iconoclasthero

Untitled

Feb 3rd, 2023
175
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.98 KB | None | 0 0
  1. $ sudo /usr/sbin/sshd -dDp222
  2. [sudo] password for $USER:
  3. debug1: sshd version OpenSSH_8.9, OpenSSL 3.0.2 15 Mar 2022
  4. debug1: private host key #0: ssh-rsa SHA256:xv7AudxEOymuuyEDbg9e5m8Pi8wV3avTB5CQUMz+rEU
  5. debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:A6kGYaWfqxHwIvbfaLSbAJDOH04jQmGXG0gpm9lnvZY
  6. debug1: private host key #2: ssh-ed25519 SHA256:vN1sl1+Bc68MId8Y8iL1HQrVOMW/jIkIceUiGa7ds+w
  7. debug1: rexec_argv[0]='/usr/sbin/sshd'
  8. debug1: rexec_argv[1]='-dDp222'
  9. debug1: Set /proc/self/oom_score_adj from 0 to -1000
  10. debug1: Bind to port 222 on 0.0.0.0.
  11. Server listening on 0.0.0.0 port 222.
  12. debug1: Bind to port 222 on ::.
  13. Server listening on :: port 222.
  14. debug1: Server will not fork when running in debugging mode.
  15. debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
  16. debug1: sshd version OpenSSH_8.9, OpenSSL 3.0.2 15 Mar 2022
  17. debug1: private host key #0: ssh-rsa SHA256:xv7AudxEOymuuyEDbg9e5m8Pi8wV3avTB5CQUMz+rEU
  18. debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:A6kGYaWfqxHwIvbfaLSbAJDOH04jQmGXG0gpm9lnvZY
  19. debug1: private host key #2: ssh-ed25519 SHA256:vN1sl1+Bc68MId8Y8iL1HQrVOMW/jIkIceUiGa7ds+w
  20. debug1: inetd sockets after dupping: 3, 3
  21. Connection from 192.168.0.167 port 41132 on 192.168.0.123 port 222 rdomain ""
  22. debug1: Local version string SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.1
  23. debug1: Remote protocol version 2.0, remote software version OpenSSH_9.0p1 Ubuntu-1ubuntu7.1
  24. debug1: compat_banner: match: OpenSSH_9.0p1 Ubuntu-1ubuntu7.1 pat OpenSSH* compat 0x04000000
  25. debug1: permanently_set_uid: 129/65534 [preauth]
  26. debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
  27. debug1: SSH2_MSG_KEXINIT sent [preauth]
  28. debug1: SSH2_MSG_KEXINIT received [preauth]
  29. debug1: kex: algorithm: [email protected] [preauth]
  30. debug1: kex: host key algorithm: ssh-ed25519 [preauth]
  31. debug1: kex: client->server cipher: [email protected] MAC: <implicit> compression: none [preauth]
  32. debug1: kex: server->client cipher: [email protected] MAC: <implicit> compression: none [preauth]
  33. debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
  34. debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth]
  35. debug1: rekey out after 134217728 blocks [preauth]
  36. debug1: SSH2_MSG_NEWKEYS sent [preauth]
  37. debug1: Sending SSH2_MSG_EXT_INFO [preauth]
  38. debug1: expecting SSH2_MSG_NEWKEYS [preauth]
  39. debug1: SSH2_MSG_NEWKEYS received [preauth]
  40. debug1: rekey in after 134217728 blocks [preauth]
  41. debug1: KEX done [preauth]
  42. debug1: userauth-request for user $USER service ssh-connection method none [preauth]
  43. debug1: attempt 0 failures 0 [preauth]
  44. debug1: PAM: initializing for "$USER"
  45. debug1: PAM: setting PAM_RHOST to "192.168.0.167"
  46. debug1: PAM: setting PAM_TTY to "ssh"
  47. debug1: userauth-request for user $USER service ssh-connection method publickey [preauth]
  48. debug1: attempt 1 failures 0 [preauth]
  49. debug1: userauth_pubkey: publickey test pkalg rsa-sha2-512 pkblob RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y [preauth]
  50. debug1: temporarily_use_uid: 1000/1000 (e=0/0)
  51. debug1: trying public key file /home/$USER/.ssh/authorized_keys
  52. debug1: fd 4 clearing O_NONBLOCK
  53. debug1: /home/$USER/.ssh/authorized_keys:8: matching key found: RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y
  54. debug1: /home/$USER/.ssh/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
  55. Accepted key RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y found at /home/$USER/.ssh/authorized_keys:8
  56. debug1: restore_uid: 0/0
  57. Postponed publickey for $USER from 192.168.0.167 port 41132 ssh2 [preauth]
  58. debug1: userauth-request for user $USER service ssh-connection method [email protected] [preauth]
  59. debug1: attempt 2 failures 0 [preauth]
  60. debug1: temporarily_use_uid: 1000/1000 (e=0/0)
  61. debug1: trying public key file /home/$USER/.ssh/authorized_keys
  62. debug1: fd 4 clearing O_NONBLOCK
  63. debug1: /home/$USER/.ssh/authorized_keys:8: matching key found: RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y
  64. debug1: /home/$USER/.ssh/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
  65. Accepted key RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y found at /home/$USER/.ssh/authorized_keys:8
  66. debug1: restore_uid: 0/0
  67. debug1: auth_activate_options: setting new authentication options
  68. debug1: do_pam_account: called
  69. Accepted publickey for $USER from 192.168.0.167 port 41132 ssh2: RSA SHA256:UdYccESqmCDayT66Azfj3UJ/6GmYaHO7OZpsZwE+81Y
  70. debug1: monitor_child_preauth: user $USER authenticated by privileged process
  71. debug1: auth_activate_options: setting new authentication options [preauth]
  72. debug1: monitor_read_log: child log fd closed
  73. debug1: PAM: establishing credentials
  74. User child is on pid 83124
  75. debug1: SELinux support disabled
  76. debug1: PAM: establishing credentials
  77. debug1: permanently_set_uid: 1000/1000
  78. debug1: rekey in after 134217728 blocks
  79. debug1: rekey out after 134217728 blocks
  80. debug1: ssh_packet_set_postauth: called
  81. debug1: active: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
  82. debug1: Entering interactive session for SSH2.
  83. debug1: server_init_dispatch
  84. debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
  85. debug1: input_session_request
  86. debug1: channel 0: new [server-session]
  87. debug1: session_new: session 0
  88. debug1: session_open: channel 0
  89. debug1: session_open: session 0: link with channel 0
  90. debug1: server_input_channel_open: confirm session
  91. debug1: server_input_global_request: rtype [email protected] want_reply 0
  92. debug1: server_input_channel_req: channel 0 request pty-req reply 1
  93. debug1: session_by_channel: session 0 channel 0
  94. debug1: session_input_channel_req: session 0 req pty-req
  95. debug1: Allocating pty.
  96. debug1: session_new: session 0
  97. debug1: SELinux support disabled
  98. debug1: session_pty_req: session 0 alloc /dev/pts/8
  99. debug1: server_input_channel_req: channel 0 request env reply 0
  100. debug1: session_by_channel: session 0 channel 0
  101. debug1: session_input_channel_req: session 0 req env
  102. debug1: server_input_channel_req: channel 0 request shell reply 1
  103. debug1: session_by_channel: session 0 channel 0
  104. debug1: session_input_channel_req: session 0 req shell
  105. Starting session: shell on pts/8 for $USER from 192.168.0.167 port 41132 id 0
  106. debug1: Setting controlling tty using TIOCSCTTY.
  107. debug1: Received SIGCHLD.
  108. debug1: session_by_pid: pid 83125
  109. debug1: session_exit_message: session 0 channel 0 pid 83125
  110. debug1: session_exit_message: release channel 0
  111. debug1: session_by_tty: session 0 tty /dev/pts/8
  112. debug1: session_pty_cleanup2: session 0 release /dev/pts/8
  113. Received disconnect from 192.168.0.167 port 41132:11: disconnected by user
  114. Disconnected from user $USER 192.168.0.167 port 41132
  115. debug1: do_cleanup
  116. debug1: temporarily_use_uid: 1000/1000 (e=1000/1000)
  117. debug1: restore_uid: (unprivileged)
  118. debug1: do_cleanup
  119. debug1: PAM: cleanup
  120. debug1: PAM: closing session
  121. debug1: PAM: deleting credentials
  122. debug1: temporarily_use_uid: 1000/1000 (e=0/0)
  123. debug1: restore_uid: 0/0
  124. debug1: audit_event: unhandled event 12
  125.  
Add Comment
Please, Sign In to add comment