Roots Discourse

I really want to love trellis.. but ansible is in the way!

Im now on my 4th day of setting up trellis, i’ve been following ALL guides from A-Z, changed ansible versions, read EVERY ssh realated thread i could find, with no success!! All issues seem to be related to Ansible!!!

So this morning i started all over with fresh install of trellis, bedrock, and both new staging as well as production server.

WHY WHY WHY is it so f–n hard to set up a working trellis solution. This is seriously the 5th time i’m doing this attempt at getting started with trellis, i don’t consider my self to be stupid, but this crap is starting to break me down!!!

This morning i actually got to the point where provisioning of staging server worked all fine.
BUT when running deploy it throws ridiculous error, see the output below

debug1: identity file /Users/danadalis/.ssh/id_rsa type 0

debug1: identity file /Users/danadalis/.ssh/id_rsa-cert type -1

debug1: Local version string SSH-2.0-OpenSSH_7.9

debug1: Remote protocol version 2.0, remote software version OpenSSH_7.6p1

debug1: match: OpenSSH_7.6p1 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenS
SH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002

debug2: fd 3 setting O_NONBLOCK

debug1: Authenticating to 35.228.230.145:22 as \'web\'

debug3: hostkeys_foreach: reading file "/Users/danadalis/.ssh/known_hosts"

debug3: record_hostkey: found key type ECDSA in file
/Users/danadalis/.ssh/known_hosts:3

debug3: load_hostkeys: loaded 1 keys from 35.228.230.145

debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-
sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com
,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-
sha2-nistp384,ecdsa-sha2-nistp521

debug3: send packet: type 20

debug1: SSH2_MSG_KEXINIT sent

debug3: receive packet: type 20

debug1: SSH2_MSG_KEXINIT received

debug2: local client KEXINIT proposal

debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-
sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-
exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512
,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c

debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-
sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com
,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-
ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-
sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-
sha2-512,rsa-sha2-256,ssh-rsa

debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes
256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com

debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes
256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com

debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-
sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-
sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256
,hmac-sha2-512,hmac-sha1

debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-
sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-
sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256
,hmac-sha2-512,hmac-sha1

debug2: compression ctos: none,zlib@openssh.com,zlib

debug2: compression stoc: none,zlib@openssh.com,zlib

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: peer server KEXINIT proposal

debug2: KEX algorithms: curve25519-sha256@libssh.org,diffie-hellman-group-
exchange-sha256

debug2: host key algorithms: ssh-ed25519,ssh-rsa,rsa-sha2-512,rsa-sha2-256

debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,ae
s128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr

debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,ae
s128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr

debug2: MACs ctos: hmac-sha2-512-etm@openssh.com,hmac-
sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256

debug2: MACs stoc: hmac-sha2-512-etm@openssh.com,hmac-
sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256

debug2: compression ctos: none,zlib@openssh.com

debug2: compression stoc: none,zlib@openssh.com

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: algorithm: curve25519-sha256@libssh.org

debug1: kex: host key algorithm: ssh-ed25519

debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC:
<implicit> compression: none

debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC:
<implicit> compression: none

debug3: send packet: type 30

debug1: expecting SSH2_MSG_KEX_ECDH_REPLY

debug3: receive packet: type 31

debug1: Server host key: ssh-ed25519
SHA256:WqIYRAXWqb8lX8H9NOaJyaeIQyWwHB1pH20HWZtveI4

debug3: hostkeys_foreach: reading file "/Users/danadalis/.ssh/known_hosts"

debug3: record_hostkey: found key type ECDSA in file
/Users/danadalis/.ssh/known_hosts:3

debug3: load_hostkeys: loaded 1 keys from 35.228.230.145

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!

Someone could be eavesdropping on you right now (man-in-the-middle attack)!

It is also possible that a host key has just been changed.

The fingerprint for the ED25519 key sent by the remote host is

SHA256:WqIYRAXWqb8lX8H9NOaJyaeIQyWwHB1pH20HWZtveI4.

Add correct host key in /Users/danadalis/.ssh/known_hosts to get rid of this
message.

Offending ECDSA key in /Users/danadalis/.ssh/known_hosts:3

Challenge/response authentication is disabled to avoid man-in-the-middle
attacks.

Agent forwarding is disabled to avoid man-in-the-middle attacks.

debug3: send packet: type 21

debug2: set_newkeys: mode 1

debug1: rekey after 134217728 blocks

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug3: receive packet: type 21

debug1: SSH2_MSG_NEWKEYS received

debug2: set_newkeys: mode 0

debug1: rekey after 134217728 blocks

debug1: Will attempt key: /Users/danadalis/.ssh/id_rsa RSA
SHA256:EoYtXe0ttSnz8wdWIlkwP/kynX6GN8NLhPDWLfP34N8 explicit agent

debug2: pubkey_prepare: done

debug3: send packet: type 5

debug3: receive packet: type 7

debug1: SSH2_MSG_EXT_INFO received

debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-sha2-256
,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-
sha2-nistp521>

debug3: receive packet: type 6

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug3: send packet: type 50

debug3: receive packet: type 51

debug1: Authentications that can continue: publickey

debug3: start over, passed a different list publickey

debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey

debug3: authmethod_lookup publickey

debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering public key: /Users/danadalis/.ssh/id_rsa RSA
SHA256:EoYtXe0ttSnz8wdWIlkwP/kynX6GN8NLhPDWLfP34N8 explicit agent

debug3: send packet: type 50

debug2: we sent a publickey packet, wait for reply

debug3: receive packet: type 60

debug1: Server accepts key: /Users/danadalis/.ssh/id_rsa RSA
SHA256:EoYtXe0ttSnz8wdWIlkwP/kynX6GN8NLhPDWLfP34N8 explicit agent

debug3: sign_and_send_pubkey: RSA
SHA256:EoYtXe0ttSnz8wdWIlkwP/kynX6GN8NLhPDWLfP34N8

debug3: sign_and_send_pubkey: signing using rsa-sha2-512

debug3: send packet: type 50

debug3: receive packet: type 52

debug1: Authentication succeeded (publickey).

Authenticated to 35.228.230.145 ([35.228.230.145]:22).

debug1: setting up multiplex master socket

debug3: muxserver_listen: temporary control path
/Users/danadalis/.ansible/cp/447fbfbdbe.t33vlyvZXuLhmw9H

debug2: fd 5 setting O_NONBLOCK

debug3: fd 5 is O_NONBLOCK

debug3: fd 5 is O_NONBLOCK

debug1: channel 0: new [/Users/danadalis/.ansible/cp/447fbfbdbe]

debug3: muxserver_listen: mux listener channel 0 fd 5

debug2: fd 3 setting TCP_NODELAY

debug3: ssh_packet_set_tos: set IP_TOS 0x20

debug1: control_persist_detach: backgrounding master process

debug2: control_persist_detach: background process is 77775

debug2: fd 5 setting O_NONBLOCK

debug1: forking to background

debug1: Entering interactive session.

debug1: pledge: id

debug2: set_control_persist_exit_time: schedule exit in 60 seconds

debug1: multiplexing control connection

debug3: fd 6 is O_NONBLOCK

debug3: fd 6 is O_NONBLOCK

debug1: channel 1: new [mux-control]

debug3: channel_post_mux_listener: new mux channel 1 fd 6

debug3: mux_master_read_cb: channel 1: hello sent

debug2: set_control_persist_exit_time: cancel scheduled exit

debug3: mux_master_read_cb: channel 1 packet type 0x00000001 len 4

debug2: mux_master_process_hello: channel 1 slave version 4

debug2: mux_client_hello_exchange: master version 4

debug3: mux_client_forwards: request forwardings: 0 local, 0 remote

debug3: mux_client_request_session: entering

debug3: mux_client_request_alive: entering

debug3: mux_master_read_cb: channel 1 packet type 0x10000004 len 4

debug2: mux_master_process_alive_check: channel 1: alive check

debug3: mux_client_request_alive: done pid = 77777

debug3: mux_client_request_session: session request sent

debug3: mux_master_read_cb: channel 1 packet type 0x10000002 len 76

debug2: mux_master_process_new_session: channel 1: request tty 1, X 0, agent
0, subsys 0, term "xterm-256color", cmd "whoami", env 1

debug3: mux_master_process_new_session: got fds stdin 7, stdout 8, stderr 9

debug2: fd 8 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug1: channel 2: new [client-session]

debug2: mux_master_process_new_session: channel_new: 2 linked to control
channel 1

debug2: channel 2: send open

debug3: send packet: type 90

debug3: receive packet: type 80

debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply
0

debug3: receive packet: type 91

debug2: channel_input_open_confirmation: channel 2: callback start

debug2: client_session2_setup: id 2

debug2: channel 2: request pty-req confirm 1

debug3: send packet: type 98

debug1: Sending environment.

debug1: Sending env LANG = sv_SE.UTF-8

debug2: channel 2: request env confirm 0

debug3: send packet: type 98

debug1: Sending command: whoami

debug2: channel 2: request exec confirm 1

debug3: send packet: type 98

debug3: mux_session_confirm: sending success reply

debug2: channel_input_open_confirmation: channel 2: callback done

debug2: channel 2: open confirm rwindow 0 rmax 32768

debug3: receive packet: type 99

debug2: channel_input_status_confirm: type 99 id 2

debug2: PTY allocation request accepted on channel 2

debug2: channel 2: rcvd adjust 2097152

debug3: receive packet: type 99

debug2: channel_input_status_confirm: type 99 id 2

debug2: exec request accepted on channel 2

debug3: receive packet: type 96

debug2: channel 2: rcvd eof

debug2: channel 2: output open -> drain

debug3: receive packet: type 98

debug1: client_input_channel_req: channel 2 rtype exit-status reply 0

debug3: mux_exit_message: channel 2: exit message, exitval 0

debug3: receive packet: type 98

debug1: client_input_channel_req: channel 2 rtype eow@openssh.com reply 0

debug2: channel 2: rcvd eow

debug2: channel 2: chan_shutdown_read (i0 o1 sock -1 wfd 7 efd 9 [write])

debug2: channel 2: input open -> closed

debug3: receive packet: type 97

debug2: channel 2: rcvd close

debug3: channel 2: will not send data after close

debug3: channel 2: will not send data after close

debug2: channel 2: obuf empty

debug2: channel 2: chan_shutdown_write (i3 o1 sock -1 wfd 8 efd 9 [write])

debug2: channel 2: output drain -> closed

debug2: channel 2: send close

debug3: send packet: type 97

debug2: channel 2: is dead

debug2: channel 2: gc: notify user

debug3: mux_master_session_cleanup_cb: entering for channel 2

debug2: channel 1: rcvd close

debug2: channel 1: output open -> drain

debug2: channel 1: chan_shutdown_read (i0 o1 sock 6 wfd 6 efd -1 [closed])

debug2: channel 1: input open -> closed

debug2: channel 2: gc: user detached

debug2: channel 2: is dead

debug2: channel 2: garbage collecting

debug1: channel 2: free: client-session, nchannels 3

debug3: channel 2: status: The following connections are open:

  #1 mux-control (t16 nr0 i3/0 o1/0 e[closed]/0 fd 6/6/-1 sock 6 cc -1)

  #2 client-session (t4 r0 i3/0 o3/0 e[write]/0 fd -1/-1/9 sock -1 cc -1)



debug2: channel 1: obuf empty

debug2: channel 1: chan_shutdown_write (i3 o1 sock 6 wfd 6 efd -1 [closed])

debug2: channel 1: output drain -> closed

debug2: channel 1: is dead (local)

debug2: channel 1: gc: notify user

debug3: mux_master_control_cleanup_cb: entering for channel 1

debug2: channel 1: gc: user detached

debug2: channel 1: is dead (local)

debug2: channel 1: garbage collecting

debug1: channel 1: free: mux-control, nchannels 2

debug3: channel 1: status: The following connections are open:

  #1 mux-control (t16 nr0 i3/0 o3/0 e[closed]/0 fd 6/6/-1 sock 6 cc -1)



debug3: mux_client_read_packet: read header failed: Broken pipe

debug2: Received exit status from master 0

Shared connection to 35.228.230.145 closed.

debug2: set_control_persist_exit_time: schedule exit in 60 seconds

')
35.228.230.145 | CHANGED | rc=0 >>
web

OpenSSH_7.9p1, LibreSSL 2.7.3

debug1: Reading configuration data /Users/danadalis/.ssh/config

debug1: /Users/danadalis/.ssh/config line 1: Applying options for *

debug1: Reading configuration data /etc/ssh/ssh_config

debug1: /etc/ssh/ssh_config line 48: Applying options for *

debug2: resolve_canonicalize: hostname 35.228.230.145 is address

debug1: auto-mux: Trying existing master

debug1: Control socket "/Users/danadalis/.ansible/cp/447fbfbdbe" does
not exist

debug2: ssh_connect_direct

debug1: Connecting to 35.228.230.145 [35.228.230.145] port 22.

debug2: fd 3 setting O_NONBLOCK

debug1: fd 3 clearing O_NONBLOCK

debug1: Connection established.

debug3: timeout: 9438 ms remain after connect

debug1: identity file /Users/danadalis/.ssh/id_rsa type 0

debug1: identity file /Users/danadalis/.ssh/id_rsa-cert type -1

debug1: Local version string SSH-2.0-OpenSSH_7.9

debug1: Remote protocol version 2.0, remote software version
OpenSSH_7.6p1

debug1: match: OpenSSH_7.6p1 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2
*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat
0x04000002

debug2: fd 3 setting O_NONBLOCK

debug1: Authenticating to 35.228.230.145:22 as 'web'

debug3: hostkeys_foreach: reading file
"/Users/danadalis/.ssh/known_hosts"

debug3: record_hostkey: found key type ECDSA in file
/Users/danadalis/.ssh/known_hosts:3

debug3: load_hostkeys: loaded 1 keys from 35.228.230.145

debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-
sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com
,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-
sha2-nistp384,ecdsa-sha2-nistp521

debug3: send packet: type 20

debug1: SSH2_MSG_KEXINIT sent

debug3: receive packet: type 20

debug1: SSH2_MSG_KEXINIT received

debug2: local client KEXINIT proposal

debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org
,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-
group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-
group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-
info-c

debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com
,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-
sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384
,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-
sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-
cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa

debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-
ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com

debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-
ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com

debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com
,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-
sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256
,hmac-sha2-512,hmac-sha1

debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com
,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-
sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256
,hmac-sha2-512,hmac-sha1

debug2: compression ctos: none,zlib@openssh.com,zlib

debug2: compression stoc: none,zlib@openssh.com,zlib

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug2: peer server KEXINIT proposal

debug2: KEX algorithms: curve25519-sha256@libssh.org,diffie-hellman-
group-exchange-sha256

debug2: host key algorithms: ssh-ed25519,ssh-rsa,rsa-sha2-512,rsa-
sha2-256

debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes256-gcm@openssh
.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr

debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes256-gcm@openssh
.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr

debug2: MACs ctos: hmac-sha2-512-etm@openssh.com,hmac-
sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256

debug2: MACs stoc: hmac-sha2-512-etm@openssh.com,hmac-
sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256

debug2: compression ctos: none,zlib@openssh.com

debug2: compression stoc: none,zlib@openssh.com

debug2: languages ctos:

debug2: languages stoc:

debug2: first_kex_follows 0

debug2: reserved 0

debug1: kex: algorithm: curve25519-sha256@libssh.org

debug1: kex: host key algorithm: ssh-ed25519

debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC:
<implicit> compression: none

debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC:
<implicit> compression: none

debug3: send packet: type 30

debug1: expecting SSH2_MSG_KEX_ECDH_REPLY

debug3: receive packet: type 31

debug1: Server host key: ssh-ed25519
SHA256:WqIYRAXWqb8lX8H9NOaJyaeIQyWwHB1pH20HWZtveI4

debug3: hostkeys_foreach: reading file
"/Users/danadalis/.ssh/known_hosts"

debug3: record_hostkey: found key type ECDSA in file
/Users/danadalis/.ssh/known_hosts:3

debug3: load_hostkeys: loaded 1 keys from 35.228.230.145

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!

Someone could be eavesdropping on you right now (man-in-the-middle
attack)!

It is also possible that a host key has just been changed.

The fingerprint for the ED25519 key sent by the remote host is
SHA256:WqIYRAXWqb8lX8H9NOaJyaeIQyWwHB1pH20HWZtveI4.

Please contact your system administrator.

Add correct host key in /Users/danadalis/.ssh/known_hosts to get rid
of this message.

Offending ECDSA key in /Users/danadalis/.ssh/known_hosts:3

Challenge/response authentication is disabled to avoid man-in-the-
middle attacks.

Agent forwarding is disabled to avoid man-in-the-middle attacks.

debug3: send packet: type 21

debug2: set_newkeys: mode 1

debug1: rekey after 134217728 blocks

debug1: SSH2_MSG_NEWKEYS sent

debug1: expecting SSH2_MSG_NEWKEYS

debug3: receive packet: type 21

debug1: SSH2_MSG_NEWKEYS received

debug2: set_newkeys: mode 0

debug1: rekey after 134217728 blocks

debug1: Will attempt key: /Users/danadalis/.ssh/id_rsa RSA
SHA256:EoYtXe0ttSnz8wdWIlkwP/kynX6GN8NLhPDWLfP34N8 explicit agent

debug2: pubkey_prepare: done

debug3: send packet: type 5

debug3: receive packet: type 7

debug1: SSH2_MSG_EXT_INFO received

debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa-
sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-
sha2-nistp521>

debug3: receive packet: type 6

debug2: service_accept: ssh-userauth

debug1: SSH2_MSG_SERVICE_ACCEPT received

debug3: send packet: type 50

debug3: receive packet: type 51

debug1: Authentications that can continue: publickey

debug3: start over, passed a different list publickey

debug3: preferred gssapi-with-mic,gssapi-keyex,hostbased,publickey

debug3: authmethod_lookup publickey

debug3: remaining preferred: ,gssapi-keyex,hostbased,publickey

debug3: authmethod_is_enabled publickey

debug1: Next authentication method: publickey

debug1: Offering public key: /Users/danadalis/.ssh/id_rsa RSA
SHA256:EoYtXe0ttSnz8wdWIlkwP/kynX6GN8NLhPDWLfP34N8 explicit agent

debug3: send packet: type 50

debug2: we sent a publickey packet, wait for reply

debug3: receive packet: type 60

debug1: Server accepts key: /Users/danadalis/.ssh/id_rsa RSA
SHA256:EoYtXe0ttSnz8wdWIlkwP/kynX6GN8NLhPDWLfP34N8 explicit agent

debug3: sign_and_send_pubkey: RSA
SHA256:EoYtXe0ttSnz8wdWIlkwP/kynX6GN8NLhPDWLfP34N8

debug3: sign_and_send_pubkey: signing using rsa-sha2-512

debug3: send packet: type 50

debug3: receive packet: type 52

debug1: Authentication succeeded (publickey).

Authenticated to 35.228.230.145 ([35.228.230.145]:22).

debug1: setting up multiplex master socket

debug3: muxserver_listen: temporary control path
/Users/danadalis/.ansible/cp/447fbfbdbe.t33vlyvZXuLhmw9H

debug2: fd 5 setting O_NONBLOCK

debug3: fd 5 is O_NONBLOCK

debug3: fd 5 is O_NONBLOCK

debug1: channel 0: new [/Users/danadalis/.ansible/cp/447fbfbdbe]

debug3: muxserver_listen: mux listener channel 0 fd 5

debug2: fd 3 setting TCP_NODELAY

debug3: ssh_packet_set_tos: set IP_TOS 0x20

debug1: control_persist_detach: backgrounding master process

debug2: control_persist_detach: background process is 77775

debug2: fd 5 setting O_NONBLOCK

debug1: forking to background

debug1: Entering interactive session.

debug1: pledge: id

debug2: set_control_persist_exit_time: schedule exit in 60 seconds

debug1: multiplexing control connection

debug3: fd 6 is O_NONBLOCK

debug3: fd 6 is O_NONBLOCK

debug1: channel 1: new [mux-control]

debug3: channel_post_mux_listener: new mux channel 1 fd 6

debug3: mux_master_read_cb: channel 1: hello sent

debug2: set_control_persist_exit_time: cancel scheduled exit

debug3: mux_master_read_cb: channel 1 packet type 0x00000001 len 4

debug2: mux_master_process_hello: channel 1 slave version 4

debug2: mux_client_hello_exchange: master version 4

debug3: mux_client_forwards: request forwardings: 0 local, 0 remote

debug3: mux_client_request_session: entering

debug3: mux_client_request_alive: entering

debug3: mux_master_read_cb: channel 1 packet type 0x10000004 len 4

debug2: mux_master_process_alive_check: channel 1: alive check

debug3: mux_client_request_alive: done pid = 77777

debug3: mux_client_request_session: session request sent

debug3: mux_master_read_cb: channel 1 packet type 0x10000002 len 76

debug2: mux_master_process_new_session: channel 1: request tty 1, X 0,
agent 0, subsys 0, term "xterm-256color", cmd "whoami", env 1

debug3: mux_master_process_new_session: got fds stdin 7, stdout 8,
stderr 9

debug2: fd 8 setting O_NONBLOCK

debug2: fd 9 setting O_NONBLOCK

debug1: channel 2: new [client-session]

debug2: mux_master_process_new_session: channel_new: 2 linked to
control channel 1

debug2: channel 2: send open

debug3: send packet: type 90

debug3: receive packet: type 80

debug1: client_input_global_request: rtype hostkeys-00@openssh.com
want_reply 0

debug3: receive packet: type 91

debug2: channel_input_open_confirmation: channel 2: callback start

debug2: client_session2_setup: id 2

debug2: channel 2: request pty-req confirm 1

debug3: send packet: type 98

debug1: Sending environment.

debug1: Sending env LANG = sv_SE.UTF-8

debug2: channel 2: request env confirm 0

debug3: send packet: type 98

debug1: Sending command: whoami

debug2: channel 2: request exec confirm 1

debug3: send packet: type 98

debug3: mux_session_confirm: sending success reply

debug2: channel_input_open_confirmation: channel 2: callback done

debug2: channel 2: open confirm rwindow 0 rmax 32768

debug3: receive packet: type 99

debug2: channel_input_status_confirm: type 99 id 2

debug2: PTY allocation request accepted on channel 2

debug2: channel 2: rcvd adjust 2097152

debug3: receive packet: type 99

debug2: channel_input_status_confirm: type 99 id 2

debug2: exec request accepted on channel 2

debug3: receive packet: type 96

debug2: channel 2: rcvd eof

debug2: channel 2: output open -> drain

debug3: receive packet: type 98

debug1: client_input_channel_req: channel 2 rtype exit-status reply 0

debug3: mux_exit_message: channel 2: exit message, exitval 0

debug3: receive packet: type 98

debug1: client_input_channel_req: channel 2 rtype eow@openssh.com
reply 0

debug2: channel 2: rcvd eow

debug2: channel 2: chan_shutdown_read (i0 o1 sock -1 wfd 7 efd 9
[write])

debug2: channel 2: input open -> closed

debug3: receive packet: type 97

debug2: channel 2: rcvd close

debug3: channel 2: will not send data after close

debug3: channel 2: will not send data after close

debug2: channel 2: obuf empty

debug2: channel 2: chan_shutdown_write (i3 o1 sock -1 wfd 8 efd 9
[write])

debug2: channel 2: output drain -> closed

debug2: channel 2: send close

debug3: send packet: type 97

debug2: channel 2: is dead

debug2: channel 2: gc: notify user

debug3: mux_master_session_cleanup_cb: entering for channel 2

debug2: channel 1: rcvd close

debug2: channel 1: output open -> drain

debug2: channel 1: chan_shutdown_read (i0 o1 sock 6 wfd 6 efd -1
[closed])

debug2: channel 1: input open -> closed

debug2: channel 2: gc: user detached

debug2: channel 2: is dead

debug2: channel 2: garbage collecting

debug1: channel 2: free: client-session, nchannels 3

debug3: channel 2: status: The following connections are open:

  #1 mux-control (t16 nr0 i3/0 o1/0 e[closed]/0 fd 6/6/-1 sock 6 cc
-1)

  #2 client-session (t4 r0 i3/0 o3/0 e[write]/0 fd -1/-1/9 sock -1 cc
-1)



debug2: channel 1: obuf empty

debug2: channel 1: chan_shutdown_write (i3 o1 sock 6 wfd 6 efd -1
[closed])

debug2: channel 1: output drain -> closed

debug2: channel 1: is dead (local)

debug2: channel 1: gc: notify user

debug3: mux_master_control_cleanup_cb: entering for channel 1

debug2: channel 1: gc: user detached

debug2: channel 1: is dead (local)

debug2: channel 1: garbage collecting

debug1: channel 1: free: mux-control, nchannels 2

debug3: channel 1: status: The following connections are open:

  #1 mux-control (t16 nr0 i3/0 o3/0 e[closed]/0 fd 6/6/-1 sock 6 cc
-1)



debug3: mux_client_read_packet: read header failed: Broken pipe

debug2: Received exit status from master 0

Shared connection to 35.228.230.145 closed.

debug2: set_control_persist_exit_time: schedule exit in 60 seconds



META: ran handlers
META: ran handlers

fatal: [35.228.230.145]: FAILED! => {"changed": false}

PLAY RECAP *********************************************************************************************************************************************************
35.228.230.145             : ok=1    changed=0    unreachable=0    failed=1    skipped=2    rescued=0    ignored=0   
localhost                  : ok=0    changed=0    unreachable=0    failed=0    skipped=1    rescued=0    ignored=0   

danadalis@Daniels-MacBook-Pro-2 trellis %

Within your debug output:

It could be that you’ve connected to this server before, added the ECDSA key. And then after accepting that key maybe you have destroyed the box, and provisioned a new machine generating a new ECDSA key on the server but not cleaning up the existing one on your local machine.

This security measure isn’t specific to Trellis or Ansible but is specific to SSH behaviour and handshakes

Related troubleshooting documentation: https://roots.io/trellis/docs/troubleshooting/#host-key-change

I deleted the known hosts and then it works.

Not related to this particular issue, but for every trellis project, I do the following:

cd trellis
virtualenv ansible
source ansible/bin/activate
pip install ansible

This creates a python virtual environment and then installs ansible in it. This prevents new trellis projects that have a new ansible requirement from conflicting with each other in the future and just makes ansible easy to manage/install.

When I need to deploy, I make sure to:

cd trellis
source ansible/bin/activate
bin/deploy.sh production nicesite.com

It’s saved me a lot of headaches.

1 Like

This topic was automatically closed after 42 days. New replies are no longer allowed.