Advertisement
Guest User

Untitled

a guest
Nov 29th, 2015
94
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.51 KB | None | 0 0
  1. [root@voip ssh]# tail -f /var/log/secure
  2. Nov 29 19:01:30 voip sshd[7969]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
  3. Nov 29 19:01:30 voip sshd[7969]: debug3: mm_request_receive_expect entering: type 39
  4. Nov 29 19:01:30 voip sshd[7969]: debug3: mm_request_receive entering
  5. Nov 29 19:01:30 voip sshd[7969]: debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
  6. Nov 29 19:02:02 voip sshd[7969]: Connection closed by 192.168.1.100
  7. Nov 29 19:02:02 voip sshd[7969]: debug1: do_cleanup
  8. Nov 29 19:02:02 voip sshd[7969]: debug3: PAM: sshpam_thread_cleanup entering
  9. Nov 29 19:02:02 voip sshd[7968]: debug1: do_cleanup
  10. Nov 29 19:02:02 voip sshd[7968]: debug1: PAM: cleanup
  11. Nov 29 19:02:02 voip sshd[7968]: debug3: PAM: sshpam_thread_cleanup entering
  12. Nov 29 19:02:17 voip sshd[7960]: debug3: fd 5 is not O_NONBLOCK
  13. Nov 29 19:02:17 voip sshd[8048]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  14. Nov 29 19:02:17 voip sshd[7960]: debug1: Forked child 8048.
  15. Nov 29 19:02:17 voip sshd[7960]: debug3: send_rexec_state: entering fd = 8 config len 601
  16. Nov 29 19:02:17 voip sshd[7960]: debug3: ssh_msg_send: type 0
  17. Nov 29 19:02:17 voip sshd[7960]: debug3: send_rexec_state: done
  18. Nov 29 19:02:17 voip sshd[8048]: debug1: inetd sockets after dupping: 3, 3
  19. Nov 29 19:02:17 voip sshd[8048]: Connection from 192.168.1.100 port 42366
  20. Nov 29 19:02:17 voip sshd[8048]: debug1: Client protocol version 2.0; client software version OpenSSH_6.9p1 Ubuntu-2
  21. Nov 29 19:02:17 voip sshd[8048]: debug1: match: OpenSSH_6.9p1 Ubuntu-2 pat OpenSSH*
  22. Nov 29 19:02:17 voip sshd[8048]: debug1: Enabling compatibility mode for protocol 2.0
  23. Nov 29 19:02:17 voip sshd[8048]: debug1: Local version string SSH-2.0-OpenSSH_4.3
  24. Nov 29 19:02:17 voip sshd[8048]: debug2: fd 3 setting O_NONBLOCK
  25. Nov 29 19:02:17 voip sshd[8049]: debug3: privsep user:group 74:74
  26. Nov 29 19:02:17 voip sshd[8049]: debug1: permanently_set_uid: 74/74
  27. Nov 29 19:02:17 voip sshd[8049]: debug1: list_hostkey_types: ssh-rsa,ssh-dss
  28. Nov 29 19:02:17 voip sshd[8049]: debug1: SSH2_MSG_KEXINIT sent
  29. Nov 29 19:02:17 voip sshd[8049]: debug1: SSH2_MSG_KEXINIT received
  30. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  31. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
  32. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  33. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  34. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  35. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  36. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: none,zlib@openssh.com
  37. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: none,zlib@openssh.com
  38. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit:
  39. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit:
  40. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: first_kex_follows 0
  41. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: reserved 0
  42. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
  43. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
  44. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  45. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
  46. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  47. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
  48. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  49. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
  50. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit:
  51. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit:
  52. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: first_kex_follows 0
  53. Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: reserved 0
  54. Nov 29 19:02:17 voip sshd[8049]: debug2: mac_init: found hmac-sha1
  55. Nov 29 19:02:17 voip sshd[8049]: debug1: kex: client->server aes128-ctr hmac-sha1 none
  56. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_send entering: type 2
  57. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 3
  58. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive entering
  59. Nov 29 19:02:17 voip sshd[8048]: debug2: Network child is on pid 8049
  60. Nov 29 19:02:17 voip sshd[8048]: debug3: preauth child monitor started
  61. Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_receive entering
  62. Nov 29 19:02:17 voip sshd[8048]: debug3: monitor_read: checking request 2
  63. Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_send entering: type 3
  64. Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_receive entering
  65. Nov 29 19:02:17 voip sshd[8049]: debug2: mac_init: found hmac-sha1
  66. Nov 29 19:02:17 voip sshd[8049]: debug1: kex: server->client aes128-ctr hmac-sha1 none
  67. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_send entering: type 2
  68. Nov 29 19:02:17 voip sshd[8048]: debug3: monitor_read: checking request 2
  69. Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_send entering: type 3
  70. Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_receive entering
  71. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 3
  72. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive entering
  73. Nov 29 19:02:17 voip sshd[8049]: debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
  74. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_send entering: type 17
  75. Nov 29 19:02:17 voip sshd[8048]: debug3: monitor_read: checking request 17
  76. Nov 29 19:02:17 voip sshd[8048]: debug3: mm_answer_moduli: got parameters: 1024 7680 8192
  77. Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_send entering: type 18
  78. Nov 29 19:02:17 voip sshd[8048]: debug2: monitor_read: 17 used once, disabling now
  79. Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_receive entering
  80. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI
  81. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 18
  82. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive entering
  83. Nov 29 19:02:17 voip sshd[8049]: debug3: mm_choose_dh: remaining 0
  84. Nov 29 19:02:17 voip sshd[8049]: debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
  85. Nov 29 19:02:17 voip sshd[8049]: debug2: dh_gen_key: priv key bits set: 175/320
  86. Nov 29 19:02:17 voip sshd[8049]: debug2: bits set: 3111/6144
  87. Nov 29 19:02:17 voip sshd[8049]: debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
  88. Nov 29 19:02:17 voip sshd[8049]: debug2: bits set: 3023/6144
  89. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_key_sign entering
  90. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 22
  91. Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 22
  92. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_sign
  93. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_sign: signature 0x8866b30(271)
  94. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_send entering: type 23
  95. Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 22 used once, disabling now
  96. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
  97. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
  98. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 23
  99. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive entering
  100. Nov 29 19:02:18 voip sshd[8049]: debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
  101. Nov 29 19:02:18 voip sshd[8049]: debug2: kex_derive_keys
  102. Nov 29 19:02:18 voip sshd[8049]: debug2: set_newkeys: mode 1
  103. Nov 29 19:02:18 voip sshd[8049]: debug1: SSH2_MSG_NEWKEYS sent
  104. Nov 29 19:02:18 voip sshd[8049]: debug1: expecting SSH2_MSG_NEWKEYS
  105. Nov 29 19:02:18 voip sshd[8049]: debug2: set_newkeys: mode 0
  106. Nov 29 19:02:18 voip sshd[8049]: debug1: SSH2_MSG_NEWKEYS received
  107. Nov 29 19:02:18 voip sshd[8049]: debug1: KEX done
  108. Nov 29 19:02:18 voip sshd[8049]: debug1: userauth-request for user asterisk service ssh-connection method none
  109. Nov 29 19:02:18 voip sshd[8049]: debug1: attempt 0 failures 0
  110. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_getpwnamallow entering
  111. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 24
  112. Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 24
  113. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_pwnamallow
  114. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  115. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_send entering: type 25
  116. Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 24 used once, disabling now
  117. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
  118. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
  119. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 25
  120. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive entering
  121. Nov 29 19:02:18 voip sshd[8049]: debug2: input_userauth_request: setting up authctxt for asterisk
  122. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_start_pam entering
  123. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 6
  124. Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 6
  125. Nov 29 19:02:18 voip sshd[8048]: debug1: PAM: initializing for "asterisk"
  126. Nov 29 19:02:18 voip sshd[8048]: debug3: Trying to reverse map address 192.168.1.100.
  127. Nov 29 19:02:18 voip sshd[8048]: debug1: PAM: setting PAM_RHOST to "192.168.1.100"
  128. Nov 29 19:02:18 voip sshd[8048]: debug1: PAM: setting PAM_TTY to "ssh"
  129. Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 6 used once, disabling now
  130. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
  131. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_inform_authserv entering
  132. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 20
  133. Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 20
  134. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_authserv: service=ssh-connection, style=
  135. Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 20 used once, disabling now
  136. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
  137. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_inform_authrole entering
  138. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 21
  139. Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 21
  140. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_authrole: role=
  141. Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 21 used once, disabling now
  142. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
  143. Nov 29 19:02:18 voip sshd[8049]: debug2: input_userauth_request: try method none
  144. Nov 29 19:02:18 voip sshd[8049]: debug1: userauth-request for user asterisk service ssh-connection method publickey
  145. Nov 29 19:02:18 voip sshd[8049]: debug1: attempt 1 failures 1
  146. Nov 29 19:02:18 voip sshd[8049]: debug2: input_userauth_request: try method publickey
  147. Nov 29 19:02:18 voip sshd[8049]: debug1: test whether pkalg/pkblob are acceptable
  148. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_key_allowed entering
  149. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 38
  150. Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 38
  151. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_keyallowed entering
  152. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_keyallowed: key_from_blob: 0x886bc30
  153. Nov 29 19:02:18 voip sshd[8048]: debug1: temporarily_use_uid: 100/101 (e=0/0)
  154. Nov 29 19:02:18 voip sshd[8048]: debug1: trying public key file /root/.ssh/authorized_keys
  155. Nov 29 19:02:18 voip sshd[8048]: debug1: restore_uid: 0/0
  156. Nov 29 19:02:18 voip sshd[8048]: debug1: temporarily_use_uid: 100/101 (e=0/0)
  157. Nov 29 19:02:18 voip sshd[8048]: debug1: trying public key file /root/.ssh/authorized_keys
  158. Nov 29 19:02:18 voip sshd[8048]: debug1: restore_uid: 0/0
  159. Nov 29 19:02:18 voip sshd[8048]: Failed publickey for asterisk from 192.168.1.100 port 42366 ssh2
  160. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_keyallowed: key 0x886bc30 is disallowed
  161. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_send entering: type 39
  162. Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
  163. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
  164. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 39
  165. Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive entering
  166. Nov 29 19:02:18 voip sshd[8049]: debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement