ansible-playbook [core 2.17.12] config file = None configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/local/lib/python3.12/site-packages/ansible ansible collection location = /tmp/collections-id0 executable location = /usr/local/bin/ansible-playbook python version = 3.12.10 (main, Apr 22 2025, 00:00:00) [GCC 14.2.1 20250110 (Red Hat 14.2.1-7)] (/usr/bin/python3.12) jinja version = 3.1.5 libyaml = True No config file found; using defaults running playbook inside collection fedora.linux_system_roles Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'json', as we already have a stdout callback. Skipping callback 'jsonl', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_reboot.yml ***************************************************** 1 plays in /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml PLAY [Ensure we can set crypto policy including reboot of the system] ********** TASK [Gathering Facts] ********************************************************* task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:3 Saturday 31 May 2025 00:26:55 -0400 (0:00:00.028) 0:00:00.028 ********** [WARNING]: Platform linux on host managed-node2 is using the discovered Python interpreter at /usr/bin/python3.12, but future installation of another Python interpreter could change the meaning of that path. See https://docs.ansible.com/ansible- core/2.17/reference_appendices/interpreter_discovery.html for more information. ok: [managed-node2] TASK [Ensure we can set crypto policy including reboot of the system] ********** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:11 Saturday 31 May 2025 00:26:56 -0400 (0:00:01.261) 0:00:01.289 ********** included: fedora.linux_system_roles.crypto_policies for managed-node2 TASK [fedora.linux_system_roles.crypto_policies : Set platform/version specific variables] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:3 Saturday 31 May 2025 00:26:56 -0400 (0:00:00.064) 0:00:01.354 ********** included: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml for managed-node2 TASK [fedora.linux_system_roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:2 Saturday 31 May 2025 00:26:56 -0400 (0:00:00.034) 0:00:01.388 ********** skipping: [managed-node2] => { "changed": false, "false_condition": "__crypto_policies_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.crypto_policies : Check if system is ostree] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:10 Saturday 31 May 2025 00:26:56 -0400 (0:00:00.074) 0:00:01.462 ********** ok: [managed-node2] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:15 Saturday 31 May 2025 00:26:57 -0400 (0:00:00.545) 0:00:02.007 ********** ok: [managed-node2] => { "ansible_facts": { "__crypto_policies_is_ostree": false }, "changed": false } TASK [fedora.linux_system_roles.crypto_policies : Check if transactional-update exists in /sbin] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:22 Saturday 31 May 2025 00:26:57 -0400 (0:00:00.023) 0:00:02.030 ********** ok: [managed-node2] => { "changed": false, "stat": { "exists": false } } TASK [fedora.linux_system_roles.crypto_policies : Set flag if transactional-update exists] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:27 Saturday 31 May 2025 00:26:57 -0400 (0:00:00.408) 0:00:02.439 ********** ok: [managed-node2] => { "ansible_facts": { "__crypto_policies_is_transactional": false }, "changed": false } TASK [fedora.linux_system_roles.crypto_policies : Set platform/version specific variables] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:31 Saturday 31 May 2025 00:26:57 -0400 (0:00:00.022) 0:00:02.462 ********** skipping: [managed-node2] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vars_file is file", "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [managed-node2] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vars_file is file", "item": "CentOS.yml", "skip_reason": "Conditional result was False" } skipping: [managed-node2] => (item=CentOS_10.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vars_file is file", "item": "CentOS_10.yml", "skip_reason": "Conditional result was False" } skipping: [managed-node2] => (item=CentOS_10.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vars_file is file", "item": "CentOS_10.yml", "skip_reason": "Conditional result was False" } skipping: [managed-node2] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.crypto_policies : Ensure required packages are installed] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6 Saturday 31 May 2025 00:26:57 -0400 (0:00:00.041) 0:00:02.503 ********** ok: [managed-node2] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do lsrpackages: crypto-policies crypto-policies-scripts TASK [fedora.linux_system_roles.crypto_policies : Notify user that reboot is needed to apply changes] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:18 Saturday 31 May 2025 00:26:58 -0400 (0:00:01.047) 0:00:03.550 ********** skipping: [managed-node2] => { "false_condition": "__crypto_policies_is_transactional | d(false)" } TASK [fedora.linux_system_roles.crypto_policies : Reboot transactional update systems] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:23 Saturday 31 May 2025 00:26:58 -0400 (0:00:00.050) 0:00:03.601 ********** skipping: [managed-node2] => { "changed": false, "false_condition": "__crypto_policies_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.crypto_policies : Fail if reboot is needed and not set] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:28 Saturday 31 May 2025 00:26:58 -0400 (0:00:00.051) 0:00:03.653 ********** skipping: [managed-node2] => { "changed": false, "false_condition": "__crypto_policies_is_transactional | d(false)", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.crypto_policies : Gather facts] **************** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:36 Saturday 31 May 2025 00:26:58 -0400 (0:00:00.050) 0:00:03.703 ********** included: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml for managed-node2 TASK [fedora.linux_system_roles.crypto_policies : Find out what is the currently active policy] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:3 Saturday 31 May 2025 00:26:58 -0400 (0:00:00.032) 0:00:03.736 ********** ok: [managed-node2] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.071041", "end": "2025-05-31 00:26:59.472318", "rc": 0, "start": "2025-05-31 00:26:59.401277" } STDOUT: DEFAULT TASK [fedora.linux_system_roles.crypto_policies : Set current policy fact] ***** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:9 Saturday 31 May 2025 00:26:59 -0400 (0:00:00.649) 0:00:04.385 ********** ok: [managed-node2] => { "ansible_facts": { "crypto_policies_active": "DEFAULT" }, "changed": false } TASK [fedora.linux_system_roles.crypto_policies : Find base policies files] **** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:39 Saturday 31 May 2025 00:26:59 -0400 (0:00:00.028) 0:00:04.413 ********** ok: [managed-node2] => { "changed": false, "examined": 7, "files": [ { "atime": 1747221245.383, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 124926, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/DEFAULT.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 3037, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 124927, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/EMPTY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 277, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 124928, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FIPS.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2274, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 124929, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/FUTURE.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2934, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 124930, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/LEGACY.pol", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 3307, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 5, "skipped_paths": {} } MSG: All paths examined TASK [fedora.linux_system_roles.crypto_policies : Set available base policies fact] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:47 Saturday 31 May 2025 00:27:00 -0400 (0:00:00.516) 0:00:04.930 ********** ok: [managed-node2] => { "ansible_facts": { "crypto_policies_available_policies": [ "DEFAULT", "EMPTY", "FIPS", "FUTURE", "LEGACY" ] }, "changed": false } TASK [fedora.linux_system_roles.crypto_policies : Find subpolicy files] ******** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:54 Saturday 31 May 2025 00:27:00 -0400 (0:00:00.038) 0:00:04.968 ********** ok: [managed-node2] => { "changed": false, "examined": 6, "files": [ { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 4333014, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/AD-SUPPORT.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 283, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 4333015, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/ECDHE-ONLY.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 136, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 4333016, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-ENFORCE-EMS.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 248, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 4333017, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/NO-PQ.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 302, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 4333018, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/OSPP.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 2014, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false }, { "atime": 1745579105.0, "ctime": 1747221083.77, "dev": 51714, "gid": 0, "gr_name": "root", "inode": 4333019, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mode": "0644", "mtime": 1745579105.0, "nlink": 1, "path": "/usr/share/crypto-policies/policies/modules/TEST-PQ.pmod", "pw_name": "root", "rgrp": true, "roth": true, "rusr": true, "size": 901, "uid": 0, "wgrp": false, "woth": false, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } ], "matched": 6, "skipped_paths": {} } MSG: All paths examined TASK [fedora.linux_system_roles.crypto_policies : Set available subpolicies fact] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:62 Saturday 31 May 2025 00:27:00 -0400 (0:00:00.415) 0:00:05.383 ********** ok: [managed-node2] => { "ansible_facts": { "crypto_policies_available_subpolicies": [ "AD-SUPPORT", "ECDHE-ONLY", "NO-ENFORCE-EMS", "NO-PQ", "OSPP", "TEST-PQ" ] }, "changed": false } TASK [fedora.linux_system_roles.crypto_policies : Set crypto_policies_available_modules fact (deprecated)] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:69 Saturday 31 May 2025 00:27:00 -0400 (0:00:00.058) 0:00:05.442 ********** ok: [managed-node2] => { "ansible_facts": { "crypto_policies_available_modules": [ "AD-SUPPORT", "ECDHE-ONLY", "NO-ENFORCE-EMS", "NO-PQ", "OSPP", "TEST-PQ" ] }, "changed": false } TASK [fedora.linux_system_roles.crypto_policies : Update crypto policy if needed] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:75 Saturday 31 May 2025 00:27:00 -0400 (0:00:00.026) 0:00:05.469 ********** Notification for handler __crypto_policies_handler_modified has been saved. changed: [managed-node2] => { "changed": true, "cmd": [ "update-crypto-policies", "--set", "FUTURE" ], "delta": "0:00:00.226697", "end": "2025-05-31 00:27:01.222727", "rc": 0, "start": "2025-05-31 00:27:00.996030" } STDOUT: Setting system policy to FUTURE Note: System-wide crypto policies are applied on application start-up. It is recommended to restart the system for the change of policies to fully take place. TASK [fedora.linux_system_roles.crypto_policies : Set the reboot_required flag if needed] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:87 Saturday 31 May 2025 00:27:01 -0400 (0:00:00.662) 0:00:06.131 ********** ok: [managed-node2] => { "ansible_facts": { "crypto_policies_reboot_required": true }, "changed": false } TASK [fedora.linux_system_roles.crypto_policies : Update facts after applying policy] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:95 Saturday 31 May 2025 00:27:01 -0400 (0:00:00.025) 0:00:06.157 ********** included: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml for managed-node2 TASK [fedora.linux_system_roles.crypto_policies : Find out what is the currently active policy] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:3 Saturday 31 May 2025 00:27:01 -0400 (0:00:00.022) 0:00:06.179 ********** ok: [managed-node2] => { "changed": false, "cmd": [ "update-crypto-policies", "--show" ], "delta": "0:00:00.080220", "end": "2025-05-31 00:27:01.763370", "rc": 0, "start": "2025-05-31 00:27:01.683150" } STDOUT: FUTURE TASK [fedora.linux_system_roles.crypto_policies : Set current policy fact] ***** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:9 Saturday 31 May 2025 00:27:01 -0400 (0:00:00.484) 0:00:06.663 ********** ok: [managed-node2] => { "ansible_facts": { "crypto_policies_active": "FUTURE" }, "changed": false } TASK [Flush handlers] ********************************************************** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:19 Saturday 31 May 2025 00:27:01 -0400 (0:00:00.020) 0:00:06.684 ********** NOTIFIED HANDLER fedora.linux_system_roles.crypto_policies : Reboot the managed host to apply crypto policies changes for managed-node2 NOTIFIED HANDLER fedora.linux_system_roles.crypto_policies : Clear the crypto_policies_reboot_required flag for managed-node2 META: triggered running handlers for managed-node2 RUNNING HANDLER [fedora.linux_system_roles.crypto_policies : Reboot the managed host to apply crypto policies changes] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/handlers/main.yml:4 Saturday 31 May 2025 00:27:01 -0400 (0:00:00.002) 0:00:06.687 ********** fatal: [managed-node2]: FAILED! => {} MSG: Failed to connect to the host via ssh: OpenSSH_9.9p1, OpenSSL 3.5.0 8 Apr 2025 debug1: Reading configuration data /root/.ssh/config debug1: Reading configuration data /etc/ssh/ssh_config debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf debug2: checking match for 'final all' host 10.31.11.6 originally 10.31.11.6 debug2: match not found debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config debug1: configuration requests final Match pass debug2: resolve_canonicalize: hostname 10.31.11.6 is address debug1: re-parsing configuration debug1: Reading configuration data /root/.ssh/config debug1: Reading configuration data /etc/ssh/ssh_config debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf debug2: checking match for 'final all' host 10.31.11.6 originally 10.31.11.6 debug2: match found debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config debug1: auto-mux: Trying existing master at '/root/.ansible/cp/ac5783089c' debug1: Control socket "/root/.ansible/cp/ac5783089c" does not exist debug1: Connecting to 10.31.11.6 [10.31.11.6] port 22. debug2: fd 3 setting O_NONBLOCK debug1: fd 3 clearing O_NONBLOCK debug1: Connection established. debug1: identity file /root/.ssh/id_rsa type -1 debug1: identity file /root/.ssh/id_rsa-cert type -1 debug1: identity file /root/.ssh/id_ecdsa type -1 debug1: identity file /root/.ssh/id_ecdsa-cert type -1 debug1: identity file /root/.ssh/id_ecdsa_sk type -1 debug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1 debug1: identity file /root/.ssh/id_ed25519 type -1 debug1: identity file /root/.ssh/id_ed25519-cert type -1 debug1: identity file /root/.ssh/id_ed25519_sk type -1 debug1: identity file /root/.ssh/id_ed25519_sk-cert type -1 debug1: identity file /root/.ssh/id_xmss type -1 debug1: identity file /root/.ssh/id_xmss-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.9 debug1: Remote protocol version 2.0, remote software version OpenSSH_9.9 debug1: compat_banner: match: OpenSSH_9.9 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to 10.31.11.6:22 as 'root' debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256 debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 debug2: compression ctos: zlib@openssh.com,none debug2: compression stoc: zlib@openssh.com,none debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-s,kex-strict-s-v00@openssh.com debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512 debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512 debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: mlkem768x25519-sha256 debug1: kex: host key algorithm: ssh-ed25519 debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: compression: zlib@openssh.com debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: compression: zlib@openssh.com debug1: kex: mlkem768x25519-sha256 need=32 dh_need=32 debug1: kex: mlkem768x25519-sha256 need=32 dh_need=32 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-ed25519 SHA256:knEQSjuQYq6wocaVt3n4Aq7Elb0aDcZGCAdv6YagxRs debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host '10.31.11.6' is known and matches the ED25519 host key. debug1: Found key in /root/.ssh/known_hosts:2 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug2: ssh_set_newkeys: mode 1 debug1: rekey out after 4294967296 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks debug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256 debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 debug2: compression ctos: zlib@openssh.com,none debug2: compression stoc: zlib@openssh.com,none debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password debug1: Next authentication method: gssapi-with-mic debug1: No credentials were supplied, or the credentials were unavailable or inaccessible No Kerberos credentials available (default cache: KCM:) debug1: No credentials were supplied, or the credentials were unavailable or inaccessible No Kerberos credentials available (default cache: KCM:) debug2: we did not send a packet, disable method debug1: Next authentication method: publickey debug1: Will attempt key: /root/.ssh/id_rsa debug1: Will attempt key: /root/.ssh/id_ecdsa debug1: Will attempt key: /root/.ssh/id_ecdsa_sk debug1: Will attempt key: /root/.ssh/id_ed25519 debug1: Will attempt key: /root/.ssh/id_ed25519_sk debug1: Will attempt key: /root/.ssh/id_xmss debug2: pubkey_prepare: done debug1: Trying private key: /root/.ssh/id_rsa debug2: we sent a publickey packet, wait for reply debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password debug1: Trying private key: /root/.ssh/id_ecdsa debug1: Trying private key: /root/.ssh/id_ecdsa_sk debug1: Trying private key: /root/.ssh/id_ed25519 debug1: Trying private key: /root/.ssh/id_ed25519_sk debug1: Trying private key: /root/.ssh/id_xmss debug2: we did not send a packet, disable method debug1: No more authentication methods to try. root@10.31.11.6: Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password). TASK [Restore policy to DEFAULT] *********************************************** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:29 Saturday 31 May 2025 00:37:05 -0400 (0:10:03.669) 0:10:10.357 ********** included: fedora.linux_system_roles.crypto_policies for managed-node2 TASK [fedora.linux_system_roles.crypto_policies : Set platform/version specific variables] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:3 Saturday 31 May 2025 00:37:05 -0400 (0:00:00.040) 0:10:10.398 ********** included: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml for managed-node2 TASK [fedora.linux_system_roles.crypto_policies : Ensure ansible_facts used by role] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:2 Saturday 31 May 2025 00:37:05 -0400 (0:00:00.020) 0:10:10.418 ********** skipping: [managed-node2] => { "changed": false, "false_condition": "__crypto_policies_required_facts | difference(ansible_facts.keys() | list) | length > 0", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.crypto_policies : Check if system is ostree] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:10 Saturday 31 May 2025 00:37:05 -0400 (0:00:00.032) 0:10:10.451 ********** skipping: [managed-node2] => { "changed": false, "false_condition": "not __crypto_policies_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.crypto_policies : Set flag to indicate system is ostree] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:15 Saturday 31 May 2025 00:37:05 -0400 (0:00:00.018) 0:10:10.469 ********** skipping: [managed-node2] => { "changed": false, "false_condition": "not __crypto_policies_is_ostree is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.crypto_policies : Check if transactional-update exists in /sbin] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:22 Saturday 31 May 2025 00:37:05 -0400 (0:00:00.017) 0:10:10.487 ********** skipping: [managed-node2] => { "changed": false, "false_condition": "not __crypto_policies_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.crypto_policies : Set flag if transactional-update exists] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:27 Saturday 31 May 2025 00:37:05 -0400 (0:00:00.018) 0:10:10.505 ********** skipping: [managed-node2] => { "changed": false, "false_condition": "not __crypto_policies_is_transactional is defined", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.crypto_policies : Set platform/version specific variables] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:31 Saturday 31 May 2025 00:37:05 -0400 (0:00:00.017) 0:10:10.522 ********** skipping: [managed-node2] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vars_file is file", "item": "RedHat.yml", "skip_reason": "Conditional result was False" } skipping: [managed-node2] => (item=CentOS.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vars_file is file", "item": "CentOS.yml", "skip_reason": "Conditional result was False" } skipping: [managed-node2] => (item=CentOS_10.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vars_file is file", "item": "CentOS_10.yml", "skip_reason": "Conditional result was False" } skipping: [managed-node2] => (item=CentOS_10.yml) => { "ansible_loop_var": "item", "changed": false, "false_condition": "__vars_file is file", "item": "CentOS_10.yml", "skip_reason": "Conditional result was False" } skipping: [managed-node2] => { "changed": false } MSG: All items skipped TASK [fedora.linux_system_roles.crypto_policies : Ensure required packages are installed] *** task path: /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6 Saturday 31 May 2025 00:37:05 -0400 (0:00:00.031) 0:10:10.554 ********** fatal: [managed-node2]: UNREACHABLE! => { "changed": false, "unreachable": true } MSG: Failed to connect to the host via ssh: OpenSSH_9.9p1, OpenSSL 3.5.0 8 Apr 2025 debug1: Reading configuration data /root/.ssh/config debug1: Reading configuration data /etc/ssh/ssh_config debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf debug2: checking match for 'final all' host 10.31.11.6 originally 10.31.11.6 debug2: match not found debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config debug1: configuration requests final Match pass debug2: resolve_canonicalize: hostname 10.31.11.6 is address debug1: re-parsing configuration debug1: Reading configuration data /root/.ssh/config debug1: Reading configuration data /etc/ssh/ssh_config debug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf debug2: checking match for 'final all' host 10.31.11.6 originally 10.31.11.6 debug2: match found debug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config debug1: auto-mux: Trying existing master at '/root/.ansible/cp/ac5783089c' debug1: Control socket "/root/.ansible/cp/ac5783089c" does not exist debug1: Connecting to 10.31.11.6 [10.31.11.6] port 22. debug2: fd 3 setting O_NONBLOCK debug1: fd 3 clearing O_NONBLOCK debug1: Connection established. debug1: identity file /root/.ssh/id_rsa type -1 debug1: identity file /root/.ssh/id_rsa-cert type -1 debug1: identity file /root/.ssh/id_ecdsa type -1 debug1: identity file /root/.ssh/id_ecdsa-cert type -1 debug1: identity file /root/.ssh/id_ecdsa_sk type -1 debug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1 debug1: identity file /root/.ssh/id_ed25519 type -1 debug1: identity file /root/.ssh/id_ed25519-cert type -1 debug1: identity file /root/.ssh/id_ed25519_sk type -1 debug1: identity file /root/.ssh/id_ed25519_sk-cert type -1 debug1: identity file /root/.ssh/id_xmss type -1 debug1: identity file /root/.ssh/id_xmss-cert type -1 debug1: Local version string SSH-2.0-OpenSSH_9.9 debug1: Remote protocol version 2.0, remote software version OpenSSH_9.9 debug1: compat_banner: match: OpenSSH_9.9 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug1: Authenticating to 10.31.11.6:22 as 'root' debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug2: local client KEXINIT proposal debug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256 debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 debug2: compression ctos: zlib@openssh.com,none debug2: compression stoc: zlib@openssh.com,none debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug2: peer server KEXINIT proposal debug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-s,kex-strict-s-v00@openssh.com debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512 debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512 debug2: compression ctos: none,zlib@openssh.com debug2: compression stoc: none,zlib@openssh.com debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: kex: algorithm: mlkem768x25519-sha256 debug1: kex: host key algorithm: ssh-ed25519 debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: compression: zlib@openssh.com debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: compression: zlib@openssh.com debug1: kex: mlkem768x25519-sha256 need=32 dh_need=32 debug1: kex: mlkem768x25519-sha256 need=32 dh_need=32 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: SSH2_MSG_KEX_ECDH_REPLY received debug1: Server host key: ssh-ed25519 SHA256:knEQSjuQYq6wocaVt3n4Aq7Elb0aDcZGCAdv6YagxRs debug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory debug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory debug1: Host '10.31.11.6' is known and matches the ED25519 host key. debug1: Found key in /root/.ssh/known_hosts:2 debug1: ssh_packet_send2_wrapped: resetting send seqnr 3 debug2: ssh_set_newkeys: mode 1 debug1: rekey out after 4294967296 blocks debug1: SSH2_MSG_NEWKEYS sent debug1: Sending SSH2_MSG_EXT_INFO debug1: expecting SSH2_MSG_NEWKEYS debug1: ssh_packet_read_poll2: resetting read seqnr 3 debug1: SSH2_MSG_NEWKEYS received debug2: ssh_set_newkeys: mode 0 debug1: rekey in after 4294967296 blocks debug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256 debug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr debug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr debug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 debug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512 debug2: compression ctos: zlib@openssh.com,none debug2: compression stoc: zlib@openssh.com,none debug2: languages ctos: debug2: languages stoc: debug2: first_kex_follows 0 debug2: reserved 0 debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0> debug1: kex_ext_info_check_ver: ping@openssh.com=<0> debug2: service_accept: ssh-userauth debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: SSH2_MSG_EXT_INFO received debug1: kex_ext_info_client_parse: server-sig-algs= debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password debug1: Next authentication method: gssapi-with-mic debug1: No credentials were supplied, or the credentials were unavailable or inaccessible No Kerberos credentials available (default cache: KCM:) debug1: No credentials were supplied, or the credentials were unavailable or inaccessible No Kerberos credentials available (default cache: KCM:) debug2: we did not send a packet, disable method debug1: Next authentication method: publickey debug1: Will attempt key: /root/.ssh/id_rsa debug1: Will attempt key: /root/.ssh/id_ecdsa debug1: Will attempt key: /root/.ssh/id_ecdsa_sk debug1: Will attempt key: /root/.ssh/id_ed25519 debug1: Will attempt key: /root/.ssh/id_ed25519_sk debug1: Will attempt key: /root/.ssh/id_xmss debug2: pubkey_prepare: done debug1: Trying private key: /root/.ssh/id_rsa debug2: we sent a publickey packet, wait for reply debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password debug1: Trying private key: /root/.ssh/id_ecdsa debug1: Trying private key: /root/.ssh/id_ecdsa_sk debug1: Trying private key: /root/.ssh/id_ed25519 debug1: Trying private key: /root/.ssh/id_ed25519_sk debug1: Trying private key: /root/.ssh/id_xmss debug2: we did not send a packet, disable method debug1: No more authentication methods to try. root@10.31.11.6: Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password). PLAY RECAP ********************************************************************* managed-node2 : ok=23 changed=1 unreachable=1 failed=1 skipped=11 rescued=0 ignored=0 SYSTEM ROLES ERRORS BEGIN v1 [ { "ansible_version": "2.17.12", "end_time": "2025-05-31T04:37:05.512630+00:00Z", "host": "managed-node2", "message": "Failed to connect to the host via ssh: OpenSSH_9.9p1, OpenSSL 3.5.0 8 Apr 2025\r\ndebug1: Reading configuration data /root/.ssh/config\r\ndebug1: Reading configuration data /etc/ssh/ssh_config\r\ndebug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf\r\ndebug2: checking match for 'final all' host 10.31.11.6 originally 10.31.11.6\r\ndebug2: match not found\r\ndebug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config\r\ndebug1: configuration requests final Match pass\r\ndebug2: resolve_canonicalize: hostname 10.31.11.6 is address\r\ndebug1: re-parsing configuration\r\ndebug1: Reading configuration data /root/.ssh/config\r\ndebug1: Reading configuration data /etc/ssh/ssh_config\r\ndebug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf\r\ndebug2: checking match for 'final all' host 10.31.11.6 originally 10.31.11.6\r\ndebug2: match found\r\ndebug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config\r\ndebug1: auto-mux: Trying existing master at '/root/.ansible/cp/ac5783089c'\r\ndebug1: Control socket \"/root/.ansible/cp/ac5783089c\" does not exist\r\ndebug1: Connecting to 10.31.11.6 [10.31.11.6] port 22.\r\ndebug2: fd 3 setting O_NONBLOCK\r\ndebug1: fd 3 clearing O_NONBLOCK\r\ndebug1: Connection established.\r\ndebug1: identity file /root/.ssh/id_rsa type -1\r\ndebug1: identity file /root/.ssh/id_rsa-cert type -1\r\ndebug1: identity file /root/.ssh/id_ecdsa type -1\r\ndebug1: identity file /root/.ssh/id_ecdsa-cert type -1\r\ndebug1: identity file /root/.ssh/id_ecdsa_sk type -1\r\ndebug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1\r\ndebug1: identity file /root/.ssh/id_ed25519 type -1\r\ndebug1: identity file /root/.ssh/id_ed25519-cert type -1\r\ndebug1: identity file /root/.ssh/id_ed25519_sk type -1\r\ndebug1: identity file /root/.ssh/id_ed25519_sk-cert type -1\r\ndebug1: identity file /root/.ssh/id_xmss type -1\r\ndebug1: identity file /root/.ssh/id_xmss-cert type -1\r\ndebug1: Local version string SSH-2.0-OpenSSH_9.9\r\ndebug1: Remote protocol version 2.0, remote software version OpenSSH_9.9\r\ndebug1: compat_banner: match: OpenSSH_9.9 pat OpenSSH* compat 0x04000000\r\ndebug2: fd 3 setting O_NONBLOCK\r\ndebug1: Authenticating to 10.31.11.6:22 as 'root'\r\ndebug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory\r\ndebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory\r\ndebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory\r\ndebug1: SSH2_MSG_KEXINIT sent\r\ndebug1: SSH2_MSG_KEXINIT received\r\ndebug2: local client KEXINIT proposal\r\ndebug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com\r\ndebug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256\r\ndebug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr\r\ndebug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr\r\ndebug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: compression ctos: zlib@openssh.com,none\r\ndebug2: compression stoc: zlib@openssh.com,none\r\ndebug2: languages ctos: \r\ndebug2: languages stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug2: peer server KEXINIT proposal\r\ndebug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-s,kex-strict-s-v00@openssh.com\r\ndebug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519\r\ndebug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr\r\ndebug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr\r\ndebug2: MACs ctos: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: MACs stoc: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: compression ctos: none,zlib@openssh.com\r\ndebug2: compression stoc: none,zlib@openssh.com\r\ndebug2: languages ctos: \r\ndebug2: languages stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug1: kex: algorithm: mlkem768x25519-sha256\r\ndebug1: kex: host key algorithm: ssh-ed25519\r\ndebug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: compression: zlib@openssh.com\r\ndebug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: compression: zlib@openssh.com\r\ndebug1: kex: mlkem768x25519-sha256 need=32 dh_need=32\r\ndebug1: kex: mlkem768x25519-sha256 need=32 dh_need=32\r\ndebug1: expecting SSH2_MSG_KEX_ECDH_REPLY\r\ndebug1: SSH2_MSG_KEX_ECDH_REPLY received\r\ndebug1: Server host key: ssh-ed25519 SHA256:knEQSjuQYq6wocaVt3n4Aq7Elb0aDcZGCAdv6YagxRs\r\ndebug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory\r\ndebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory\r\ndebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory\r\ndebug1: Host '10.31.11.6' is known and matches the ED25519 host key.\r\ndebug1: Found key in /root/.ssh/known_hosts:2\r\ndebug1: ssh_packet_send2_wrapped: resetting send seqnr 3\r\ndebug2: ssh_set_newkeys: mode 1\r\ndebug1: rekey out after 4294967296 blocks\r\ndebug1: SSH2_MSG_NEWKEYS sent\r\ndebug1: Sending SSH2_MSG_EXT_INFO\r\ndebug1: expecting SSH2_MSG_NEWKEYS\r\ndebug1: ssh_packet_read_poll2: resetting read seqnr 3\r\ndebug1: SSH2_MSG_NEWKEYS received\r\ndebug2: ssh_set_newkeys: mode 0\r\ndebug1: rekey in after 4294967296 blocks\r\ndebug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com\r\ndebug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256\r\ndebug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr\r\ndebug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr\r\ndebug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: compression ctos: zlib@openssh.com,none\r\ndebug2: compression stoc: zlib@openssh.com,none\r\ndebug2: languages ctos: \r\ndebug2: languages stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug1: SSH2_MSG_EXT_INFO received\r\ndebug1: kex_ext_info_client_parse: server-sig-algs=\r\ndebug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0>\r\ndebug1: kex_ext_info_check_ver: ping@openssh.com=<0>\r\ndebug2: service_accept: ssh-userauth\r\ndebug1: SSH2_MSG_SERVICE_ACCEPT received\r\ndebug1: SSH2_MSG_EXT_INFO received\r\ndebug1: kex_ext_info_client_parse: server-sig-algs=\r\ndebug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password\r\ndebug1: Next authentication method: gssapi-with-mic\r\ndebug1: No credentials were supplied, or the credentials were unavailable or inaccessible\nNo Kerberos credentials available (default cache: KCM:)\n\n\r\ndebug1: No credentials were supplied, or the credentials were unavailable or inaccessible\nNo Kerberos credentials available (default cache: KCM:)\n\n\r\ndebug2: we did not send a packet, disable method\r\ndebug1: Next authentication method: publickey\r\ndebug1: Will attempt key: /root/.ssh/id_rsa \r\ndebug1: Will attempt key: /root/.ssh/id_ecdsa \r\ndebug1: Will attempt key: /root/.ssh/id_ecdsa_sk \r\ndebug1: Will attempt key: /root/.ssh/id_ed25519 \r\ndebug1: Will attempt key: /root/.ssh/id_ed25519_sk \r\ndebug1: Will attempt key: /root/.ssh/id_xmss \r\ndebug2: pubkey_prepare: done\r\ndebug1: Trying private key: /root/.ssh/id_rsa\r\ndebug2: we sent a publickey packet, wait for reply\r\ndebug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password\r\ndebug1: Trying private key: /root/.ssh/id_ecdsa\r\ndebug1: Trying private key: /root/.ssh/id_ecdsa_sk\r\ndebug1: Trying private key: /root/.ssh/id_ed25519\r\ndebug1: Trying private key: /root/.ssh/id_ed25519_sk\r\ndebug1: Trying private key: /root/.ssh/id_xmss\r\ndebug2: we did not send a packet, disable method\r\ndebug1: No more authentication methods to try.\r\nroot@10.31.11.6: Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password).", "start_time": "2025-05-31T04:27:01.847225+00:00Z", "task_name": "Reboot the managed host to apply crypto policies changes", "task_path": "/tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/handlers/main.yml:4" }, { "ansible_version": "2.17.12", "end_time": "2025-05-31T04:37:05.824508+00:00Z", "host": "managed-node2", "message": "Failed to connect to the host via ssh: OpenSSH_9.9p1, OpenSSL 3.5.0 8 Apr 2025\r\ndebug1: Reading configuration data /root/.ssh/config\r\ndebug1: Reading configuration data /etc/ssh/ssh_config\r\ndebug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf\r\ndebug2: checking match for 'final all' host 10.31.11.6 originally 10.31.11.6\r\ndebug2: match not found\r\ndebug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config\r\ndebug1: configuration requests final Match pass\r\ndebug2: resolve_canonicalize: hostname 10.31.11.6 is address\r\ndebug1: re-parsing configuration\r\ndebug1: Reading configuration data /root/.ssh/config\r\ndebug1: Reading configuration data /etc/ssh/ssh_config\r\ndebug1: Reading configuration data /etc/ssh/ssh_config.d/50-redhat.conf\r\ndebug2: checking match for 'final all' host 10.31.11.6 originally 10.31.11.6\r\ndebug2: match found\r\ndebug1: Reading configuration data /etc/crypto-policies/back-ends/openssh.config\r\ndebug1: auto-mux: Trying existing master at '/root/.ansible/cp/ac5783089c'\r\ndebug1: Control socket \"/root/.ansible/cp/ac5783089c\" does not exist\r\ndebug1: Connecting to 10.31.11.6 [10.31.11.6] port 22.\r\ndebug2: fd 3 setting O_NONBLOCK\r\ndebug1: fd 3 clearing O_NONBLOCK\r\ndebug1: Connection established.\r\ndebug1: identity file /root/.ssh/id_rsa type -1\r\ndebug1: identity file /root/.ssh/id_rsa-cert type -1\r\ndebug1: identity file /root/.ssh/id_ecdsa type -1\r\ndebug1: identity file /root/.ssh/id_ecdsa-cert type -1\r\ndebug1: identity file /root/.ssh/id_ecdsa_sk type -1\r\ndebug1: identity file /root/.ssh/id_ecdsa_sk-cert type -1\r\ndebug1: identity file /root/.ssh/id_ed25519 type -1\r\ndebug1: identity file /root/.ssh/id_ed25519-cert type -1\r\ndebug1: identity file /root/.ssh/id_ed25519_sk type -1\r\ndebug1: identity file /root/.ssh/id_ed25519_sk-cert type -1\r\ndebug1: identity file /root/.ssh/id_xmss type -1\r\ndebug1: identity file /root/.ssh/id_xmss-cert type -1\r\ndebug1: Local version string SSH-2.0-OpenSSH_9.9\r\ndebug1: Remote protocol version 2.0, remote software version OpenSSH_9.9\r\ndebug1: compat_banner: match: OpenSSH_9.9 pat OpenSSH* compat 0x04000000\r\ndebug2: fd 3 setting O_NONBLOCK\r\ndebug1: Authenticating to 10.31.11.6:22 as 'root'\r\ndebug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory\r\ndebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory\r\ndebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory\r\ndebug1: SSH2_MSG_KEXINIT sent\r\ndebug1: SSH2_MSG_KEXINIT received\r\ndebug2: local client KEXINIT proposal\r\ndebug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com\r\ndebug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256\r\ndebug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr\r\ndebug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr\r\ndebug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: compression ctos: zlib@openssh.com,none\r\ndebug2: compression stoc: zlib@openssh.com,none\r\ndebug2: languages ctos: \r\ndebug2: languages stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug2: peer server KEXINIT proposal\r\ndebug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-s,kex-strict-s-v00@openssh.com\r\ndebug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519\r\ndebug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr\r\ndebug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr\r\ndebug2: MACs ctos: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: MACs stoc: hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: compression ctos: none,zlib@openssh.com\r\ndebug2: compression stoc: none,zlib@openssh.com\r\ndebug2: languages ctos: \r\ndebug2: languages stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug1: kex: algorithm: mlkem768x25519-sha256\r\ndebug1: kex: host key algorithm: ssh-ed25519\r\ndebug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: compression: zlib@openssh.com\r\ndebug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: compression: zlib@openssh.com\r\ndebug1: kex: mlkem768x25519-sha256 need=32 dh_need=32\r\ndebug1: kex: mlkem768x25519-sha256 need=32 dh_need=32\r\ndebug1: expecting SSH2_MSG_KEX_ECDH_REPLY\r\ndebug1: SSH2_MSG_KEX_ECDH_REPLY received\r\ndebug1: Server host key: ssh-ed25519 SHA256:knEQSjuQYq6wocaVt3n4Aq7Elb0aDcZGCAdv6YagxRs\r\ndebug1: load_hostkeys: fopen /root/.ssh/known_hosts2: No such file or directory\r\ndebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts: No such file or directory\r\ndebug1: load_hostkeys: fopen /etc/ssh/ssh_known_hosts2: No such file or directory\r\ndebug1: Host '10.31.11.6' is known and matches the ED25519 host key.\r\ndebug1: Found key in /root/.ssh/known_hosts:2\r\ndebug1: ssh_packet_send2_wrapped: resetting send seqnr 3\r\ndebug2: ssh_set_newkeys: mode 1\r\ndebug1: rekey out after 4294967296 blocks\r\ndebug1: SSH2_MSG_NEWKEYS sent\r\ndebug1: Sending SSH2_MSG_EXT_INFO\r\ndebug1: expecting SSH2_MSG_NEWKEYS\r\ndebug1: ssh_packet_read_poll2: resetting read seqnr 3\r\ndebug1: SSH2_MSG_NEWKEYS received\r\ndebug2: ssh_set_newkeys: mode 0\r\ndebug1: rekey in after 4294967296 blocks\r\ndebug2: KEX algorithms: mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,ext-info-c,kex-strict-c-v00@openssh.com\r\ndebug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256\r\ndebug2: ciphers ctos: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr\r\ndebug2: ciphers stoc: aes256-gcm@openssh.com,chacha20-poly1305@openssh.com,aes256-ctr,aes128-gcm@openssh.com,aes128-ctr\r\ndebug2: MACs ctos: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: MACs stoc: hmac-sha2-256-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha2-256,hmac-sha1,umac-128@openssh.com,hmac-sha2-512\r\ndebug2: compression ctos: zlib@openssh.com,none\r\ndebug2: compression stoc: zlib@openssh.com,none\r\ndebug2: languages ctos: \r\ndebug2: languages stoc: \r\ndebug2: first_kex_follows 0 \r\ndebug2: reserved 0 \r\ndebug1: SSH2_MSG_EXT_INFO received\r\ndebug1: kex_ext_info_client_parse: server-sig-algs=\r\ndebug1: kex_ext_info_check_ver: publickey-hostbound@openssh.com=<0>\r\ndebug1: kex_ext_info_check_ver: ping@openssh.com=<0>\r\ndebug2: service_accept: ssh-userauth\r\ndebug1: SSH2_MSG_SERVICE_ACCEPT received\r\ndebug1: SSH2_MSG_EXT_INFO received\r\ndebug1: kex_ext_info_client_parse: server-sig-algs=\r\ndebug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password\r\ndebug1: Next authentication method: gssapi-with-mic\r\ndebug1: No credentials were supplied, or the credentials were unavailable or inaccessible\nNo Kerberos credentials available (default cache: KCM:)\n\n\r\ndebug1: No credentials were supplied, or the credentials were unavailable or inaccessible\nNo Kerberos credentials available (default cache: KCM:)\n\n\r\ndebug2: we did not send a packet, disable method\r\ndebug1: Next authentication method: publickey\r\ndebug1: Will attempt key: /root/.ssh/id_rsa \r\ndebug1: Will attempt key: /root/.ssh/id_ecdsa \r\ndebug1: Will attempt key: /root/.ssh/id_ecdsa_sk \r\ndebug1: Will attempt key: /root/.ssh/id_ed25519 \r\ndebug1: Will attempt key: /root/.ssh/id_ed25519_sk \r\ndebug1: Will attempt key: /root/.ssh/id_xmss \r\ndebug2: pubkey_prepare: done\r\ndebug1: Trying private key: /root/.ssh/id_rsa\r\ndebug2: we sent a publickey packet, wait for reply\r\ndebug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password\r\ndebug1: Trying private key: /root/.ssh/id_ecdsa\r\ndebug1: Trying private key: /root/.ssh/id_ecdsa_sk\r\ndebug1: Trying private key: /root/.ssh/id_ed25519\r\ndebug1: Trying private key: /root/.ssh/id_ed25519_sk\r\ndebug1: Trying private key: /root/.ssh/id_xmss\r\ndebug2: we did not send a packet, disable method\r\ndebug1: No more authentication methods to try.\r\nroot@10.31.11.6: Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password).", "start_time": "2025-05-31T04:37:05.714519+00:00Z", "task_name": "Ensure required packages are installed", "task_path": "/tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6" } ] SYSTEM ROLES ERRORS END v1 TASKS RECAP ******************************************************************** Saturday 31 May 2025 00:37:05 -0400 (0:00:00.111) 0:10:10.666 ********** =============================================================================== fedora.linux_system_roles.crypto_policies : Reboot the managed host to apply crypto policies changes - 603.67s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/handlers/main.yml:4 Gathering Facts --------------------------------------------------------- 1.26s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:3 fedora.linux_system_roles.crypto_policies : Ensure required packages are installed --- 1.05s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6 fedora.linux_system_roles.crypto_policies : Update crypto policy if needed --- 0.66s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:75 fedora.linux_system_roles.crypto_policies : Find out what is the currently active policy --- 0.65s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:3 fedora.linux_system_roles.crypto_policies : Check if system is ostree --- 0.55s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:10 fedora.linux_system_roles.crypto_policies : Find base policies files ---- 0.52s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:39 fedora.linux_system_roles.crypto_policies : Find out what is the currently active policy --- 0.48s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/gather_facts.yml:3 fedora.linux_system_roles.crypto_policies : Find subpolicy files -------- 0.42s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:54 fedora.linux_system_roles.crypto_policies : Check if transactional-update exists in /sbin --- 0.41s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:22 fedora.linux_system_roles.crypto_policies : Ensure required packages are installed --- 0.11s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:6 fedora.linux_system_roles.crypto_policies : Ensure ansible_facts used by role --- 0.07s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:2 Ensure we can set crypto policy including reboot of the system ---------- 0.06s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:11 fedora.linux_system_roles.crypto_policies : Set available subpolicies fact --- 0.06s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:62 fedora.linux_system_roles.crypto_policies : Reboot transactional update systems --- 0.05s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:23 fedora.linux_system_roles.crypto_policies : Notify user that reboot is needed to apply changes --- 0.05s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:18 fedora.linux_system_roles.crypto_policies : Fail if reboot is needed and not set --- 0.05s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:28 fedora.linux_system_roles.crypto_policies : Set platform/version specific variables --- 0.04s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/set_vars.yml:31 Restore policy to DEFAULT ----------------------------------------------- 0.04s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/tests/crypto_policies/tests_reboot.yml:29 fedora.linux_system_roles.crypto_policies : Set available base policies fact --- 0.04s /tmp/collections-id0/ansible_collections/fedora/linux_system_roles/roles/crypto_policies/tasks/main.yml:47