Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- $ sudo /usr/sbin/sshd -dDp222
- [sudo] password for $USER:
- debug1: sshd version OpenSSH_8.9, OpenSSL 3.0.2 15 Mar 2022
- debug1: private host key #0: ssh-rsa SHA256:xv7AudxEOymuuyEDbg9e5m8Pi8wV3avTB5CQUMz+rEU
- debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:A6kGYaWfqxHwIvbfaLSbAJDOH04jQmGXG0gpm9lnvZY
- debug1: private host key #2: ssh-ed25519 SHA256:vN1sl1+Bc68MId8Y8iL1HQrVOMW/jIkIceUiGa7ds+w
- debug1: rexec_argv[0]='/usr/sbin/sshd'
- debug1: rexec_argv[1]='-dDp222'
- debug1: Set /proc/self/oom_score_adj from 0 to -1000
- debug1: Bind to port 222 on 0.0.0.0.
- Server listening on 0.0.0.0 port 222.
- debug1: Bind to port 222 on ::.
- Server listening on :: port 222.
- debug1: Server will not fork when running in debugging mode.
- debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
- debug1: sshd version OpenSSH_8.9, OpenSSL 3.0.2 15 Mar 2022
- debug1: private host key #0: ssh-rsa SHA256:xv7AudxEOymuuyEDbg9e5m8Pi8wV3avTB5CQUMz+rEU
- debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:A6kGYaWfqxHwIvbfaLSbAJDOH04jQmGXG0gpm9lnvZY
- debug1: private host key #2: ssh-ed25519 SHA256:vN1sl1+Bc68MId8Y8iL1HQrVOMW/jIkIceUiGa7ds+w
- debug1: inetd sockets after dupping: 3, 3
- Connection from 192.168.0.167 port 41132 on 192.168.0.123 port 222 rdomain ""
- debug1: Local version string SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.1
- debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Ubuntu-1ubuntu7.1
- debug1: compat_banner: match: OpenSSH_9.0p1 Ubuntu-1ubuntu7.1 pat OpenSSH* compat 0x04000000
- debug1: permanently_set_uid: 129/65534 [preauth]
- debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
- debug1: SSH2_MSG_KEXINIT sent [preauth]
- debug1: SSH2_MSG_KEXINIT received [preauth]
- debug1: kex: algorithm: [email protected] [preauth]
- debug1: kex: host key algorithm: ssh-ed25519 [preauth]
- debug1: kex: client->server cipher: [email protected] MAC: <implicit> compression: none [preauth]
- debug1: kex: server->client cipher: [email protected] MAC: <implicit> compression: none [preauth]
- debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
- debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth]
- debug1: rekey out after 134217728 blocks [preauth]
- debug1: SSH2_MSG_NEWKEYS sent [preauth]
- debug1: Sending SSH2_MSG_EXT_INFO [preauth]
- debug1: expecting SSH2_MSG_NEWKEYS [preauth]
- debug1: SSH2_MSG_NEWKEYS received [preauth]
- debug1: rekey in after 134217728 blocks [preauth]
- debug1: KEX done [preauth]
- debug1: userauth-request for user $USER service ssh-connection method none [preauth]
- debug1: attempt 0 failures 0 [preauth]
- debug1: PAM: initializing for "$USER"
- debug1: PAM: setting PAM_RHOST to "192.168.0.167"
- debug1: PAM: setting PAM_TTY to "ssh"
- debug1: userauth-request for user $USER service ssh-connection method publickey [preauth]
- debug1: attempt 1 failures 0 [preauth]
- debug1: userauth_pubkey: publickey test pkalg rsa-sha2-512 pkblob RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y [preauth]
- debug1: temporarily_use_uid: 1000/1000 (e=0/0)
- debug1: trying public key file /home/$USER/.ssh/authorized_keys
- debug1: fd 4 clearing O_NONBLOCK
- debug1: /home/$USER/.ssh/authorized_keys:8: matching key found: RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y
- debug1: /home/$USER/.ssh/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
- Accepted key RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y found at /home/$USER/.ssh/authorized_keys:8
- debug1: restore_uid: 0/0
- Postponed publickey for $USER from 192.168.0.167 port 41132 ssh2 [preauth]
- debug1: userauth-request for user $USER service ssh-connection method [email protected] [preauth]
- debug1: attempt 2 failures 0 [preauth]
- debug1: temporarily_use_uid: 1000/1000 (e=0/0)
- debug1: trying public key file /home/$USER/.ssh/authorized_keys
- debug1: fd 4 clearing O_NONBLOCK
- debug1: /home/$USER/.ssh/authorized_keys:8: matching key found: RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y
- debug1: /home/$USER/.ssh/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
- Accepted key RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y found at /home/$USER/.ssh/authorized_keys:8
- debug1: restore_uid: 0/0
- debug1: auth_activate_options: setting new authentication options
- debug1: do_pam_account: called
- Accepted publickey for $USER from 192.168.0.167 port 41132 ssh2: RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y
- debug1: monitor_child_preauth: user $USER authenticated by privileged process
- debug1: auth_activate_options: setting new authentication options [preauth]
- debug1: monitor_read_log: child log fd closed
- debug1: PAM: establishing credentials
- User child is on pid 83124
- debug1: SELinux support disabled
- debug1: PAM: establishing credentials
- debug1: permanently_set_uid: 1000/1000
- debug1: rekey in after 134217728 blocks
- debug1: rekey out after 134217728 blocks
- debug1: ssh_packet_set_postauth: called
- debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
- debug1: Entering interactive session for SSH2.
- debug1: server_init_dispatch
- debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
- debug1: input_session_request
- debug1: channel 0: new [server-session]
- debug1: session_new: session 0
- debug1: session_open: channel 0
- debug1: session_open: session 0: link with channel 0
- debug1: server_input_channel_open: confirm session
- debug1: server_input_global_request: rtype [email protected] want_reply 0
- debug1: server_input_channel_req: channel 0 request pty-req reply 1
- debug1: session_by_channel: session 0 channel 0
- debug1: session_input_channel_req: session 0 req pty-req
- debug1: Allocating pty.
- debug1: session_new: session 0
- debug1: SELinux support disabled
- debug1: session_pty_req: session 0 alloc /dev/pts/8
- debug1: server_input_channel_req: channel 0 request env reply 0
- debug1: session_by_channel: session 0 channel 0
- debug1: session_input_channel_req: session 0 req env
- debug1: server_input_channel_req: channel 0 request shell reply 1
- debug1: session_by_channel: session 0 channel 0
- debug1: session_input_channel_req: session 0 req shell
- Starting session: shell on pts/8 for $USER from 192.168.0.167 port 41132 id 0
- debug1: Setting controlling tty using TIOCSCTTY.
- debug1: Received SIGCHLD.
- debug1: session_by_pid: pid 83125
- debug1: session_exit_message: session 0 channel 0 pid 83125
- debug1: session_exit_message: release channel 0
- debug1: session_by_tty: session 0 tty /dev/pts/8
- debug1: session_pty_cleanup2: session 0 release /dev/pts/8
- Received disconnect from 192.168.0.167 port 41132:11: disconnected by user
- Disconnected from user $USER 192.168.0.167 port 41132
- debug1: do_cleanup
- debug1: temporarily_use_uid: 1000/1000 (e=1000/1000)
- debug1: restore_uid: (unprivileged)
- debug1: do_cleanup
- debug1: PAM: cleanup
- debug1: PAM: closing session
- debug1: PAM: deleting credentials
- debug1: temporarily_use_uid: 1000/1000 (e=0/0)
- debug1: restore_uid: 0/0
- debug1: audit_event: unhandled event 12
Add Comment
Please, Sign In to add comment