Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [root@voip ssh]# tail -f /var/log/secure
- Nov 29 19:01:30 voip sshd[7969]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
- Nov 29 19:01:30 voip sshd[7969]: debug3: mm_request_receive_expect entering: type 39
- Nov 29 19:01:30 voip sshd[7969]: debug3: mm_request_receive entering
- Nov 29 19:01:30 voip sshd[7969]: debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
- Nov 29 19:02:02 voip sshd[7969]: Connection closed by 192.168.1.100
- Nov 29 19:02:02 voip sshd[7969]: debug1: do_cleanup
- Nov 29 19:02:02 voip sshd[7969]: debug3: PAM: sshpam_thread_cleanup entering
- Nov 29 19:02:02 voip sshd[7968]: debug1: do_cleanup
- Nov 29 19:02:02 voip sshd[7968]: debug1: PAM: cleanup
- Nov 29 19:02:02 voip sshd[7968]: debug3: PAM: sshpam_thread_cleanup entering
- Nov 29 19:02:17 voip sshd[7960]: debug3: fd 5 is not O_NONBLOCK
- Nov 29 19:02:17 voip sshd[8048]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
- Nov 29 19:02:17 voip sshd[7960]: debug1: Forked child 8048.
- Nov 29 19:02:17 voip sshd[7960]: debug3: send_rexec_state: entering fd = 8 config len 601
- Nov 29 19:02:17 voip sshd[7960]: debug3: ssh_msg_send: type 0
- Nov 29 19:02:17 voip sshd[7960]: debug3: send_rexec_state: done
- Nov 29 19:02:17 voip sshd[8048]: debug1: inetd sockets after dupping: 3, 3
- Nov 29 19:02:17 voip sshd[8048]: Connection from 192.168.1.100 port 42366
- Nov 29 19:02:17 voip sshd[8048]: debug1: Client protocol version 2.0; client software version OpenSSH_6.9p1 Ubuntu-2
- Nov 29 19:02:17 voip sshd[8048]: debug1: match: OpenSSH_6.9p1 Ubuntu-2 pat OpenSSH*
- Nov 29 19:02:17 voip sshd[8048]: debug1: Enabling compatibility mode for protocol 2.0
- Nov 29 19:02:17 voip sshd[8048]: debug1: Local version string SSH-2.0-OpenSSH_4.3
- Nov 29 19:02:17 voip sshd[8048]: debug2: fd 3 setting O_NONBLOCK
- Nov 29 19:02:17 voip sshd[8049]: debug3: privsep user:group 74:74
- Nov 29 19:02:17 voip sshd[8049]: debug1: permanently_set_uid: 74/74
- Nov 29 19:02:17 voip sshd[8049]: debug1: list_hostkey_types: ssh-rsa,ssh-dss
- Nov 29 19:02:17 voip sshd[8049]: debug1: SSH2_MSG_KEXINIT sent
- Nov 29 19:02:17 voip sshd[8049]: debug1: SSH2_MSG_KEXINIT received
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: none,zlib@openssh.com
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: none,zlib@openssh.com
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit:
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit:
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: first_kex_follows 0
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: reserved 0
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm@openssh.com,hmac-ripemd160-etm@openssh.com,hmac-sha1-96-etm@openssh.com,hmac-md5-96-etm@openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit:
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit:
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: first_kex_follows 0
- Nov 29 19:02:17 voip sshd[8049]: debug2: kex_parse_kexinit: reserved 0
- Nov 29 19:02:17 voip sshd[8049]: debug2: mac_init: found hmac-sha1
- Nov 29 19:02:17 voip sshd[8049]: debug1: kex: client->server aes128-ctr hmac-sha1 none
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_send entering: type 2
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 3
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive entering
- Nov 29 19:02:17 voip sshd[8048]: debug2: Network child is on pid 8049
- Nov 29 19:02:17 voip sshd[8048]: debug3: preauth child monitor started
- Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:17 voip sshd[8048]: debug3: monitor_read: checking request 2
- Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_send entering: type 3
- Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:17 voip sshd[8049]: debug2: mac_init: found hmac-sha1
- Nov 29 19:02:17 voip sshd[8049]: debug1: kex: server->client aes128-ctr hmac-sha1 none
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_send entering: type 2
- Nov 29 19:02:17 voip sshd[8048]: debug3: monitor_read: checking request 2
- Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_send entering: type 3
- Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 3
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive entering
- Nov 29 19:02:17 voip sshd[8049]: debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_send entering: type 17
- Nov 29 19:02:17 voip sshd[8048]: debug3: monitor_read: checking request 17
- Nov 29 19:02:17 voip sshd[8048]: debug3: mm_answer_moduli: got parameters: 1024 7680 8192
- Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_send entering: type 18
- Nov 29 19:02:17 voip sshd[8048]: debug2: monitor_read: 17 used once, disabling now
- Nov 29 19:02:17 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 18
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_request_receive entering
- Nov 29 19:02:17 voip sshd[8049]: debug3: mm_choose_dh: remaining 0
- Nov 29 19:02:17 voip sshd[8049]: debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
- Nov 29 19:02:17 voip sshd[8049]: debug2: dh_gen_key: priv key bits set: 175/320
- Nov 29 19:02:17 voip sshd[8049]: debug2: bits set: 3111/6144
- Nov 29 19:02:17 voip sshd[8049]: debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
- Nov 29 19:02:17 voip sshd[8049]: debug2: bits set: 3023/6144
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_key_sign entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 22
- Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 22
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_sign
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_sign: signature 0x8866b30(271)
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_send entering: type 23
- Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 22 used once, disabling now
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 23
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
- Nov 29 19:02:18 voip sshd[8049]: debug2: kex_derive_keys
- Nov 29 19:02:18 voip sshd[8049]: debug2: set_newkeys: mode 1
- Nov 29 19:02:18 voip sshd[8049]: debug1: SSH2_MSG_NEWKEYS sent
- Nov 29 19:02:18 voip sshd[8049]: debug1: expecting SSH2_MSG_NEWKEYS
- Nov 29 19:02:18 voip sshd[8049]: debug2: set_newkeys: mode 0
- Nov 29 19:02:18 voip sshd[8049]: debug1: SSH2_MSG_NEWKEYS received
- Nov 29 19:02:18 voip sshd[8049]: debug1: KEX done
- Nov 29 19:02:18 voip sshd[8049]: debug1: userauth-request for user asterisk service ssh-connection method none
- Nov 29 19:02:18 voip sshd[8049]: debug1: attempt 0 failures 0
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_getpwnamallow entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 24
- Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 24
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_pwnamallow
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_send entering: type 25
- Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 24 used once, disabling now
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 25
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug2: input_userauth_request: setting up authctxt for asterisk
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_start_pam entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 6
- Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 6
- Nov 29 19:02:18 voip sshd[8048]: debug1: PAM: initializing for "asterisk"
- Nov 29 19:02:18 voip sshd[8048]: debug3: Trying to reverse map address 192.168.1.100.
- Nov 29 19:02:18 voip sshd[8048]: debug1: PAM: setting PAM_RHOST to "192.168.1.100"
- Nov 29 19:02:18 voip sshd[8048]: debug1: PAM: setting PAM_TTY to "ssh"
- Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 6 used once, disabling now
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_inform_authserv entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 20
- Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 20
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_authserv: service=ssh-connection, style=
- Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 20 used once, disabling now
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_inform_authrole entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 21
- Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 21
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_authrole: role=
- Nov 29 19:02:18 voip sshd[8048]: debug2: monitor_read: 21 used once, disabling now
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug2: input_userauth_request: try method none
- Nov 29 19:02:18 voip sshd[8049]: debug1: userauth-request for user asterisk service ssh-connection method publickey
- Nov 29 19:02:18 voip sshd[8049]: debug1: attempt 1 failures 1
- Nov 29 19:02:18 voip sshd[8049]: debug2: input_userauth_request: try method publickey
- Nov 29 19:02:18 voip sshd[8049]: debug1: test whether pkalg/pkblob are acceptable
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_key_allowed entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_send entering: type 38
- Nov 29 19:02:18 voip sshd[8048]: debug3: monitor_read: checking request 38
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_keyallowed entering
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_keyallowed: key_from_blob: 0x886bc30
- Nov 29 19:02:18 voip sshd[8048]: debug1: temporarily_use_uid: 100/101 (e=0/0)
- Nov 29 19:02:18 voip sshd[8048]: debug1: trying public key file /root/.ssh/authorized_keys
- Nov 29 19:02:18 voip sshd[8048]: debug1: restore_uid: 0/0
- Nov 29 19:02:18 voip sshd[8048]: debug1: temporarily_use_uid: 100/101 (e=0/0)
- Nov 29 19:02:18 voip sshd[8048]: debug1: trying public key file /root/.ssh/authorized_keys
- Nov 29 19:02:18 voip sshd[8048]: debug1: restore_uid: 0/0
- Nov 29 19:02:18 voip sshd[8048]: Failed publickey for asterisk from 192.168.1.100 port 42366 ssh2
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_answer_keyallowed: key 0x886bc30 is disallowed
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_send entering: type 39
- Nov 29 19:02:18 voip sshd[8048]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive_expect entering: type 39
- Nov 29 19:02:18 voip sshd[8049]: debug3: mm_request_receive entering
- Nov 29 19:02:18 voip sshd[8049]: debug2: userauth_pubkey: authenticated 0 pkalg ssh-dss
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement