Advertisement
adde88

WiFi Pineapple Logread Output

Jan 24th, 2018
438
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.64 KB | None | 0 0
  1. Tue Jan 23 20:26:08 2018 user.info kernel: [ 24.500000] procd: - watchdog -
  2. Tue Jan 23 20:26:08 2018 user.info kernel: [ 25.570000] procd: - ubus -
  3. Tue Jan 23 20:26:08 2018 user.info kernel: [ 26.600000] procd: - init -
  4. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.340000] Loading modules backported from Linux version v4.4-rc5-1913-gc8fdf68
  5. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.340000] Backport generated by backports.git backports-20151218-0-g2f58d9d
  6. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.460000] ath: EEPROM regdomain: 0x0
  7. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.460000] ath: EEPROM indicates default country code should be used
  8. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.460000] ath: doing EEPROM country->regdmn map search
  9. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.460000] ath: country maps to regdmn code: 0x3a
  10. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.460000] ath: Country alpha2 being used: US
  11. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.460000] ath: Regpair used: 0x3a
  12. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.470000] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
  13. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.480000] ieee80211 phy0: Atheros AR9340 Rev:2 mem=0xb8100000, irq=47
  14. Tue Jan 23 20:26:08 2018 kern.warn kernel: [ 29.480000] PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
  15. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.510000] ath: EEPROM regdomain: 0x0
  16. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.510000] ath: EEPROM indicates default country code should be used
  17. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.510000] ath: doing EEPROM country->regdmn map search
  18. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.510000] ath: country maps to regdmn code: 0x3a
  19. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.510000] ath: Country alpha2 being used: US
  20. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.510000] ath: Regpair used: 0x3a
  21. Tue Jan 23 20:26:08 2018 kern.debug kernel: [ 29.520000] ieee80211 phy1: Selected rate control algorithm 'minstrel_ht'
  22. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.530000] ieee80211 phy1: Atheros AR9300 Rev:4 mem=0xb0000000, irq=40
  23. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.550000] usbcore: registered new interface driver ath9k_htc
  24. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.590000] RPC: Registered named UNIX socket transport module.
  25. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.600000] RPC: Registered udp transport module.
  26. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.600000] RPC: Registered tcp transport module.
  27. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.610000] RPC: Registered tcp NFSv4.1 backchannel transport module.
  28. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.840000] tun: Universal TUN/TAP device driver, 1.6
  29. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.840000] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  30. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.890000] usbcore: registered new interface driver rt2800usb
  31. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.920000] usbcore: registered new interface driver rtl8187
  32. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 29.970000] usbcore: registered new interface driver rtl8192cu
  33. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.010000] usbcore: registered new interface driver cdc_acm
  34. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.020000] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
  35. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.050000] usbcore: registered new interface driver cdc_wdm
  36. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.070000] nf_conntrack version 0.5.0 (1966 buckets, 7864 max)
  37. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.110000] usbcore: registered new interface driver ums-alauda
  38. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.130000] usbcore: registered new interface driver ums-cypress
  39. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.130000] usbcore: registered new interface driver ums-datafab
  40. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.140000] usbcore: registered new interface driver ums-freecom
  41. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.150000] usbcore: registered new interface driver ums-isd200
  42. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.170000] usbcore: registered new interface driver ums-jumpshot
  43. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.180000] usbcore: registered new interface driver ums-karma
  44. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.190000] usbcore: registered new interface driver ums-sddr09
  45. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.200000] usbcore: registered new interface driver ums-sddr55
  46. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.210000] usbcore: registered new interface driver ums-usbat
  47. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.230000] usbcore: registered new interface driver usbserial
  48. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.240000] usbcore: registered new interface driver usbserial_generic
  49. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.240000] usbserial: USB Serial support registered for generic
  50. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.280000] xt_time: kernel timezone is -0000
  51. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.290000] usbcore: registered new interface driver asix
  52. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.300000] usbcore: registered new interface driver ax88179_178a
  53. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.310000] usbcore: registered new interface driver cdc_ether
  54. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.320000] ip_tables: (C) 2000-2006 Netfilter Core Team
  55. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.340000] usbcore: registered new interface driver pl2303
  56. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.340000] usbserial: USB Serial support registered for pl2303
  57. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.360000] PPP generic driver version 2.4.2
  58. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.360000] NET: Registered protocol family 24
  59. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.370000] usbcore: registered new interface driver qmi_wwan
  60. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.380000] usbcore: registered new interface driver rndis_host
  61. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.390000] usbcore: registered new interface driver sierra_net
  62. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.400000] usbcore: registered new interface driver option
  63. Tue Jan 23 20:26:08 2018 kern.info kernel: [ 30.410000] usbserial: USB Serial support registered for GSM modem (1-port)
  64. Tue Jan 23 20:26:11 2018 user.emerg syslog: this file has been obseleted. please call "/sbin/block mount" directly
  65. Tue Jan 23 20:26:12 2018 daemon.err block: /dev/ubi0_1 is already mounted
  66. Tue Jan 23 20:26:16 2018 kern.info kernel: [ 40.550000] device eth1 entered promiscuous mode
  67. Tue Jan 23 20:26:16 2018 kern.info kernel: [ 40.550000] br-lan: port 1(eth1) entered forwarding state
  68. Tue Jan 23 20:26:16 2018 kern.info kernel: [ 40.560000] br-lan: port 1(eth1) entered forwarding state
  69. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'lan' is enabled
  70. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'lan' is setting up now
  71. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'lan' is now up
  72. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'loopback' is enabled
  73. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'loopback' is setting up now
  74. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'loopback' is now up
  75. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'wan' is enabled
  76. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'wan6' is enabled
  77. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Bridge 'br-lan' link is up
  78. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'lan' has link connectivity
  79. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Network device 'lo' link is up
  80. Tue Jan 23 20:26:16 2018 kern.info kernel: [ 40.620000] br-lan: port 1(eth1) entered disabled state
  81. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'loopback' has link connectivity
  82. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Bridge 'br-lan' link is down
  83. Tue Jan 23 20:26:16 2018 daemon.notice netifd: Interface 'lan' has link connectivity loss
  84. Tue Jan 23 20:26:18 2018 user.info autossh[1388]: starting ssh (count 1)
  85. Tue Jan 23 20:26:18 2018 user.info autossh[1388]: ssh child pid is 1391
  86. Tue Jan 23 20:26:19 2018 daemon.notice netifd: radio1 (1267): Interface 0 setup failed: BRIDGE_NOT_ALLOWED
  87. Tue Jan 23 20:26:19 2018 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
  88. Tue Jan 23 20:26:19 2018 kern.info kernel: [ 43.670000] eth1: link up (100Mbps/Full duplex)
  89. Tue Jan 23 20:26:19 2018 kern.info kernel: [ 43.670000] br-lan: port 1(eth1) entered forwarding state
  90. Tue Jan 23 20:26:19 2018 kern.info kernel: [ 43.680000] br-lan: port 1(eth1) entered forwarding state
  91. Tue Jan 23 20:26:19 2018 daemon.notice netifd: Network device 'eth1' link is up
  92. Tue Jan 23 20:26:19 2018 daemon.notice netifd: Bridge 'br-lan' link is up
  93. Tue Jan 23 20:26:19 2018 daemon.notice netifd: Interface 'lan' has link connectivity
  94. Tue Jan 23 20:26:21 2018 daemon.notice netifd: radio0 (1266): Configuration file: /var/run/hostapd-phy0.conf
  95. Tue Jan 23 20:26:21 2018 kern.info kernel: [ 45.630000] device wlan0 entered promiscuous mode
  96. Tue Jan 23 20:26:21 2018 kern.info kernel: [ 45.680000] br-lan: port 1(eth1) entered forwarding state
  97. Tue Jan 23 20:26:21 2018 daemon.notice netifd: radio0 (1266): Using interface wlan0 with hwaddr 00:13:37:a5:c2:0f and ssid "Pineapple_C20F"
  98. Tue Jan 23 20:26:21 2018 kern.info kernel: [ 45.710000] device wlan0-1 entered promiscuous mode
  99. Tue Jan 23 20:26:21 2018 kern.info kernel: [ 45.720000] br-lan: port 3(wlan0-1) entered forwarding state
  100. Tue Jan 23 20:26:21 2018 kern.info kernel: [ 45.720000] br-lan: port 3(wlan0-1) entered forwarding state
  101. Tue Jan 23 20:26:21 2018 daemon.notice netifd: radio0 (1266): Using interface wlan0-1 with hwaddr 02:13:37:a5:c2:0f and ssid "Tetra"
  102. Tue Jan 23 20:26:22 2018 kern.info kernel: [ 46.220000] br-lan: port 2(wlan0) entered forwarding state
  103. Tue Jan 23 20:26:22 2018 kern.info kernel: [ 46.220000] br-lan: port 2(wlan0) entered forwarding state
  104. Tue Jan 23 20:26:22 2018 kern.info kernel: [ 46.600000] br-lan: port 3(wlan0-1) entered disabled state
  105. Tue Jan 23 20:26:22 2018 kern.info kernel: [ 46.870000] br-lan: port 3(wlan0-1) entered forwarding state
  106. Tue Jan 23 20:26:22 2018 kern.info kernel: [ 46.870000] br-lan: port 3(wlan0-1) entered forwarding state
  107. Tue Jan 23 20:26:22 2018 daemon.notice netifd: radio0 (1266): wlan0: interface state UNINITIALIZED->ENABLED
  108. Tue Jan 23 20:26:22 2018 daemon.notice netifd: radio0 (1266): wlan0: AP-ENABLED
  109. Tue Jan 23 20:26:24 2018 kern.info kernel: [ 48.220000] br-lan: port 2(wlan0) entered forwarding state
  110. Tue Jan 23 20:26:24 2018 auth.info sshd[1567]: Server listening on 0.0.0.0 port 22.
  111. Tue Jan 23 20:26:24 2018 kern.info kernel: [ 48.870000] br-lan: port 3(wlan0-1) entered forwarding state
  112. Tue Jan 23 20:26:25 2018 user.emerg syslog: setting up led ETH0
  113. Tue Jan 23 20:26:25 2018 user.emerg syslog: setting up led WLAN0
  114. Tue Jan 23 20:26:25 2018 user.emerg syslog: setting up led WLAN1MON
  115. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: started, version 2.78 cachesize 150
  116. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: DNS service limited to local subnets
  117. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: compile time options: no-IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify
  118. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq-dhcp[1676]: DHCP, IP range 172.16.42.100 -- 172.16.42.249, lease time 1d
  119. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: using local addresses only for domain tetra
  120. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: reading /tmp/resolv.conf.auto
  121. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: using local addresses only for domain tetra
  122. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: using nameserver 8.8.4.4#53
  123. Tue Jan 23 20:26:26 2018 daemon.err dnsmasq[1676]: bad address at /etc/hosts line 2
  124. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: read /etc/hosts - 1 addresses
  125. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq[1676]: read /tmp/hosts/dhcp - 1 addresses
  126. Tue Jan 23 20:26:26 2018 daemon.info dnsmasq-dhcp[1676]: read /etc/ethers - 0 addresses
  127. Tue Jan 23 20:26:26 2018 user.emerg syslog: WiFi Pineapple Controller version 0.1
  128. Tue Jan 23 20:26:26 2018 user.emerg syslog:
  129. Tue Jan 23 20:26:26 2018 user.emerg syslog: Usage: pineapple [command] [[options]] [[[args]]]
  130. Tue Jan 23 20:26:26 2018 user.emerg syslog:
  131. Tue Jan 23 20:26:26 2018 user.emerg syslog: A Program to controll your WiFi Pineapple over the commandline.
  132. Tue Jan 23 20:26:26 2018 user.emerg syslog:
  133. Tue Jan 23 20:26:26 2018 user.emerg syslog: Commands:
  134. Tue Jan 23 20:26:26 2018 user.emerg syslog: karma
  135. Tue Jan 23 20:26:26 2018 user.emerg syslog: start - Starts Karma
  136. Tue Jan 23 20:26:26 2018 user.emerg syslog: stop - Stops Karma
  137. Tue Jan 23 20:26:26 2018 user.emerg syslog: list_ssids - Lists all SSIDs in Karma's black/white list.
  138. Tue Jan 23 20:26:26 2018 user.emerg syslog: list_macs - Lists all SSIDs in Karma's black list.
  139. Tue Jan 23 20:26:26 2018 user.emerg syslog: add_ssid [SSID] - Adds the specified SSID to the black/white list.
  140. Tue Jan 23 20:26:26 2018 user.emerg syslog: del_ssid [SSID] - Delete the specified SSID from the black/white list.
  141. Tue Jan 23 20:26:26 2018 user.emerg syslog: add_mac [MAC] - Adds the specified MAC to the black list.
  142. Tue Jan 23 20:26:26 2018 user.emerg syslog: del_mac [MAC] - Delete the specified MAC from the black list.
  143. Tue Jan 23 20:26:26 2018 user.emerg syslog:
  144. Tue Jan 23 20:26:26 2018 user.emerg syslog: led
  145. Tue Jan 23 20:26:26 2018 user.emerg syslog: blue [on | off] - Turn's the blue LED on.
  146. Tue Jan 23 20:26:26 2018 user.emerg syslog: red [on | off] - Turn's the red LED on.
  147. Tue Jan 23 20:26:26 2018 user.emerg syslog: yellow [on | off] - Turn's the yellow LED on.
  148. Tue Jan 23 20:26:26 2018 user.emerg syslog: reset - Reset's LED behaviour to default
  149. Tue Jan 23 20:26:26 2018 user.emerg syslog:
  150. Tue Jan 23 20:26:26 2018 user.emerg syslog: module
  151. Tue Jan 23 20:26:26 2018 user.emerg syslog: list - Lists all available modules with a CLI component.
  152. Tue Jan 23 20:26:26 2018 user.emerg syslog: [Module Name] [[args]] - Runs specified module with args if given.
  153. Tue Jan 23 20:26:26 2018 user.emerg syslog:
  154. Tue Jan 23 20:26:26 2018 user.emerg syslog: notify [notification text] - Sends a notification to the webinterface
  155. Tue Jan 23 20:26:26 2018 user.emerg syslog:
  156. Tue Jan 23 20:26:28 2018 user.emerg syslog: OK
  157. Tue Jan 23 20:26:28 2018 daemon.notice netifd: radio0 (1266): OK
  158. Tue Jan 23 20:26:28 2018 daemon.notice netifd: radio0 (1266): Unknown command 'karma_ssid_black'
  159. Tue Jan 23 20:26:28 2018 daemon.notice netifd: radio0 (1266): ADDED
  160. Tue Jan 23 20:26:28 2018 user.emerg syslog: OK
  161. Tue Jan 23 20:26:28 2018 user.emerg syslog: uci: Entry not found
  162. Tue Jan 23 20:26:28 2018 user.emerg syslog: sh: 0: unknown operand
  163. Tue Jan 23 20:26:28 2018 daemon.info procd: - init complete -
  164. Tue Jan 23 20:26:28 2018 daemon.notice netifd: Network device 'wlan0' link is up
  165. Tue Jan 23 20:26:28 2018 daemon.notice netifd: Network device 'wlan0-1' link is up
  166. Tue Jan 23 20:26:52 2018 user.info autossh[1388]: ssh exited with error status 255; restarting ssh
  167. Tue Jan 23 20:26:52 2018 user.info autossh[1388]: starting ssh (count 2)
  168. Tue Jan 23 20:26:52 2018 user.info autossh[1388]: ssh child pid is 1798
  169. Tue Jan 23 20:27:00 2018 daemon.info hostapd: wlan0-1: STA e8:2a:ea:60:b7:6a IEEE 802.11: authenticated
  170. Tue Jan 23 20:27:00 2018 daemon.info hostapd: wlan0-1: STA e8:2a:ea:60:b7:6a IEEE 802.11: associated (aid 1)
  171. Tue Jan 23 20:27:00 2018 daemon.info hostapd: wlan0-1: STA e8:2a:ea:60:b7:6a RADIUS: starting accounting session 119681D3E712F9A8
  172. Tue Jan 23 20:27:00 2018 daemon.info hostapd: wlan0-1: STA e8:2a:ea:60:b7:6a WPA: pairwise key handshake completed (RSN)
  173. Tue Jan 23 20:27:00 2018 daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.191 e8:2a:ea:60:b7:6a
  174. Tue Jan 23 20:27:00 2018 daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.191 e8:2a:ea:60:b7:6a fsociety
  175. Tue Jan 23 20:27:00 2018 daemon.info dnsmasq-dhcp[1676]: DHCPREQUEST(br-lan) 172.16.42.191 e8:2a:ea:60:b7:6a
  176. Tue Jan 23 20:27:00 2018 daemon.info dnsmasq-dhcp[1676]: DHCPACK(br-lan) 172.16.42.191 e8:2a:ea:60:b7:6a fsociety
  177. Tue Jan 23 20:27:22 2018 user.info autossh[1388]: ssh exited with error status 255; restarting ssh
  178. Tue Jan 23 20:27:22 2018 user.info autossh[1388]: starting ssh (count 3)
  179. Tue Jan 23 20:27:22 2018 user.info autossh[1388]: ssh child pid is 1811
  180. Wed Jan 24 13:11:48 2018 user.info autossh[1388]: ssh exited with error status 255; restarting ssh
  181. Wed Jan 24 13:11:48 2018 user.info autossh[1388]: starting ssh (count 4)
  182. Wed Jan 24 13:11:48 2018 user.info autossh[1388]: ssh child pid is 1838
  183. Wed Jan 24 13:11:59 2018 kern.info kernel: [ 147.780000] device wlan1mon entered promiscuous mode
  184. Wed Jan 24 13:12:18 2018 user.info autossh[1388]: ssh exited with error status 255; restarting ssh
  185. Wed Jan 24 13:12:18 2018 user.info autossh[1388]: starting ssh (count 5)
  186. Wed Jan 24 13:12:18 2018 user.info autossh[1388]: ssh child pid is 2068
  187. Wed Jan 24 13:12:48 2018 user.info autossh[1388]: ssh exited with error status 255; restarting ssh
  188. Wed Jan 24 13:12:48 2018 user.info autossh[1388]: starting ssh (count 6)
  189. Wed Jan 24 13:12:48 2018 user.info autossh[1388]: ssh child pid is 2092
  190. Wed Jan 24 13:13:18 2018 user.info autossh[1388]: ssh exited with error status 255; restarting ssh
  191. Wed Jan 24 13:13:18 2018 user.info autossh[1388]: starting ssh (count 7)
  192. Wed Jan 24 13:13:18 2018 user.info autossh[1388]: ssh child pid is 2115
  193. Wed Jan 24 13:13:35 2018 auth.err sshd[2133]: error: Could not load host key: /etc/ssh/ssh_host_ecdsa_key
  194. Wed Jan 24 13:13:35 2018 auth.err sshd[2133]: error: Could not load host key: /etc/ssh/ssh_host_ed25519_key
  195. Wed Jan 24 13:13:35 2018 auth.info sshd[2133]: Accepted publickey for root from 172.16.42.191 port 46706 ssh2: RSA SHA256:EoxGwYpUIa3DfHjB3IBUPXI8fSjXwml4ZhIedTWCYNo
  196. Wed Jan 24 13:13:48 2018 user.info autossh[1388]: ssh exited with error status 255; restarting ssh
  197. Wed Jan 24 13:13:48 2018 user.info autossh[1388]: starting ssh (count 8)
  198. Wed Jan 24 13:13:48 2018 user.info autossh[1388]: ssh child pid is 2141
  199. Wed Jan 24 13:14:18 2018 user.info autossh[1388]: ssh exited with error status 255; restarting ssh
  200. Wed Jan 24 13:14:18 2018 user.info autossh[1388]: starting ssh (count 9)
  201. Wed Jan 24 13:14:18 2018 user.info autossh[1388]: ssh child pid is 2147
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement