Advertisement
Guest User

Untitled

a guest
Apr 19th, 2013
112
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.53 KB | None | 0 0
  1. auth.log:Apr 19 09:21:05 srv-adam sshd[1031]: debug1: Forked child 2895.
  2. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Set /proc/self/oom_adj to 0
  3. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  4. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: inetd sockets after dupping: 3, 3
  5. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Connection from 10.10.2.36 port 43965
  6. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Client protocol version 2.0; client software version OpenSSH_6.0p1 Debian-4
  7. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: match: OpenSSH_6.0p1 Debian-4 pat OpenSSH*
  8. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Enabling compatibility mode for protocol 2.0
  9. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Local version string SSH-2.0-OpenSSH_5.5p1 Debian-6+squeeze3
  10. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: PAM: initializing for "root"
  11. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: PAM: setting PAM_RHOST to "ws-it-19-15.tts.loc"
  12. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: PAM: setting PAM_TTY to "ssh"
  13. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Failed none for root from 10.10.2.36 port 43965 ssh2
  14. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
  15. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
  16. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: temporarily_use_uid: 0/0 (e=0/0)
  17. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: trying public key file /root/.ssh/authorized_keys
  18. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: fd 4 clearing O_NONBLOCK
  19. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: matching key found: file /root/.ssh/authorized_keys, line 1
  20. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Found matching RSA key: ab:15:ba:78:3c:38:03:1e:fe:1a:ea:5b:a6:ba:8a:87
  21. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: restore_uid: 0/0
  22. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
  23. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
  24. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: temporarily_use_uid: 0/0 (e=0/0)
  25. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: trying public key file /root/.ssh/authorized_keys
  26. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: fd 4 clearing O_NONBLOCK
  27. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: matching key found: file /root/.ssh/authorized_keys, line 1
  28. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Found matching RSA key: ab:15:ba:78:3c:38:03:1e:fe:1a:ea:5b:a6:ba:8a:87
  29. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: restore_uid: 0/0
  30. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: ssh_rsa_verify: signature correct
  31. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: do_pam_account: called
  32. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Accepted publickey for root from 10.10.2.36 port 43965 ssh2
  33. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: monitor_child_preauth: root has been authenticated by privileged process
  34. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: PAM: establishing credentials
  35. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: pam_unix(sshd:session): session opened for user root by (uid=0)
  36. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Entering interactive session for SSH2.
  37. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_init_dispatch_20
  38. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
  39. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: input_session_request
  40. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: channel 0: new [server-session]
  41. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_new: session 0
  42. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_open: channel 0
  43. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_open: session 0: link with channel 0
  44. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_open: confirm session
  45. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_global_request: rtype no-more-sessions@openssh.com want_reply 0
  46. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
  47. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_by_channel: session 0 channel 0
  48. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_input_channel_req: session 0 req pty-req
  49. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Allocating pty.
  50. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_pty_req: session 0 alloc /dev/pts/0
  51. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: SELinux support disabled
  52. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_req: channel 0 request env reply 0
  53. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_by_channel: session 0 channel 0
  54. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_input_channel_req: session 0 req env
  55. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_req: channel 0 request shell reply 1
  56. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_by_channel: session 0 channel 0
  57. auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_input_channel_req: session 0 req shell
  58. auth.log:Apr 19 09:21:05 srv-adam sshd[2898]: debug1: Setting controlling tty using TIOCSCTTY.
  59. auth.log:Apr 19 09:21:05 srv-adam sshd[2898]: debug1: PAM: reinitializing credentials
  60. auth.log:Apr 19 09:21:05 srv-adam sshd[2898]: debug1: permanently_set_uid: 0/0
  61. auth.log:Apr 19 09:22:59 srv-adam sshd[2895]: debug1: server_input_channel_req: channel 0 request window-change reply 0
  62. auth.log:Apr 19 09:22:59 srv-adam sshd[2895]: debug1: session_by_channel: session 0 channel 0
  63. auth.log:Apr 19 09:22:59 srv-adam sshd[2895]: debug1: session_input_channel_req: session 0 req window-change
  64. auth.log:Apr 19 09:56:42 srv-adam sshd[1031]: debug1: Forked child 3043.
  65. auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: Set /proc/self/oom_adj to 0
  66. auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  67. auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: debug1: inetd sockets after dupping: 3, 3
  68. auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: debug1: getpeername failed: Transport endpoint is not connected
  69. auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: debug1: get_remote_port failed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement