Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- auth.log:Apr 19 09:21:05 srv-adam sshd[1031]: debug1: Forked child 2895.
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Set /proc/self/oom_adj to 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: inetd sockets after dupping: 3, 3
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Connection from 10.10.2.36 port 43965
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Client protocol version 2.0; client software version OpenSSH_6.0p1 Debian-4
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: match: OpenSSH_6.0p1 Debian-4 pat OpenSSH*
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Enabling compatibility mode for protocol 2.0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Local version string SSH-2.0-OpenSSH_5.5p1 Debian-6+squeeze3
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: PAM: initializing for "root"
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: PAM: setting PAM_RHOST to "ws-it-19-15.tts.loc"
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: PAM: setting PAM_TTY to "ssh"
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Failed none for root from 10.10.2.36 port 43965 ssh2
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: temporarily_use_uid: 0/0 (e=0/0)
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: trying public key file /root/.ssh/authorized_keys
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: fd 4 clearing O_NONBLOCK
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: matching key found: file /root/.ssh/authorized_keys, line 1
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Found matching RSA key: ab:15:ba:78:3c:38:03:1e:fe:1a:ea:5b:a6:ba:8a:87
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: restore_uid: 0/0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: temporarily_use_uid: 0/0 (e=0/0)
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: trying public key file /root/.ssh/authorized_keys
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: fd 4 clearing O_NONBLOCK
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: matching key found: file /root/.ssh/authorized_keys, line 1
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Found matching RSA key: ab:15:ba:78:3c:38:03:1e:fe:1a:ea:5b:a6:ba:8a:87
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: restore_uid: 0/0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: ssh_rsa_verify: signature correct
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: do_pam_account: called
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: Accepted publickey for root from 10.10.2.36 port 43965 ssh2
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: monitor_child_preauth: root has been authenticated by privileged process
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: PAM: establishing credentials
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: pam_unix(sshd:session): session opened for user root by (uid=0)
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Entering interactive session for SSH2.
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_init_dispatch_20
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: input_session_request
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: channel 0: new [server-session]
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_new: session 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_open: channel 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_open: session 0: link with channel 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_open: confirm session
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_global_request: rtype no-more-sessions@openssh.com want_reply 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_by_channel: session 0 channel 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_input_channel_req: session 0 req pty-req
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: Allocating pty.
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_pty_req: session 0 alloc /dev/pts/0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: SELinux support disabled
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_req: channel 0 request env reply 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_by_channel: session 0 channel 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_input_channel_req: session 0 req env
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: server_input_channel_req: channel 0 request shell reply 1
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_by_channel: session 0 channel 0
- auth.log:Apr 19 09:21:05 srv-adam sshd[2895]: debug1: session_input_channel_req: session 0 req shell
- auth.log:Apr 19 09:21:05 srv-adam sshd[2898]: debug1: Setting controlling tty using TIOCSCTTY.
- auth.log:Apr 19 09:21:05 srv-adam sshd[2898]: debug1: PAM: reinitializing credentials
- auth.log:Apr 19 09:21:05 srv-adam sshd[2898]: debug1: permanently_set_uid: 0/0
- auth.log:Apr 19 09:22:59 srv-adam sshd[2895]: debug1: server_input_channel_req: channel 0 request window-change reply 0
- auth.log:Apr 19 09:22:59 srv-adam sshd[2895]: debug1: session_by_channel: session 0 channel 0
- auth.log:Apr 19 09:22:59 srv-adam sshd[2895]: debug1: session_input_channel_req: session 0 req window-change
- auth.log:Apr 19 09:56:42 srv-adam sshd[1031]: debug1: Forked child 3043.
- auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: Set /proc/self/oom_adj to 0
- auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
- auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: debug1: inetd sockets after dupping: 3, 3
- auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: debug1: getpeername failed: Transport endpoint is not connected
- auth.log:Apr 19 09:56:42 srv-adam sshd[3043]: debug1: get_remote_port failed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement