] Max packet out: 32768 bytes > paramiko.transport: INFO: Secsh channel 3 opened. > paramiko.transport: DEBUG: [chan 3] Sesch channel 3 request ok > paramiko.transport: DEBUG: [chan 3] EOF received (3) > paramiko.transport: DEBUG: [chan 3] EOF sent (3) > sshClient: DEBUG: {Cmd: chkconfig --add cloud-set-guest-password via Host: > 10.223.122.68} {returns: ['error reading information on service > cloud-set-guest-password: No such file or directory']} > paramiko.transport: DEBUG: EOF in transport thread > testclient.testcase.TestVMPasswordEnabled: DEBUG: Stopping VM: > 39d3f3f4-e954-467d-938d-0424ade54a1c > testclient.testcase.TestVMPasswordEnabled: DEBUG: Resetting VM password for > VM: 39d3f3f4-e954-467d-938d-0424ade54a1c > testclient.testcase.TestVMPasswordEnabled: DEBUG: Password reset to: wH4apdskz > testclient.testcase.TestVMPasswordEnabled: DEBUG: Starting VM to verify new > password.. > testclient.testcase.TestVMPasswordEnabled: DEBUG: VM - > 39d3f3f4-e954-467d-938d-0424ade54a1c stated! > testclient.testcase.TestVMPasswordEnabled: DEBUG: SSHing into VM: > 10.223.122.79 > paramiko.transport: DEBUG: starting thread (client mode): 0xe944cd0L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Adding ssh-rsa host key for 10.223.122.79: > 0f8b3ff9dc4dce10340227dab3cac032 > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: starting thread (client mode): 0xe945250L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: starting thread (client mode): 0xe945490L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: starting thread (client mode): 0xe945850L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: EOF in transport thread > paramiko.transport: DEBUG: starting thread (client mode): 0xe945190L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: EOF in transport thread > paramiko.transport: DEBUG: starting thread (client mode): 0xe945a10L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: EOF in transport thread > paramiko.transport: DEBUG: starting thread (client mode): 0xe945f50L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: EOF in transport thread > paramiko.transport: DEBUG: starting thread (client mode): 0xe994510L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: EOF in transport thread > paramiko.transport: DEBUG: starting thread (client mode): 0xe994a10L > paramiko.transport: INFO: Connected (version 2.0, client OpenSSH_4.3) > paramiko.transport: DEBUG: kex algos:['diffie-hellman-group-exchange-sha1', > 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server > key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', > 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', > 'aes192-cbc', 'aes256-cbc', 'rijndael-...@lysator.liu.se', 'aes128-ctr', > 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', > 'hmac-ripemd160', 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', > 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'hmac-ripemd160', > 'hmac-ripemd...@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client > compress:['none', 'z...@openssh.com'] server compress:['none', > 'z...@openssh.com'] client lang:[''] server lang:[''] kex follows?False > paramiko.transport: DEBUG: Ciphers agreed: local=aes128-ctr, remote=aes128-ctr > paramiko.transport: DEBUG: using kex diffie-hellman-group1-sha1; server key > type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local > hmac-sha1, remote hmac-sha1; compression: local none, remote none > paramiko.transport: DEBUG: Switch to new keys ... > paramiko.transport: DEBUG: Trying discovered key > 76be480fa6b8ad3b78082d6d19e4ee44 in /root/.ssh/id_rsa > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (publickey) failed. > paramiko.transport: DEBUG: userauth is OK > paramiko.transport: INFO: Authentication (password) failed. > paramiko.transport: DEBUG: EOF in transport thread > paramiko.transport: DEBUG: EOF in transport thread > paramiko.transport: DEBUG: EOF in transport thread > paramiko.transport: DEBUG: EOF in transport thread > --------------------- >> end captured logging << --------------------- > Stacktrace > File "/usr/local/lib/python2.7/unittest/case.py", line 318, in run > testMethod() > File > "/Repo_30X/ipcl/cloudstack/test/integration/component/test_vm_passwdenabled.py", > line 289, in test_11_get_vm_password > self.fail("SSH into VM: %s failed" % self.vm.ssh_ip) > File "/usr/local/lib/python2.7/unittest/case.py", line 393, in fail > raise self.failureException(msg) > SSH into VM: 10.223.122.79 failed -- This message was sent by Atlassian JIRA (v6.1.4#6159)