SHARE
TWEET

Untitled

a guest Aug 18th, 2018 153 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. debug2: load_server_config: filename /opt/ianalyse_test/etc/ssh/sshd_config
  2. debug2: load_server_config: done config len = 1822
  3. debug2: parse_server_config: config /opt/ianalyse_test/etc/ssh/sshd_config len 1822
  4. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:14 setting Port 8873
  5. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:23 setting HostKey /opt/ianalyse_test/etc/ssh/ssh_host_ed25519_key
  6. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:33 setting SyslogFacility AUTH
  7. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:34 setting LogLevel INFO
  8. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:37 setting LoginGraceTime 30s
  9. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:38 setting PermitRootLogin no
  10. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:39 setting StrictModes yes
  11. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:40 setting MaxAuthTries 3
  12. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:41 setting MaxSessions 3
  13. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:43 setting PubkeyAuthentication yes
  14. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:52 setting AuthorizedKeysFile none
  15. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:53 setting AuthorizedKeysCommand /opt/ianalyse_test/libexec/authorized_key_from_pg %u %t %k
  16. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:54 setting AuthorizedKeysCommandUser nobody
  17. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:56 setting RevokedKeys /opt/ianalyse_test/etc/ssh/revoked_keys
  18. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:58 setting AuthorizedPrincipalsFile none
  19. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:64 setting HostbasedAuthentication no
  20. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:67 setting IgnoreUserKnownHosts yes
  21. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:70 setting IgnoreRhosts yes
  22. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:73 setting PasswordAuthentication no
  23. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:74 setting PermitEmptyPasswords no
  24. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:76 setting KbdInteractiveAuthentication no
  25. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:100 setting UsePAM no
  26. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:102 setting AllowAgentForwarding no
  27. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:103 setting AllowStreamLocalForwarding no
  28. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:104 setting AllowTcpForwarding no
  29. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:107 setting ChrootDirectory /Users/ianalyse_test/data/%u
  30. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:109 setting AuthenticationMethods publickey
  31. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:111 setting DisableForwarding yes
  32. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:112 setting GatewayPorts no
  33. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:113 setting X11Forwarding no
  34. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:114 setting X11UseLocalhost no
  35. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:115 setting XAuthLocation none
  36. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:117 setting Compression yes
  37. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:119 setting ClientAliveInterval 6
  38. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:120 setting ClientAliveCountMax 5
  39. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:122 setting PermitTTY no
  40. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:123 setting PrintMotd no
  41. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:124 setting PrintLastLog no
  42. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:125 setting TCPKeepAlive yes
  43. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:127 setting PermitUserEnvironment no
  44. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:128 setting PermitUserRC no
  45. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:131 setting UseDNS yes
  46. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:132 setting PidFile /var/run/ianalyse_test_sshd.pid
  47. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:134 setting PermitTunnel no
  48. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:135 setting VersionAddendum IAnalyse 0.0 (test)
  49. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:138 setting AcceptEnv LANG LC_*
  50. debug3: /opt/ianalyse_test/etc/ssh/sshd_config:141 setting Banner none
  51. debug1: sshd version OpenSSH_7.6, LibreSSL 2.6.2
  52. debug1: private host key #0: ssh-ed25519 SHA256:HCAkOjSZM+zEZqjm9HjOXIEoO08qfnsgNlHDUTpNI4w
  53. debug1: setgroups() failed: Operation not permitted
  54. debug1: rexec_argv[0]='/usr/sbin/sshd'
  55. debug1: rexec_argv[1]='-D'
  56. debug1: rexec_argv[2]='-f'
  57. debug1: rexec_argv[3]='/opt/ianalyse_test/etc/ssh/sshd_config'
  58. debug1: rexec_argv[4]='-E'
  59. debug1: rexec_argv[5]='/opt/ianalyse_test/var/log/sshd.log'
  60. debug1: rexec_argv[6]='-d'
  61. debug1: rexec_argv[7]='-d'
  62. debug1: rexec_argv[8]='-d'
  63. debug2: fd 5 setting O_NONBLOCK
  64. debug3: sock_set_v6only: set socket 5 IPV6_V6ONLY
  65. debug1: Bind to port 8873 on ::.
  66. Server listening on :: port 8873.
  67. debug2: fd 6 setting O_NONBLOCK
  68. debug1: Bind to port 8873 on 0.0.0.0.
  69. Server listening on 0.0.0.0 port 8873.
  70. debug1: fd 7 clearing O_NONBLOCK
  71. debug1: Server will not fork when running in debugging mode.
  72. debug3: send_rexec_state: entering fd = 10 config len 1822
  73. debug3: ssh_msg_send: type 0
  74. debug3: send_rexec_state: done
  75. debug1: rexec start in 7 out 7 newsock 7 pipe -1 sock 10
  76. debug3: recv_rexec_state: entering fd = 5
  77. debug3: ssh_msg_recv entering
  78. debug3: recv_rexec_state: done
  79. debug2: parse_server_config: config rexec len 1822
  80. debug3: rexec:14 setting Port 8873
  81. debug3: rexec:23 setting HostKey /opt/ianalyse_test/etc/ssh/ssh_host_ed25519_key
  82. debug3: rexec:33 setting SyslogFacility AUTH
  83. debug3: rexec:34 setting LogLevel INFO
  84. debug3: rexec:37 setting LoginGraceTime 30s
  85. debug3: rexec:38 setting PermitRootLogin no
  86. debug3: rexec:39 setting StrictModes yes
  87. debug3: rexec:40 setting MaxAuthTries 3
  88. debug3: rexec:41 setting MaxSessions 3
  89. debug3: rexec:43 setting PubkeyAuthentication yes
  90. debug3: rexec:52 setting AuthorizedKeysFile none
  91. debug3: rexec:53 setting AuthorizedKeysCommand /opt/ianalyse_test/libexec/authorized_key_from_pg %u %t %k
  92. debug3: rexec:54 setting AuthorizedKeysCommandUser nobody
  93. debug3: rexec:56 setting RevokedKeys /opt/ianalyse_test/etc/ssh/revoked_keys
  94. debug3: rexec:58 setting AuthorizedPrincipalsFile none
  95. debug3: rexec:64 setting HostbasedAuthentication no
  96. debug3: rexec:67 setting IgnoreUserKnownHosts yes
  97. debug3: rexec:70 setting IgnoreRhosts yes
  98. debug3: rexec:73 setting PasswordAuthentication no
  99. debug3: rexec:74 setting PermitEmptyPasswords no
  100. debug3: rexec:76 setting KbdInteractiveAuthentication no
  101. debug3: rexec:100 setting UsePAM no
  102. debug3: rexec:102 setting AllowAgentForwarding no
  103. debug3: rexec:103 setting AllowStreamLocalForwarding no
  104. debug3: rexec:104 setting AllowTcpForwarding no
  105. debug3: rexec:107 setting ChrootDirectory /Users/ianalyse_test/data/%u
  106. debug3: rexec:109 setting AuthenticationMethods publickey
  107. debug3: rexec:111 setting DisableForwarding yes
  108. debug3: rexec:112 setting GatewayPorts no
  109. debug3: rexec:113 setting X11Forwarding no
  110. debug3: rexec:114 setting X11UseLocalhost no
  111. debug3: rexec:115 setting XAuthLocation none
  112. debug3: rexec:117 setting Compression yes
  113. debug3: rexec:119 setting ClientAliveInterval 6
  114. debug3: rexec:120 setting ClientAliveCountMax 5
  115. debug3: rexec:122 setting PermitTTY no
  116. debug3: rexec:123 setting PrintMotd no
  117. debug3: rexec:124 setting PrintLastLog no
  118. debug3: rexec:125 setting TCPKeepAlive yes
  119. debug3: rexec:127 setting PermitUserEnvironment no
  120. debug3: rexec:128 setting PermitUserRC no
  121. debug3: rexec:131 setting UseDNS yes
  122. debug3: rexec:132 setting PidFile /var/run/ianalyse_test_sshd.pid
  123. debug3: rexec:134 setting PermitTunnel no
  124. debug3: rexec:135 setting VersionAddendum IAnalyse 0.0 (test)
  125. debug3: rexec:138 setting AcceptEnv LANG LC_*
  126. debug3: rexec:141 setting Banner none
  127. debug1: sshd version OpenSSH_7.6, LibreSSL 2.6.2
  128. debug1: private host key #0: ssh-ed25519 SHA256:HCAkOjSZM+zEZqjm9HjOXIEoO08qfnsgNlHDUTpNI4w
  129. debug1: setgroups() failed: Operation not permitted
  130. debug1: inetd sockets after dupping: 5, 5
  131. debug3: BSM audit: connection from ::1 port 62265
  132. debug3: BSM audit: iptype 16 machine ID 00000000 00000000 00000000 01000000
  133. Connection from ::1 port 62265 on ::1 port 8873
  134. debug1: Client protocol version 2.0; client software version OpenSSH_7.6
  135. debug1: match: OpenSSH_7.6 pat OpenSSH* compat 0x04000000
  136. debug1: Local version string SSH-2.0-OpenSSH_7.6 IAnalyse 0.0 (test)
  137. debug2: fd 5 setting O_NONBLOCK
  138. debug3: ssh_sandbox_init: preparing Darwin sandbox
  139. debug2: Network child is on pid 3428
  140. debug3: preauth child monitor started
  141. debug3: ssh_sandbox_child: starting Darwin sandbox [preauth]
  142. debug1: list_hostkey_types: ssh-ed25519 [preauth]
  143. debug3: send packet: type 20 [preauth]
  144. debug1: SSH2_MSG_KEXINIT sent [preauth]
  145. debug3: receive packet: type 20 [preauth]
  146. debug1: SSH2_MSG_KEXINIT received [preauth]
  147. debug2: local server KEXINIT proposal [preauth]
  148. debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1 [preauth]
  149. debug2: host key algorithms: ssh-ed25519 [preauth]
  150. debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
  151. debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
  152. debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
  153. debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
  154. debug2: compression ctos: none,zlib@openssh.com [preauth]
  155. debug2: compression stoc: none,zlib@openssh.com [preauth]
  156. debug2: languages ctos:  [preauth]
  157. debug2: languages stoc:  [preauth]
  158. debug2: first_kex_follows 0  [preauth]
  159. debug2: reserved 0  [preauth]
  160. debug2: peer client KEXINIT proposal [preauth]
  161. debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c [preauth]
  162. debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
  163. debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
  164. debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
  165. debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
  166. debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
  167. debug2: compression ctos: zlib@openssh.com,zlib,none [preauth]
  168. debug2: compression stoc: zlib@openssh.com,zlib,none [preauth]
  169. debug2: languages ctos:  [preauth]
  170. debug2: languages stoc:  [preauth]
  171. debug2: first_kex_follows 0  [preauth]
  172. debug2: reserved 0  [preauth]
  173. debug1: kex: algorithm: curve25519-sha256 [preauth]
  174. debug1: kex: host key algorithm: ssh-ed25519 [preauth]
  175. debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: zlib@openssh.com [preauth]
  176. debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: zlib@openssh.com [preauth]
  177. debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
  178. debug3: receive packet: type 30 [preauth]
  179. debug3: mm_key_sign entering [preauth]
  180. debug3: mm_request_send entering: type 6 [preauth]
  181. debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth]
  182. debug3: mm_request_receive_expect entering: type 7 [preauth]
  183. debug3: mm_request_receive entering [preauth]
  184. debug3: mm_request_receive entering
  185. debug3: monitor_read: checking request 6
  186. debug3: mm_answer_sign
  187. debug3: mm_answer_sign: hostkey proof signature 0x7fc6ad2015a0(83)
  188. debug3: mm_request_send entering: type 7
  189. debug2: monitor_read: 6 used once, disabling now
  190. debug3: send packet: type 31 [preauth]
  191. debug3: send packet: type 21 [preauth]
  192. debug2: set_newkeys: mode 1 [preauth]
  193. debug1: rekey after 134217728 blocks [preauth]
  194. debug1: SSH2_MSG_NEWKEYS sent [preauth]
  195. debug1: expecting SSH2_MSG_NEWKEYS [preauth]
  196. debug3: send packet: type 7 [preauth]
  197. debug3: receive packet: type 21 [preauth]
  198. debug1: SSH2_MSG_NEWKEYS received [preauth]
  199. debug2: set_newkeys: mode 0 [preauth]
  200. debug1: rekey after 134217728 blocks [preauth]
  201. debug1: KEX done [preauth]
  202. debug3: receive packet: type 5 [preauth]
  203. debug3: send packet: type 6 [preauth]
  204. debug3: receive packet: type 50 [preauth]
  205. debug1: userauth-request for user ian-edf service ssh-connection method none [preauth]
  206. debug1: attempt 0 failures 0 [preauth]
  207. debug3: mm_getpwnamallow entering [preauth]
  208. debug3: mm_request_send entering: type 8 [preauth]
  209. debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
  210. debug3: mm_request_receive_expect entering: type 9 [preauth]
  211. debug3: mm_request_receive entering [preauth]
  212. debug3: mm_request_receive entering
  213. debug3: monitor_read: checking request 8
  214. debug3: mm_answer_pwnamallow
  215. debug3: Trying to reverse map address ::1.
  216. debug2: parse_server_config: config reprocess config len 1822
  217. Invalid user ian-edf from ::1 port 62265
  218. debug1: audit_event: unhandled event 9
  219. debug3: auth2_setup_methods_lists: checking methods
  220. debug1: authentication methods list 0: publickey
  221. debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
  222. debug3: mm_request_send entering: type 9
  223. debug2: monitor_read: 8 used once, disabling now
  224. debug3: mm_audit_event entering [preauth]
  225. debug3: mm_request_send entering: type 112 [preauth]
  226. debug3: mm_inform_authserv entering [preauth]
  227. debug3: mm_request_send entering: type 4 [preauth]
  228. debug3: auth2_setup_methods_lists: checking methods [preauth]
  229. debug1: authentication methods list 0: publickey [preauth]
  230. debug2: Unrecognized authentication method name: none [preauth]
  231. debug3: userauth_finish: failure partial=0 next methods="publickey" [preauth]
  232. debug3: send packet: type 51 [preauth]
  233. debug3: mm_request_receive entering
  234. debug3: monitor_read: checking request 112
  235. debug3: mm_answer_audit_event entering
  236. debug1: audit_event: unhandled event 9
  237. debug3: receive packet: type 50 [preauth]
  238. debug1: userauth-request for user ian-edf service ssh-connection method publickey [preauth]
  239. debug1: attempt 1 failures 0 [preauth]
  240. debug2: input_userauth_request: try method publickey [preauth]
  241. debug2: userauth_pubkey: disabled because of invalid user [preauth]
  242. debug3: userauth_finish: failure partial=0 next methods="publickey" [preauth]
  243. debug3: send packet: type 51 [preauth]
  244. debug3: mm_request_receive entering
  245. debug3: monitor_read: checking request 4
  246. debug3: mm_answer_authserv: service=ssh-connection, style=
  247. debug2: monitor_read: 4 used once, disabling now
  248. Connection closed by invalid user ian-edf ::1 port 62265 [preauth]
  249. debug1: do_cleanup [preauth]
  250. debug1: monitor_read_log: child log fd closed
  251. debug3: mm_request_receive entering
  252. debug1: do_cleanup
  253. debug1: Killing privsep child 3428
  254. debug1: audit_event: unhandled event 12
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top