Created
April 12, 2014 07:53
-
-
Save higebu/10523755 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2014/04/12 16:47:18 reconnecting to TCP connection for SSH | |
2014/04/12 16:47:18 handshaking with SSH | |
2014/04/12 16:47:18 server got *ssh.kexInitMsg &{[138 50 254 99 19 130 12 216 249 62 92 107 179 1 121 249] [ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1] [[email protected] [email protected] [email protected] [email protected] [email protected] ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 ssh-rsa ssh-dss] [aes128-ctr aes192-ctr aes256-ctr [email protected] arcfour256 arcfour128] [aes128-ctr aes192-ctr aes256-ctr [email protected] arcfour256 arcfour128] [hmac-sha1 hmac-sha1-96] [hmac-sha1 hmac-sha1-96] [none] [none] [] [] false 0} (<nil>) | |
2014/04/12 16:47:18 server entered key exchange | |
2014/04/12 16:47:18 client got *ssh.kexInitMsg &{[107 66 169 30 193 212 26 78 72 25 122 217 123 78 8 98] [ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group14-sha1 diffie-hellman-group1-sha1] [ssh-rsa] [aes128-ctr aes192-ctr aes256-ctr [email protected] arcfour256 arcfour128] [aes128-ctr aes192-ctr aes256-ctr [email protected] arcfour256 arcfour128] [hmac-sha1 hmac-sha1-96] [hmac-sha1 hmac-sha1-96] [none] [none] [] [] false 0} (<nil>) | |
2014/04/12 16:47:18 client entered key exchange | |
2014/04/12 16:47:18 client exited key exchange, err <nil> | |
2014/04/12 16:47:18 server exited key exchange, err <nil> | |
2014/04/12 16:47:18 server got *ssh.serviceRequestMsg &{ssh-userauth} (<nil>) | |
2014/04/12 16:47:18 client got *ssh.serviceAcceptMsg &{ssh-userauth} (<nil>) | |
2014/04/12 16:47:18 server got *ssh.userAuthRequestMsg &{user ssh-connection none []} (<nil>) | |
2014/04/12 16:47:18 client got *ssh.userAuthFailureMsg &{[password] false} (<nil>) | |
2014/04/12 16:47:18 server got *ssh.userAuthRequestMsg &{user ssh-connection password [0 0 0 0 12 105 45 97 109 45 105 110 118 97 108 105 100]} (<nil>) | |
2014/04/12 16:47:18 client got *ssh.userAuthFailureMsg &{[password] false} (<nil>) | |
2014/04/12 16:47:18 handshake error: ssh: handshake failed: ssh: unable to authenticate, attempted methods [none password], no supported methods remain | |
panic: runtime error: invalid memory address or nil pointer dereference | |
[signal 0xb code=0x1 addr=0x68 pc=0x4c9531] | |
goroutine 11 [running]: | |
runtime.panic(0x6120a0, 0x8dea68) | |
/usr/local/go/src/pkg/runtime/panic.c:266 +0xb6 | |
code.google.com/p/go.crypto/ssh.func·003() | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/client.go:57 +0x31 | |
created by code.google.com/p/go.crypto/ssh.NewClient | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/client.go:59 +0x10c | |
goroutine 1 [runnable]: | |
testing.RunTests(0x6ca7b8, 0x8dd060, 0x5, 0x5, 0x1) | |
/usr/local/go/src/pkg/testing/testing.go:472 +0x8d5 | |
testing.Main(0x6ca7b8, 0x8dd060, 0x5, 0x5, 0x8e1bc0, ...) | |
/usr/local/go/src/pkg/testing/testing.go:403 +0x84 | |
main.main() | |
github.com/mitchellh/packer/communicator/ssh/_test/_testmain.go:55 +0x9c | |
goroutine 3 [syscall]: | |
os/signal.loop() | |
/usr/local/go/src/pkg/os/signal/signal_unix.go:21 +0x1e | |
created by os/signal.init·1 | |
/usr/local/go/src/pkg/os/signal/signal_unix.go:27 +0x31 | |
goroutine 6 [chan receive]: | |
code.google.com/p/go.crypto/ssh.(*connection).serverAuthenticate(0xc21007fc80, 0xc2100b05a0, 0x11, 0x40, 0x0) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/server.go:262 +0x78 | |
code.google.com/p/go.crypto/ssh.(*connection).serverHandshake(0xc21007fc80, 0xc2100b05a0, 0xc210095000, 0x7f6ba1f80020, 0x7f6ba1f80000) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/server.go:209 +0x6a1 | |
code.google.com/p/go.crypto/ssh.NewServerConn(0x7f6ba1f8ac80, 0xc210000200, 0x8e2fa0, 0x0, 0x0, ...) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/server.go:145 +0xb0 | |
github.com/mitchellh/packer/communicator/ssh.func·013() | |
/home/yuya/go/src/github.com/mitchellh/packer/communicator/ssh/communicator_test.go:74 +0x1e0 | |
created by github.com/mitchellh/packer/communicator/ssh.newMockLineServer | |
/home/yuya/go/src/github.com/mitchellh/packer/communicator/ssh/communicator_test.go:92 +0x185 | |
goroutine 8 [IO wait]: | |
net.runtime_pollWait(0x7f6ba1f8aa88, 0x72, 0x0) | |
/usr/local/go/src/pkg/runtime/netpoll.goc:116 +0x6a | |
net.(*pollDesc).Wait(0xc210095060, 0x72, 0x7f6ba1f89388, 0xb) | |
/usr/local/go/src/pkg/net/fd_poll_runtime.go:81 +0x34 | |
net.(*pollDesc).WaitRead(0xc210095060, 0xb, 0x7f6ba1f89388) | |
/usr/local/go/src/pkg/net/fd_poll_runtime.go:86 +0x30 | |
net.(*netFD).Read(0xc210095000, 0xc21009d000, 0x1000, 0x1000, 0x0, ...) | |
/usr/local/go/src/pkg/net/fd_unix.go:204 +0x2a0 | |
net.(*conn).Read(0xc210000200, 0xc21009d000, 0x1000, 0x1000, 0x1, ...) | |
/usr/local/go/src/pkg/net/net.go:122 +0xc5 | |
bufio.(*Reader).fill(0xc210089cc0) | |
/usr/local/go/src/pkg/bufio/bufio.go:91 +0x110 | |
bufio.(*Reader).Read(0xc210089cc0, 0xc21006c920, 0x5, 0x5, 0x5, ...) | |
/usr/local/go/src/pkg/bufio/bufio.go:159 +0x1a4 | |
io.ReadAtLeast(0x7f6ba1f8ae90, 0xc210089cc0, 0xc21006c920, 0x5, 0x5, ...) | |
/usr/local/go/src/pkg/io/io.go:288 +0xf6 | |
io.ReadFull(0x7f6ba1f8ae90, 0xc210089cc0, 0xc21006c920, 0x5, 0x5, ...) | |
/usr/local/go/src/pkg/io/io.go:306 +0x71 | |
code.google.com/p/go.crypto/ssh.(*streamPacketCipher).readPacket(0xc21006c900, 0xc200000006, 0x7f6ba1f8ae90, 0xc210089cc0, 0x7f6bffffffff, ...) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/cipher.go:131 +0xa4 | |
code.google.com/p/go.crypto/ssh.(*connectionState).readPacket(0xc210061480, 0xc210089cc0, 0xc2100eb6c0, 0x83, 0x0, ...) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/transport.go:110 +0x74 | |
code.google.com/p/go.crypto/ssh.(*transport).readPacket(0xc210061480, 0x11, 0x7f6ba1e0df18, 0x4, 0x40b448, ...) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/transport.go:106 +0x3a | |
code.google.com/p/go.crypto/ssh.(*handshakeTransport).readOnePacket(0xc21005b2d0, 0xc210098400, 0xc2100d85c0, 0x38, 0x38, ...) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/handshake.go:153 +0xae | |
code.google.com/p/go.crypto/ssh.(*handshakeTransport).readLoop(0xc21005b2d0) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/handshake.go:133 +0x27 | |
created by code.google.com/p/go.crypto/ssh.newServerTransport | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/handshake.go:108 +0xd9 | |
goroutine 9 [chan receive (nil chan)]: | |
code.google.com/p/go.crypto/ssh.(*Client).handleGlobalRequests(0xc2100d8680, 0x0) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/client.go:133 +0x3a | |
created by code.google.com/p/go.crypto/ssh.NewClient | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/client.go:54 +0xbb | |
goroutine 10 [chan receive (nil chan)]: | |
code.google.com/p/go.crypto/ssh.(*Client).handleChannelOpens(0xc2100d8680, 0x0) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/client.go:142 +0x45 | |
created by code.google.com/p/go.crypto/ssh.NewClient | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/client.go:55 +0xdf | |
goroutine 12 [runnable]: | |
code.google.com/p/go.crypto/ssh.(*forwardList).handleChannels(0xc2100d8690, 0xc210053420) | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/tcpip.go:157 | |
created by code.google.com/p/go.crypto/ssh.NewClient | |
/home/yuya/go/src/code.google.com/p/go.crypto/ssh/client.go:60 +0x15e | |
FAIL github.com/mitchellh/packer/communicator/ssh 0.140s |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment