Advertisement
Guest User

Untitled

a guest
May 7th, 2017
574
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 187.40 KB | None | 0 0
  1. Nov 8 18:50:31 VirtualDebian login[1919]: pam_unix(login:session): session opened for user vsh0t by (uid=0)
  2. Nov 8 18:50:38 VirtualDebian su[1975]: pam_unix(su:auth): authentication failure; logname=vsh0t uid=1000 euid=0 tty=tty1 ruser=vsh0t rhost= user=root
  3. Nov 8 18:50:40 VirtualDebian su[1975]: pam_authenticate: Authentication failure
  4. Nov 8 18:50:40 VirtualDebian su[1975]: FAILED su for root by vsh0t
  5. Nov 8 18:50:40 VirtualDebian su[1975]: - tty1 vsh0t:root
  6. Nov 8 18:50:41 VirtualDebian su[1976]: Successful su for root by vsh0t
  7. Nov 8 18:50:41 VirtualDebian su[1976]: + tty1 vsh0t:root
  8. Nov 8 18:50:41 VirtualDebian su[1976]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  9. Nov 8 18:50:52 VirtualDebian su[1976]: pam_unix(su:session): session closed for user root
  10. Nov 8 18:50:55 VirtualDebian login[1919]: pam_unix(login:session): session closed for user vsh0t
  11. Nov 8 18:52:20 VirtualDebian login[1921]: pam_unix(login:session): session opened for user vsh0t by LOGIN(uid=0)
  12. Nov 8 18:53:21 VirtualDebian su[1972]: Successful su for root by vsh0t
  13. Nov 8 18:53:21 VirtualDebian su[1972]: + tty1 vsh0t:root
  14. Nov 8 18:53:21 VirtualDebian su[1972]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  15. Nov 8 18:59:56 VirtualDebian su[1972]: pam_unix(su:session): session closed for user root
  16. Nov 8 19:01:06 VirtualDebian login[1924]: pam_unix(login:session): session opened for user root by (uid=0)
  17. Nov 8 19:01:06 VirtualDebian login[1970]: ROOT LOGIN on 'tty1'
  18. Nov 8 19:10:43 VirtualDebian login[1921]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
  19. Nov 8 19:10:43 VirtualDebian login[1964]: ROOT LOGIN on 'tty1'
  20. Nov 8 19:13:09 VirtualDebian login[1922]: pam_unix(login:session): session opened for user root by (uid=0)
  21. Nov 8 19:13:09 VirtualDebian login[2028]: ROOT LOGIN on 'tty1'
  22. Nov 8 19:14:14 VirtualDebian login[1919]: pam_unix(login:session): session opened for user root by (uid=0)
  23. Nov 8 19:14:14 VirtualDebian login[1968]: ROOT LOGIN on 'tty1'
  24. Nov 8 19:19:53 VirtualDebian login[1939]: pam_unix(login:session): session opened for user root by (uid=0)
  25. Nov 8 19:19:53 VirtualDebian login[1963]: ROOT LOGIN on 'tty1'
  26. Nov 8 19:29:50 VirtualDebian login[1920]: pam_unix(login:auth): check pass; user unknown
  27. Nov 8 19:29:50 VirtualDebian login[1920]: pam_unix(login:auth): authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost=
  28. Nov 8 19:29:53 VirtualDebian login[1920]: FAILED LOGIN (1) on 'tty1' FOR `UNKNOWN', User not known to the underlying authentication module
  29. Nov 8 19:29:54 VirtualDebian login[1920]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
  30. Nov 8 19:29:54 VirtualDebian login[1936]: ROOT LOGIN on 'tty1'
  31. Nov 8 19:31:24 VirtualDebian login[1920]: pam_unix(login:session): session opened for user root by (uid=0)
  32. Nov 8 19:31:24 VirtualDebian login[1936]: ROOT LOGIN on 'tty1'
  33. Nov 8 19:33:39 VirtualDebian login[1919]: pam_unix(login:session): session opened for user root by (uid=0)
  34. Nov 8 19:33:39 VirtualDebian login[1935]: ROOT LOGIN on 'tty1'
  35. Nov 8 19:44:25 VirtualDebian login[1938]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
  36. Nov 8 19:44:25 VirtualDebian login[1954]: ROOT LOGIN on 'tty1'
  37. Nov 8 19:49:12 VirtualDebian login[1926]: pam_unix(login:session): session opened for user root by (uid=0)
  38. Nov 8 19:49:12 VirtualDebian login[1943]: ROOT LOGIN on 'tty1'
  39. Nov 8 20:17:01 VirtualDebian CRON[1956]: pam_unix(cron:session): session opened for user root by (uid=0)
  40. Nov 8 20:17:01 VirtualDebian CRON[1956]: pam_unix(cron:session): session closed for user root
  41. Nov 8 21:17:01 VirtualDebian CRON[1962]: pam_unix(cron:session): session opened for user root by (uid=0)
  42. Nov 8 21:17:01 VirtualDebian CRON[1962]: pam_unix(cron:session): session closed for user root
  43. Nov 8 21:38:56 VirtualDebian login[1917]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
  44. Nov 8 21:38:56 VirtualDebian login[1933]: ROOT LOGIN on 'tty1'
  45. Nov 8 21:46:43 VirtualDebian login[1919]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
  46. Nov 8 21:46:43 VirtualDebian login[1935]: ROOT LOGIN on 'tty1'
  47. Nov 8 21:50:16 VirtualDebian login[1922]: pam_unix(login:session): session opened for user root by (uid=0)
  48. Nov 8 21:50:16 VirtualDebian login[1938]: ROOT LOGIN on 'tty1'
  49. Nov 8 22:12:53 VirtualDebian login[1921]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
  50. Nov 8 22:12:53 VirtualDebian login[1937]: ROOT LOGIN on 'tty1'
  51. Nov 8 22:17:01 VirtualDebian CRON[1947]: pam_unix(cron:session): session opened for user root by (uid=0)
  52. Nov 8 22:17:01 VirtualDebian CRON[1947]: pam_unix(cron:session): session closed for user root
  53. Nov 8 22:30:59 VirtualDebian su[2030]: Successful su for vsh0t by root
  54. Nov 8 22:30:59 VirtualDebian su[2030]: + tty1 root:vsh0t
  55. Nov 8 22:30:59 VirtualDebian su[2030]: pam_unix(su:session): session opened for user vsh0t by root(uid=0)
  56. Nov 8 23:17:01 VirtualDebian CRON[2049]: pam_unix(cron:session): session opened for user root by (uid=0)
  57. Nov 8 23:17:01 VirtualDebian CRON[2049]: pam_unix(cron:session): session closed for user root
  58. Nov 8 23:27:44 VirtualDebian su[2030]: pam_unix(su:session): session closed for user vsh0t
  59. Nov 10 19:40:45 VirtualDebian login[2007]: pam_unix(login:session): session opened for user root by (uid=0)
  60. Nov 10 19:40:45 VirtualDebian login[2031]: ROOT LOGIN on 'tty1'
  61. Nov 10 19:43:10 VirtualDebian login[2063]: pam_unix(login:session): session opened for user root by (uid=0)
  62. Nov 10 19:43:10 VirtualDebian login[2109]: ROOT LOGIN on 'tty1'
  63. Nov 10 19:43:13 VirtualDebian login[2063]: pam_unix(login:session): session closed for user root
  64. Nov 10 19:43:15 VirtualDebian login[2114]: pam_unix(login:auth): check pass; user unknown
  65. Nov 10 19:43:15 VirtualDebian login[2114]: pam_unix(login:auth): authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost=
  66. Nov 10 19:43:18 VirtualDebian login[2114]: FAILED LOGIN (1) on 'tty1' FOR `UNKNOWN', User not known to the underlying authentication module
  67. Nov 10 19:43:21 VirtualDebian login[2114]: pam_unix(login:session): session opened for user vsh0t by LOGIN(uid=0)
  68. Nov 10 19:43:24 VirtualDebian su[2136]: pam_unix(su:auth): authentication failure; logname=vsh0t uid=1000 euid=0 tty=tty1 ruser=vsh0t rhost= user=root
  69. Nov 10 19:43:26 VirtualDebian su[2136]: pam_authenticate: Authentication failure
  70. Nov 10 19:43:26 VirtualDebian su[2136]: FAILED su for root by vsh0t
  71. Nov 10 19:43:26 VirtualDebian su[2136]: - tty1 vsh0t:root
  72. Nov 10 19:43:39 VirtualDebian su[2138]: Successful su for root by vsh0t
  73. Nov 10 19:43:39 VirtualDebian su[2138]: + tty1 vsh0t:root
  74. Nov 10 19:43:39 VirtualDebian su[2138]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  75. Nov 10 19:44:58 VirtualDebian su[2138]: pam_unix(su:session): session closed for user root
  76. Nov 10 20:01:38 VirtualDebian su[2819]: pam_unix(su:auth): authentication failure; logname=vsh0t uid=1000 euid=0 tty=tty1 ruser=vsh0t rhost= user=root
  77. Nov 10 20:01:40 VirtualDebian su[2819]: pam_authenticate: Authentication failure
  78. Nov 10 20:01:40 VirtualDebian su[2819]: FAILED su for root by vsh0t
  79. Nov 10 20:01:40 VirtualDebian su[2819]: - tty1 vsh0t:root
  80. Nov 10 20:01:41 VirtualDebian su[2821]: Successful su for root by vsh0t
  81. Nov 10 20:01:41 VirtualDebian su[2821]: + tty1 vsh0t:root
  82. Nov 10 20:01:41 VirtualDebian su[2821]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  83. Nov 10 20:07:54 VirtualDebian groupadd[4486]: new group: name=messagebus, GID=106
  84. Nov 10 20:07:54 VirtualDebian useradd[4491]: new user: name=messagebus, UID=103, GID=106, home=/var/run/dbus, shell=/bin/false
  85. Nov 10 20:07:54 VirtualDebian usermod[4496]: change user `messagebus' password
  86. Nov 10 20:07:54 VirtualDebian chage[4501]: changed password expiry for messagebus
  87. Nov 10 20:08:09 VirtualDebian su[2821]: pam_unix(su:session): session closed for user root
  88. Nov 10 20:13:38 VirtualDebian su[5325]: Successful su for root by vsh0t
  89. Nov 10 20:13:38 VirtualDebian su[5325]: + tty1 vsh0t:root
  90. Nov 10 20:13:38 VirtualDebian su[5325]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  91. Nov 10 20:13:45 VirtualDebian su[5325]: pam_unix(su:session): session closed for user root
  92. Nov 10 20:14:04 VirtualDebian su[5434]: Successful su for root by vsh0t
  93. Nov 10 20:14:04 VirtualDebian su[5434]: + tty1 vsh0t:root
  94. Nov 10 20:14:04 VirtualDebian su[5434]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  95. Nov 10 20:14:14 VirtualDebian su[5434]: pam_unix(su:session): session closed for user root
  96. Nov 10 20:17:01 VirtualDebian CRON[5494]: pam_unix(cron:session): session opened for user root by (uid=0)
  97. Nov 10 20:17:01 VirtualDebian CRON[5494]: pam_unix(cron:session): session closed for user root
  98. Nov 10 20:19:30 VirtualDebian su[5679]: pam_unix(su:auth): authentication failure; logname=vsh0t uid=1000 euid=0 tty=pts/0 ruser=vsh0t rhost= user=root
  99. Nov 10 20:19:32 VirtualDebian su[5679]: pam_authenticate: Authentication failure
  100. Nov 10 20:19:32 VirtualDebian su[5679]: FAILED su for root by vsh0t
  101. Nov 10 20:19:32 VirtualDebian su[5679]: - pts/0 vsh0t:root
  102. Nov 10 20:19:36 VirtualDebian su[5680]: Successful su for root by vsh0t
  103. Nov 10 20:19:36 VirtualDebian su[5680]: + pts/0 vsh0t:root
  104. Nov 10 20:19:36 VirtualDebian su[5680]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  105. Nov 10 20:21:27 VirtualDebian su[5680]: pam_unix(su:session): session closed for user root
  106. Nov 10 20:21:47 VirtualDebian su[6069]: Successful su for root by vsh0t
  107. Nov 10 20:21:47 VirtualDebian su[6069]: + tty1 vsh0t:root
  108. Nov 10 20:21:47 VirtualDebian su[6069]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  109. Nov 10 20:24:00 VirtualDebian su[6069]: pam_unix(su:session): session closed for user root
  110. Nov 10 21:00:58 VirtualDebian login[2114]: pam_unix(login:session): session closed for user vsh0t
  111. Nov 10 21:02:04 VirtualDebian login[2088]: pam_unix(login:session): session opened for user root by (uid=0)
  112. Nov 10 21:02:04 VirtualDebian login[2134]: ROOT LOGIN on 'tty1'
  113. Nov 10 21:02:05 VirtualDebian login[2088]: pam_unix(login:session): session closed for user root
  114. Nov 10 21:02:11 VirtualDebian login[2140]: pam_unix(login:session): session opened for user vsh0t by LOGIN(uid=0)
  115. Nov 10 21:17:01 VirtualDebian CRON[2225]: pam_unix(cron:session): session opened for user root by (uid=0)
  116. Nov 10 21:17:01 VirtualDebian CRON[2225]: pam_unix(cron:session): session closed for user root
  117. Nov 10 21:24:10 VirtualDebian su[2235]: Successful su for root by vsh0t
  118. Nov 10 21:24:10 VirtualDebian su[2235]: + tty1 vsh0t:root
  119. Nov 10 21:24:10 VirtualDebian su[2235]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  120. Nov 10 21:24:15 VirtualDebian su[2235]: pam_unix(su:session): session closed for user root
  121. Nov 10 22:10:25 VirtualDebian login[2058]: pam_unix(login:auth): check pass; user unknown
  122. Nov 10 22:10:25 VirtualDebian login[2058]: pam_unix(login:auth): authentication failure; logname= uid=0 euid=0 tty=tty1 ruser= rhost=
  123. Nov 10 22:10:28 VirtualDebian login[2058]: FAILED LOGIN (1) on 'tty1' FOR `UNKNOWN', User not known to the underlying authentication module
  124. Nov 10 22:10:29 VirtualDebian login[2058]: pam_unix(login:auth): check pass; user unknown
  125. Nov 10 22:10:32 VirtualDebian login[2058]: FAILED LOGIN (2) on 'tty1' FOR `UNKNOWN', User not known to the underlying authentication module
  126. Nov 10 22:10:34 VirtualDebian login[2058]: pam_unix(login:session): session opened for user vsh0t by (uid=0)
  127. Nov 10 22:10:36 VirtualDebian su[2117]: Successful su for root by vsh0t
  128. Nov 10 22:10:36 VirtualDebian su[2117]: + tty1 vsh0t:root
  129. Nov 10 22:10:36 VirtualDebian su[2117]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  130. Nov 10 22:10:56 VirtualDebian useradd[2235]: new user: name=sshd, UID=104, GID=65534, home=/var/run/sshd, shell=/usr/sbin/nologin
  131. Nov 10 22:10:56 VirtualDebian usermod[2240]: change user `sshd' password
  132. Nov 10 22:10:56 VirtualDebian chage[2245]: changed password expiry for sshd
  133. Nov 10 22:10:56 VirtualDebian sshd[2276]: Server listening on :: port 22.
  134. Nov 10 22:10:56 VirtualDebian sshd[2276]: Server listening on 0.0.0.0 port 22.
  135. Nov 10 22:13:04 VirtualDebian sshd[2295]: Accepted password for vsh0t from 10.0.2.2 port 51801 ssh2
  136. Nov 10 22:13:04 VirtualDebian sshd[2295]: pam_unix(sshd:session): session opened for user vsh0t by (uid=0)
  137. Nov 10 22:13:19 VirtualDebian sshd[2295]: pam_unix(sshd:session): session closed for user vsh0t
  138. Nov 10 22:17:01 VirtualDebian CRON[2382]: pam_unix(cron:session): session opened for user root by (uid=0)
  139. Nov 10 22:17:01 VirtualDebian CRON[2382]: pam_unix(cron:session): session closed for user root
  140. Nov 10 22:28:39 VirtualDebian sshd[2276]: Received signal 15; terminating.
  141. Nov 10 22:28:43 VirtualDebian sshd[2434]: Server listening on :: port 22.
  142. Nov 10 22:28:43 VirtualDebian sshd[2434]: Server listening on 0.0.0.0 port 22.
  143. Nov 10 22:28:59 VirtualDebian groupadd[2441]: new group: name=testopie, GID=1001
  144. Nov 10 22:28:59 VirtualDebian useradd[2445]: new user: name=testopie, UID=1001, GID=1001, home=/home/testopie, shell=/bin/bash
  145. Nov 10 22:29:03 VirtualDebian passwd[2452]: pam_unix(passwd:chauthtok): password changed for testopie
  146. Nov 10 22:29:06 VirtualDebian chfn[2453]: changed user `testopie' information
  147. Nov 10 22:29:19 VirtualDebian su[2457]: Successful su for testopie by root
  148. Nov 10 22:29:19 VirtualDebian su[2457]: + tty1 root:testopie
  149. Nov 10 22:29:19 VirtualDebian su[2457]: pam_unix(su:session): session opened for user testopie by vsh0t(uid=0)
  150. Nov 10 22:29:25 VirtualDebian su[2457]: pam_unix(su:session): session closed for user testopie
  151. Nov 10 22:30:38 VirtualDebian sshd[2434]: Received signal 15; terminating.
  152. Nov 10 22:30:38 VirtualDebian sshd[2478]: Server listening on :: port 22.
  153. Nov 10 22:30:38 VirtualDebian sshd[2478]: Server listening on 0.0.0.0 port 22.
  154. Nov 10 22:31:19 VirtualDebian sshd[2484]: error: PAM: Authentication failure for testopie from 10.0.2.2
  155. Nov 10 22:31:29 VirtualDebian sshd[2484]: error: PAM: Authentication failure for testopie from 10.0.2.2
  156. Nov 10 22:31:30 VirtualDebian sshd[2484]: error: PAM: Authentication failure for testopie from 10.0.2.2
  157. Nov 10 22:31:30 VirtualDebian sshd[2484]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 44231 ssh2
  158. Nov 10 22:31:35 VirtualDebian sshd[2484]: Failed password for testopie from 10.0.2.2 port 44231 ssh2
  159. Nov 10 22:31:38 VirtualDebian sshd[2484]: Failed password for testopie from 10.0.2.2 port 44231 ssh2
  160. Nov 10 22:31:39 VirtualDebian sshd[2484]: Failed password for testopie from 10.0.2.2 port 44231 ssh2
  161. Nov 10 22:33:08 VirtualDebian sshd[2489]: Accepted keyboard-interactive/pam for testopie from 10.0.2.2 port 44233 ssh2
  162. Nov 10 22:33:08 VirtualDebian sshd[2489]: pam_unix(sshd:session): session opened for user testopie by (uid=0)
  163. Nov 10 22:33:25 VirtualDebian su[2507]: Successful su for root by testopie
  164. Nov 10 22:33:25 VirtualDebian su[2507]: + pts/0 testopie:root
  165. Nov 10 22:33:25 VirtualDebian su[2507]: pam_unix(su:session): session opened for user root by testopie(uid=1001)
  166. Nov 10 22:33:31 VirtualDebian su[2117]: pam_unix(su:session): session closed for user root
  167. Nov 10 22:33:32 VirtualDebian su[2507]: pam_unix(su:session): session closed for user root
  168. Nov 10 23:08:53 VirtualDebian sshd[1752]: Server listening on :: port 22.
  169. Nov 10 23:08:53 VirtualDebian sshd[1752]: Server listening on 0.0.0.0 port 22.
  170. Nov 10 23:08:57 VirtualDebian sshd[1752]: Received signal 15; terminating.
  171. Nov 10 23:08:57 VirtualDebian sshd[2131]: Server listening on :: port 22.
  172. Nov 10 23:08:57 VirtualDebian sshd[2131]: Server listening on 0.0.0.0 port 22.
  173. Nov 10 23:11:07 VirtualDebian sshd[2132]: Accepted keyboard-interactive/pam for testopie from 10.0.2.2 port 40689 ssh2
  174. Nov 10 23:11:07 VirtualDebian sshd[2132]: pam_unix(sshd:session): session opened for user testopie by (uid=0)
  175. Nov 10 23:11:29 VirtualDebian sshd[2132]: pam_unix(sshd:session): session closed for user testopie
  176. Nov 10 23:11:40 VirtualDebian login[2074]: pam_unix(login:auth): check pass; user unknown
  177. Nov 10 23:11:40 VirtualDebian login[2074]: pam_unix(login:auth): authentication failure; logname= uid=0 euid=0 tty=tty1 ruser= rhost=
  178. Nov 10 23:11:43 VirtualDebian login[2074]: FAILED LOGIN (1) on 'tty1' FOR `UNKNOWN', User not known to the underlying authentication module
  179. Nov 10 23:11:47 VirtualDebian login[2074]: pam_unix(login:session): session opened for user root by (uid=0)
  180. Nov 10 23:11:47 VirtualDebian login[2151]: ROOT LOGIN on 'tty1'
  181. Nov 11 09:05:05 VirtualDebian sshd[1797]: Server listening on :: port 22.
  182. Nov 11 09:05:05 VirtualDebian sshd[1797]: Server listening on 0.0.0.0 port 22.
  183. Nov 11 09:05:12 VirtualDebian login[2119]: pam_unix(login:session): session opened for user vsh0t by (uid=0)
  184. Nov 11 09:07:06 VirtualDebian sshd[2159]: error: PAM: Authentication failure for testopie from 10.0.2.2
  185. Nov 11 09:07:24 VirtualDebian sshd[2159]: Accepted keyboard-interactive/pam for testopie from 10.0.2.2 port 49581 ssh2
  186. Nov 11 09:07:24 VirtualDebian sshd[2159]: pam_unix(sshd:session): session opened for user testopie by (uid=0)
  187. Nov 11 09:07:29 VirtualDebian sshd[2159]: pam_unix(sshd:session): session closed for user testopie
  188. Nov 11 09:07:41 VirtualDebian su[2183]: Successful su for root by vsh0t
  189. Nov 11 09:07:41 VirtualDebian su[2183]: + tty1 vsh0t:root
  190. Nov 11 09:07:41 VirtualDebian su[2183]: pam_unix(su:session): session opened for user root by vsh0t(uid=1000)
  191. Nov 11 09:10:36 VirtualDebian su[2183]: pam_unix(su:session): session closed for user root
  192. Nov 11 09:17:01 VirtualDebian CRON[2199]: pam_unix(cron:session): session opened for user root by (uid=0)
  193. Nov 11 09:17:01 VirtualDebian CRON[2199]: pam_unix(cron:session): session closed for user root
  194. Nov 11 10:17:01 VirtualDebian CRON[2205]: pam_unix(cron:session): session opened for user root by (uid=0)
  195. Nov 11 10:17:01 VirtualDebian CRON[2205]: pam_unix(cron:session): session closed for user root
  196. Nov 11 17:17:23 VirtualDebian sshd[1803]: Server listening on :: port 22.
  197. Nov 11 17:17:23 VirtualDebian sshd[1803]: Server listening on 0.0.0.0 port 22.
  198. Nov 11 17:17:28 VirtualDebian login[2125]: pam_unix(login:session): session opened for user root by (uid=0)
  199. Nov 11 17:17:28 VirtualDebian login[2149]: ROOT LOGIN on 'tty1'
  200. Nov 11 18:17:01 VirtualDebian CRON[2164]: pam_unix(cron:session): session opened for user root by (uid=0)
  201. Nov 11 18:17:01 VirtualDebian CRON[2164]: pam_unix(cron:session): session closed for user root
  202. Nov 11 19:17:01 VirtualDebian CRON[2170]: pam_unix(cron:session): session opened for user root by (uid=0)
  203. Nov 11 19:17:01 VirtualDebian CRON[2170]: pam_unix(cron:session): session closed for user root
  204. Nov 11 20:17:01 VirtualDebian CRON[2176]: pam_unix(cron:session): session opened for user root by (uid=0)
  205. Nov 11 20:17:01 VirtualDebian CRON[2176]: pam_unix(cron:session): session closed for user root
  206. Nov 11 20:22:01 VirtualDebian login[2125]: pam_unix(login:session): session closed for user root
  207. Nov 11 20:22:05 VirtualDebian login[2184]: pam_unix(login:session): session opened for user vsh0t by LOGIN(uid=0)
  208. Nov 12 15:20:35 VirtualDebian sshd[1801]: Server listening on :: port 22.
  209. Nov 12 15:20:35 VirtualDebian sshd[1801]: Server listening on 0.0.0.0 port 22.
  210. Nov 12 15:20:44 VirtualDebian sshd[2147]: Invalid user opietest from 10.0.2.2
  211. Nov 12 15:20:44 VirtualDebian sshd[2147]: Failed none for invalid user opietest from 10.0.2.2 port 58035 ssh2
  212. Nov 12 15:21:37 VirtualDebian sshd[2147]: error: PAM: Authentication failure for illegal user opietest from 10.0.2.2
  213. Nov 12 15:21:37 VirtualDebian sshd[2147]: Failed keyboard-interactive/pam for invalid user opietest from 10.0.2.2 port 58035 ssh2
  214. Nov 12 15:21:50 VirtualDebian sshd[2151]: Invalid user opietest from 10.0.2.2
  215. Nov 12 15:21:50 VirtualDebian sshd[2151]: Failed none for invalid user opietest from 10.0.2.2 port 58037 ssh2
  216. Nov 12 15:22:07 VirtualDebian sshd[2151]: error: PAM: Authentication failure for illegal user opietest from 10.0.2.2
  217. Nov 12 15:22:07 VirtualDebian sshd[2151]: Failed keyboard-interactive/pam for invalid user opietest from 10.0.2.2 port 58037 ssh2
  218. Nov 12 15:22:16 VirtualDebian sshd[2155]: Invalid user opietest from 10.0.2.2
  219. Nov 12 15:22:16 VirtualDebian sshd[2155]: Failed none for invalid user opietest from 10.0.2.2 port 58039 ssh2
  220. Nov 12 15:23:04 VirtualDebian sshd[2155]: error: PAM: Authentication failure for illegal user opietest from 10.0.2.2
  221. Nov 12 15:23:04 VirtualDebian sshd[2155]: Failed keyboard-interactive/pam for invalid user opietest from 10.0.2.2 port 58039 ssh2
  222. Nov 12 15:23:56 VirtualDebian sshd[2155]: error: PAM: Authentication failure for illegal user opietest from 10.0.2.2
  223. Nov 12 15:23:56 VirtualDebian sshd[2155]: Failed keyboard-interactive/pam for invalid user opietest from 10.0.2.2 port 58039 ssh2
  224. Nov 12 15:24:30 VirtualDebian sshd[2160]: Invalid user opietest from 10.0.2.2
  225. Nov 12 15:24:30 VirtualDebian sshd[2160]: Failed none for invalid user opietest from 10.0.2.2 port 52368 ssh2
  226. Nov 12 15:25:19 VirtualDebian sshd[2160]: error: PAM: Authentication failure for illegal user opietest from 10.0.2.2
  227. Nov 12 15:25:19 VirtualDebian sshd[2160]: Failed keyboard-interactive/pam for invalid user opietest from 10.0.2.2 port 52368 ssh2
  228. Nov 12 15:25:51 VirtualDebian sshd[2164]: Invalid user opietest from 10.0.2.2
  229. Nov 12 15:25:51 VirtualDebian sshd[2164]: Failed none for invalid user opietest from 10.0.2.2 port 52370 ssh2
  230. Nov 12 15:26:24 VirtualDebian sshd[2164]: error: PAM: Authentication failure for illegal user opietest from 10.0.2.2
  231. Nov 12 15:26:24 VirtualDebian sshd[2164]: Failed keyboard-interactive/pam for invalid user opietest from 10.0.2.2 port 52370 ssh2
  232. Nov 12 15:26:47 VirtualDebian sshd[2164]: error: PAM: Authentication failure for illegal user opietest from 10.0.2.2
  233. Nov 12 15:26:47 VirtualDebian sshd[2164]: Failed keyboard-interactive/pam for invalid user opietest from 10.0.2.2 port 52370 ssh2
  234. Nov 12 15:27:00 VirtualDebian login[2123]: pam_unix(login:auth): check pass; user unknown
  235. Nov 12 15:27:00 VirtualDebian login[2123]: pam_unix(login:auth): authentication failure; logname= uid=0 euid=0 tty=tty1 ruser= rhost=
  236. Nov 12 15:27:03 VirtualDebian login[2123]: FAILED LOGIN (1) on 'tty1' FOR `UNKNOWN', User not known to the underlying authentication module
  237. Nov 12 15:27:04 VirtualDebian login[2123]: pam_unix(login:session): session opened for user root by (uid=0)
  238. Nov 12 15:27:04 VirtualDebian login[2169]: ROOT LOGIN on 'tty1'
  239. Nov 12 15:28:04 VirtualDebian sshd[2178]: error: PAM: Authentication failure for testopie from 10.0.2.2
  240. Nov 12 15:28:13 VirtualDebian sshd[2178]: error: PAM: Authentication failure for testopie from 10.0.2.2
  241. Nov 12 15:28:25 VirtualDebian sshd[2178]: error: PAM: Authentication failure for testopie from 10.0.2.2
  242. Nov 12 15:28:25 VirtualDebian sshd[2178]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 56962 ssh2
  243. Nov 12 15:28:31 VirtualDebian sshd[2178]: Failed password for testopie from 10.0.2.2 port 56962 ssh2
  244. Nov 12 15:28:36 VirtualDebian sshd[2178]: Failed password for testopie from 10.0.2.2 port 56962 ssh2
  245. Nov 12 15:28:44 VirtualDebian sshd[2178]: Failed password for testopie from 10.0.2.2 port 56962 ssh2
  246. Nov 12 16:17:01 VirtualDebian CRON[2187]: pam_unix(cron:session): session opened for user root by (uid=0)
  247. Nov 12 16:17:01 VirtualDebian CRON[2187]: pam_unix(cron:session): session closed for user root
  248. Nov 12 17:17:01 VirtualDebian CRON[2193]: pam_unix(cron:session): session opened for user root by (uid=0)
  249. Nov 12 17:17:01 VirtualDebian CRON[2193]: pam_unix(cron:session): session closed for user root
  250. Nov 12 17:51:04 VirtualDebian sshd[2198]: error: PAM: Authentication failure for testopie from 10.0.2.2
  251. Nov 12 17:51:24 VirtualDebian sshd[2198]: Accepted keyboard-interactive/pam for testopie from 10.0.2.2 port 35344 ssh2
  252. Nov 12 17:51:24 VirtualDebian sshd[2198]: pam_unix(sshd:session): session opened for user testopie by (uid=0)
  253. Nov 12 17:51:31 VirtualDebian su[2218]: Successful su for root by testopie
  254. Nov 12 17:51:31 VirtualDebian su[2218]: + pts/0 testopie:root
  255. Nov 12 17:51:31 VirtualDebian su[2218]: pam_unix(su:session): session opened for user root by testopie(uid=1001)
  256. Nov 12 17:54:31 VirtualDebian su[2218]: pam_unix(su:session): session closed for user root
  257. Nov 12 17:54:34 VirtualDebian sshd[2198]: pam_unix(sshd:session): session closed for user testopie
  258. Nov 12 18:17:01 VirtualDebian CRON[2259]: pam_unix(cron:session): session opened for user root by (uid=0)
  259. Nov 12 18:17:01 VirtualDebian CRON[2259]: pam_unix(cron:session): session closed for user root
  260. Nov 12 19:17:01 VirtualDebian CRON[2265]: pam_unix(cron:session): session opened for user root by (uid=0)
  261. Nov 12 19:17:01 VirtualDebian CRON[2265]: pam_unix(cron:session): session closed for user root
  262. Nov 12 20:17:01 VirtualDebian CRON[2271]: pam_unix(cron:session): session opened for user root by (uid=0)
  263. Nov 12 20:17:01 VirtualDebian CRON[2271]: pam_unix(cron:session): session closed for user root
  264. Nov 12 21:17:01 VirtualDebian CRON[2277]: pam_unix(cron:session): session opened for user root by (uid=0)
  265. Nov 12 21:17:01 VirtualDebian CRON[2277]: pam_unix(cron:session): session closed for user root
  266. Nov 12 22:17:01 VirtualDebian CRON[2283]: pam_unix(cron:session): session opened for user root by (uid=0)
  267. Nov 12 22:17:01 VirtualDebian CRON[2283]: pam_unix(cron:session): session closed for user root
  268. Nov 12 23:17:01 VirtualDebian CRON[2289]: pam_unix(cron:session): session opened for user root by (uid=0)
  269. Nov 12 23:17:01 VirtualDebian CRON[2289]: pam_unix(cron:session): session closed for user root
  270. Nov 13 16:54:18 VirtualDebian sshd[1799]: Server listening on :: port 22.
  271. Nov 13 16:54:18 VirtualDebian sshd[1799]: Server listening on 0.0.0.0 port 22.
  272. Nov 13 16:54:24 VirtualDebian login[2121]: pam_unix(login:session): session opened for user root by (uid=0)
  273. Nov 13 16:54:24 VirtualDebian login[2145]: ROOT LOGIN on 'tty1'
  274. Nov 13 16:55:44 VirtualDebian sshd[1769]: Server listening on :: port 22.
  275. Nov 13 16:55:44 VirtualDebian sshd[1769]: Server listening on 0.0.0.0 port 22.
  276. Nov 13 16:55:45 VirtualDebian sshd[1769]: Received signal 15; terminating.
  277. Nov 13 16:55:45 VirtualDebian sshd[2148]: Server listening on :: port 22.
  278. Nov 13 16:55:45 VirtualDebian sshd[2148]: Server listening on 0.0.0.0 port 22.
  279. Nov 13 17:00:02 VirtualDebian sshd[1762]: Server listening on :: port 22.
  280. Nov 13 17:00:02 VirtualDebian sshd[1762]: Server listening on 0.0.0.0 port 22.
  281. Nov 13 17:00:05 VirtualDebian sshd[1762]: Received signal 15; terminating.
  282. Nov 13 17:00:05 VirtualDebian sshd[2141]: Server listening on :: port 22.
  283. Nov 13 17:00:05 VirtualDebian sshd[2141]: Server listening on 0.0.0.0 port 22.
  284. Nov 13 17:00:47 VirtualDebian sshd[1804]: Server listening on :: port 22.
  285. Nov 13 17:00:47 VirtualDebian sshd[1804]: Server listening on 0.0.0.0 port 22.
  286. Nov 13 17:00:57 VirtualDebian login[2126]: pam_unix(login:session): session opened for user root by (uid=0)
  287. Nov 13 17:00:57 VirtualDebian login[2150]: ROOT LOGIN on 'tty1'
  288. Nov 13 17:01:32 VirtualDebian groupadd[2156]: new group: name=iezvhtnc, GID=1002
  289. Nov 13 17:01:32 VirtualDebian useradd[2160]: new user: name=iezvhtnc, UID=1002, GID=1002, home=/home/iezvhtnc, shell=/bin/bash
  290. Nov 13 17:01:43 VirtualDebian passwd[2167]: pam_unix(passwd:chauthtok): password changed for iezvhtnc
  291. Nov 13 17:01:45 VirtualDebian chfn[2168]: changed user `iezvhtnc' information
  292. Nov 13 17:04:08 VirtualDebian login[2126]: pam_unix(login:session): session closed for user root
  293. Nov 13 17:06:03 VirtualDebian sshd[1747]: Server listening on :: port 22.
  294. Nov 13 17:06:03 VirtualDebian sshd[1747]: Server listening on 0.0.0.0 port 22.
  295. Nov 13 17:06:05 VirtualDebian sshd[1747]: Received signal 15; terminating.
  296. Nov 13 17:06:05 VirtualDebian sshd[2126]: Server listening on :: port 22.
  297. Nov 13 17:06:05 VirtualDebian sshd[2126]: Server listening on 0.0.0.0 port 22.
  298. Nov 13 17:07:44 VirtualDebian sshd[2127]: error: PAM: Authentication failure for iezvhtnc from 10.0.2.2
  299. Nov 13 17:08:02 VirtualDebian sshd[2127]: error: PAM: Authentication failure for iezvhtnc from 10.0.2.2
  300. Nov 13 17:09:12 VirtualDebian sshd[2133]: error: PAM: Authentication failure for iezvhtnc from 10.0.2.2
  301. Nov 13 17:09:27 VirtualDebian sshd[2133]: error: PAM: Authentication failure for iezvhtnc from 10.0.2.2
  302. Nov 13 17:09:50 VirtualDebian sshd[2139]: error: PAM: Authentication failure for iezvhtnc from 10.0.2.2
  303. Nov 13 17:10:41 VirtualDebian login[2069]: pam_unix(login:session): session opened for user iezvhtnc by (uid=0)
  304. Nov 13 17:11:35 VirtualDebian sshd[2142]: error: ssh_msg_send: write
  305. Nov 13 17:11:50 VirtualDebian su[2158]: Successful su for root by iezvhtnc
  306. Nov 13 17:11:50 VirtualDebian su[2158]: + tty1 iezvhtnc:root
  307. Nov 13 17:11:50 VirtualDebian su[2158]: pam_unix(su:session): session opened for user root by iezvhtnc(uid=1002)
  308. Nov 13 17:13:47 VirtualDebian sshd[2161]: Accepted keyboard-interactive/pam for iezvhtnc from 10.0.2.2 port 43465 ssh2
  309. Nov 13 17:13:47 VirtualDebian sshd[2161]: pam_unix(sshd:session): session opened for user iezvhtnc by (uid=0)
  310. Nov 13 17:17:01 VirtualDebian CRON[2208]: pam_unix(cron:session): session opened for user root by (uid=0)
  311. Nov 13 17:17:01 VirtualDebian CRON[2208]: pam_unix(cron:session): session closed for user root
  312. Nov 13 17:17:07 VirtualDebian sshd[2126]: Received signal 15; terminating.
  313. Nov 13 17:17:07 VirtualDebian sshd[2219]: debug2: fd 3 setting O_NONBLOCK
  314. Nov 13 17:17:07 VirtualDebian sshd[2219]: debug1: Bind to port 22 on ::.
  315. Nov 13 17:17:07 VirtualDebian sshd[2219]: Server listening on :: port 22.
  316. Nov 13 17:17:07 VirtualDebian sshd[2219]: debug2: fd 4 setting O_NONBLOCK
  317. Nov 13 17:17:07 VirtualDebian sshd[2219]: debug1: Bind to port 22 on 0.0.0.0.
  318. Nov 13 17:17:07 VirtualDebian sshd[2219]: Server listening on 0.0.0.0 port 22.
  319. Nov 13 17:17:17 VirtualDebian sshd[2161]: pam_unix(sshd:session): session closed for user iezvhtnc
  320. Nov 13 17:17:22 VirtualDebian sshd[2219]: debug3: fd 5 is not O_NONBLOCK
  321. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  322. Nov 13 17:17:22 VirtualDebian sshd[2219]: debug1: Forked child 2230.
  323. Nov 13 17:17:22 VirtualDebian sshd[2219]: debug3: send_rexec_state: entering fd = 8 config len 638
  324. Nov 13 17:17:22 VirtualDebian sshd[2219]: debug3: ssh_msg_send: type 0
  325. Nov 13 17:17:22 VirtualDebian sshd[2219]: debug3: send_rexec_state: done
  326. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: inetd sockets after dupping: 3, 3
  327. Nov 13 17:17:22 VirtualDebian sshd[2230]: Connection from 10.0.2.2 port 51755
  328. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  329. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  330. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: Enabling compatibility mode for protocol 2.0
  331. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  332. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug2: fd 3 setting O_NONBLOCK
  333. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug2: Network child is on pid 2231
  334. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: preauth child monitor started
  335. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  336. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 0
  337. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  338. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 1
  339. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug2: monitor_read: 0 used once, disabling now
  340. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  341. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 5
  342. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_sign
  343. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_sign: signature 0x7f4e89ccb080(271)
  344. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 6
  345. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug2: monitor_read: 5 used once, disabling now
  346. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  347. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 7
  348. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_pwnamallow
  349. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: Trying to reverse map address 10.0.2.2.
  350. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug2: parse_server_config: config reprocess config len 638
  351. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  352. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 8
  353. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug2: monitor_read: 7 used once, disabling now
  354. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  355. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 48
  356. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: PAM: initializing for "iezvhtnc"
  357. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  358. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug1: PAM: setting PAM_TTY to "ssh"
  359. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug2: monitor_read: 48 used once, disabling now
  360. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  361. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 3
  362. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  363. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug2: monitor_read: 3 used once, disabling now
  364. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  365. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 11
  366. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_authpassword: sending result 0
  367. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 12
  368. Nov 13 17:17:22 VirtualDebian sshd[2230]: Failed none for iezvhtnc from 10.0.2.2 port 51755 ssh2
  369. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  370. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 51
  371. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_pam_init_ctx
  372. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: PAM: sshpam_init_ctx entering
  373. Nov 13 17:17:22 VirtualDebian sshd[2232]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  374. Nov 13 17:17:22 VirtualDebian sshd[2232]: debug3: ssh_msg_send: type 1
  375. Nov 13 17:17:22 VirtualDebian sshd[2232]: debug3: ssh_msg_recv entering
  376. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 52
  377. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  378. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 53
  379. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_answer_pam_query
  380. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: PAM: sshpam_query entering
  381. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: ssh_msg_recv entering
  382. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 54
  383. Nov 13 17:17:22 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  384. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 55
  385. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_answer_pam_respond
  386. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug2: PAM: sshpam_respond entering, 1 responses
  387. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: ssh_msg_send: type 6
  388. Nov 13 17:18:18 VirtualDebian sshd[2232]: debug1: do_pam_account: called
  389. Nov 13 17:18:18 VirtualDebian sshd[2232]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
  390. Nov 13 17:18:18 VirtualDebian sshd[2232]: debug3: ssh_msg_send: type 0
  391. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 56
  392. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  393. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 53
  394. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_answer_pam_query
  395. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: PAM: sshpam_query entering
  396. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: ssh_msg_recv entering
  397. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: PAM: import_environments entering
  398. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: sshpam_password_change_required 0
  399. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: PAM: num env strings 0
  400. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug1: PAM: num PAM env strings 0
  401. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 54
  402. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  403. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 55
  404. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_answer_pam_respond
  405. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug2: PAM: sshpam_respond entering, 0 responses
  406. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 56
  407. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  408. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 57
  409. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_answer_pam_free_ctx
  410. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: PAM: sshpam_free_ctx entering
  411. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: PAM: sshpam_thread_cleanup entering
  412. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 58
  413. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug2: monitor_read: 57 used once, disabling now
  414. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive_expect entering: type 49
  415. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  416. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug1: do_pam_account: called
  417. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 50
  418. Nov 13 17:18:18 VirtualDebian sshd[2230]: Accepted keyboard-interactive/pam for iezvhtnc from 10.0.2.2 port 51755 ssh2
  419. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug1: monitor_child_preauth: iezvhtnc has been authenticated by privileged process
  420. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_get_keystate: Waiting for new keys
  421. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive_expect entering: type 25
  422. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  423. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_newkeys_from_blob: 0x7f4e89cca040(122)
  424. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug2: mac_setup: found hmac-md5
  425. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_get_keystate: Waiting for second key
  426. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_newkeys_from_blob: 0x7f4e89cca040(122)
  427. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug2: mac_setup: found hmac-md5
  428. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_get_keystate: Getting compression state
  429. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_get_keystate: Getting Network I/O buffers
  430. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_share_sync: Share sync
  431. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_share_sync: Share sync end
  432. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug1: PAM: establishing credentials
  433. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: PAM: opening session
  434. Nov 13 17:18:18 VirtualDebian sshd[2230]: pam_unix(sshd:session): session opened for user iezvhtnc by (uid=0)
  435. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: PAM: sshpam_store_conv called with 1 messages
  436. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: SELinux support disabled
  437. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: PAM: establishing credentials
  438. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: permanently_set_uid: 1002/1002
  439. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: set_newkeys: mode 0
  440. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: set_newkeys: mode 1
  441. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: Entering interactive session for SSH2.
  442. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: fd 5 setting O_NONBLOCK
  443. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: fd 6 setting O_NONBLOCK
  444. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: server_init_dispatch_20
  445. Nov 13 17:18:18 VirtualDebian sshd[2230]: User child is on pid 2233
  446. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  447. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
  448. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: input_session_request
  449. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: channel 0: new [server-session]
  450. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: session_new: allocate (allocated 0 max 10)
  451. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: session_unused: session id 0 unused
  452. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_new: session 0
  453. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_open: channel 0
  454. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_open: session 0: link with channel 0
  455. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: server_input_channel_open: confirm session
  456. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: server_input_global_request: rtype no-more-sessions@openssh.com want_reply 0
  457. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
  458. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_by_channel: session 0 channel 0
  459. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_input_channel_req: session 0 req pty-req
  460. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: Allocating pty.
  461. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: mm_request_send entering: type 26
  462. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
  463. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: mm_request_receive_expect entering: type 27
  464. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: mm_request_receive entering
  465. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 26
  466. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_answer_pty entering
  467. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug2: session_new: allocate (allocated 0 max 10)
  468. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: session_unused: session id 0 unused
  469. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug1: session_new: session 0
  470. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug1: SELinux support disabled
  471. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_send entering: type 27
  472. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_answer_pty: tty /dev/pts/0 ptyfd 4
  473. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_pty_req: session 0 alloc /dev/pts/0
  474. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: tty_parse_modes: SSH2 n_bytes 256
  475. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: tty_parse_modes: ospeed 38400
  476. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: tty_parse_modes: ispeed 38400
  477. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: server_input_channel_req: channel 0 request env reply 0
  478. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_by_channel: session 0 channel 0
  479. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_input_channel_req: session 0 req env
  480. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: Setting env 0: LANG=it_IT.UTF-8
  481. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: server_input_channel_req: channel 0 request shell reply 1
  482. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_by_channel: session 0 channel 0
  483. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug1: session_input_channel_req: session 0 req shell
  484. Nov 13 17:18:18 VirtualDebian sshd[2234]: debug1: Setting controlling tty using TIOCSCTTY.
  485. Nov 13 17:18:18 VirtualDebian sshd[2234]: debug3: channel 0: close_fds r -1 w -1 e -1 c -1
  486. Nov 13 17:18:18 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  487. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: fd 3 setting TCP_NODELAY
  488. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: channel 0: rfd 9 isatty
  489. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug2: fd 9 setting O_NONBLOCK
  490. Nov 13 17:18:18 VirtualDebian sshd[2233]: debug3: fd 7 is O_NONBLOCK
  491. Nov 13 17:24:50 VirtualDebian su[2158]: pam_unix(su:session): session closed for user root
  492. Nov 13 17:24:52 VirtualDebian login[2069]: pam_unix(login:session): session closed for user iezvhtnc
  493. Nov 13 17:24:55 VirtualDebian login[2268]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
  494. Nov 13 17:24:55 VirtualDebian login[2276]: ROOT LOGIN on 'tty1'
  495. Nov 13 17:24:58 VirtualDebian login[2268]: pam_unix(login:session): session closed for user root
  496. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: read<=0 rfd 9 len -1
  497. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: read failed
  498. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: close_read
  499. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: input open -> drain
  500. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: ibuf empty
  501. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: send eof
  502. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: input drain -> closed
  503. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: Received SIGCHLD.
  504. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: session_by_pid: pid 2234
  505. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: session_exit_message: session 0 channel 0 pid 2234
  506. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: request exit-status confirm 0
  507. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: session_exit_message: release channel 0
  508. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: write failed
  509. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: close_write
  510. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: send eow
  511. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: output open -> closed
  512. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: mm_request_send entering: type 28
  513. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 28
  514. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug3: mm_answer_pty_cleanup entering
  515. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug1: session_by_tty: session 0 tty /dev/pts/0
  516. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug3: mm_session_close: session 0 pid 2233
  517. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug3: mm_session_close: tty /dev/pts/0 ptyfd 4
  518. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug1: session_pty_cleanup: session 0 release /dev/pts/0
  519. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug3: session_unused: session id 0 unused
  520. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug3: mm_request_receive entering
  521. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: send close
  522. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: channel 0: will not send data after close
  523. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: notify_done: reading
  524. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: channel 0: will not send data after close
  525. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: rcvd close
  526. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: channel 0: will not send data after close
  527. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: is dead
  528. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: gc: notify user
  529. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: session_by_channel: session 0 channel 0
  530. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: session_close_by_channel: channel 0 child 0
  531. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: session_close: session 0 pid 0
  532. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: session_unused: session id 0 unused
  533. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: gc: user detached
  534. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: is dead
  535. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug2: channel 0: garbage collecting
  536. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: channel 0: free: server-session, nchannels 1
  537. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: channel 0: status: The following connections are open:\r\n #0 server-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)\r\n
  538. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: channel 0: close_fds r -1 w -1 e -1 c -1
  539. Nov 13 17:25:27 VirtualDebian sshd[2233]: Connection closed by 10.0.2.2
  540. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug1: do_cleanup
  541. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: PAM: sshpam_thread_cleanup entering
  542. Nov 13 17:25:27 VirtualDebian sshd[2233]: Transferred: sent 3096, received 2192 bytes
  543. Nov 13 17:25:27 VirtualDebian sshd[2233]: Closing connection to 10.0.2.2 port 51755
  544. Nov 13 17:25:27 VirtualDebian sshd[2233]: debug3: mm_request_send entering: type 61
  545. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug3: monitor_read: checking request 61
  546. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug3: mm_answer_term: tearing down sessions
  547. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug1: PAM: cleanup
  548. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug1: PAM: deleting credentials
  549. Nov 13 17:25:27 VirtualDebian sshd[2230]: debug1: PAM: closing session
  550. Nov 13 17:25:27 VirtualDebian sshd[2230]: pam_unix(sshd:session): session closed for user iezvhtnc
  551. Nov 13 18:17:01 VirtualDebian CRON[2292]: pam_unix(cron:session): session opened for user root by (uid=0)
  552. Nov 13 18:17:01 VirtualDebian CRON[2292]: pam_unix(cron:session): session closed for user root
  553. Nov 13 19:17:01 VirtualDebian CRON[2298]: pam_unix(cron:session): session opened for user root by (uid=0)
  554. Nov 13 19:17:01 VirtualDebian CRON[2298]: pam_unix(cron:session): session closed for user root
  555. Nov 13 20:17:01 VirtualDebian CRON[2304]: pam_unix(cron:session): session opened for user root by (uid=0)
  556. Nov 13 20:17:01 VirtualDebian CRON[2304]: pam_unix(cron:session): session closed for user root
  557. Nov 13 21:17:01 VirtualDebian CRON[2310]: pam_unix(cron:session): session opened for user root by (uid=0)
  558. Nov 13 21:17:01 VirtualDebian CRON[2310]: pam_unix(cron:session): session closed for user root
  559. Nov 13 22:17:01 VirtualDebian CRON[2316]: pam_unix(cron:session): session opened for user root by (uid=0)
  560. Nov 13 22:17:01 VirtualDebian CRON[2316]: pam_unix(cron:session): session closed for user root
  561. Nov 13 23:17:01 VirtualDebian CRON[2322]: pam_unix(cron:session): session opened for user root by (uid=0)
  562. Nov 13 23:17:01 VirtualDebian CRON[2322]: pam_unix(cron:session): session closed for user root
  563. Nov 14 00:17:01 VirtualDebian CRON[2328]: pam_unix(cron:session): session opened for user root by (uid=0)
  564. Nov 14 00:17:01 VirtualDebian CRON[2328]: pam_unix(cron:session): session closed for user root
  565. Nov 14 17:14:36 VirtualDebian sshd[1801]: debug2: fd 3 setting O_NONBLOCK
  566. Nov 14 17:14:36 VirtualDebian sshd[1801]: debug1: Bind to port 22 on ::.
  567. Nov 14 17:14:36 VirtualDebian sshd[1801]: Server listening on :: port 22.
  568. Nov 14 17:14:36 VirtualDebian sshd[1801]: debug2: fd 4 setting O_NONBLOCK
  569. Nov 14 17:14:36 VirtualDebian sshd[1801]: debug1: Bind to port 22 on 0.0.0.0.
  570. Nov 14 17:14:36 VirtualDebian sshd[1801]: Server listening on 0.0.0.0 port 22.
  571. Nov 14 17:15:17 VirtualDebian login[2123]: pam_unix(login:session): session opened for user root by (uid=0)
  572. Nov 14 17:15:17 VirtualDebian login[2147]: ROOT LOGIN on 'tty1'
  573. Nov 14 17:17:01 VirtualDebian CRON[2151]: pam_unix(cron:session): session opened for user root by (uid=0)
  574. Nov 14 17:17:01 VirtualDebian CRON[2151]: pam_unix(cron:session): session closed for user root
  575. Nov 14 18:17:01 VirtualDebian CRON[2157]: pam_unix(cron:session): session opened for user root by (uid=0)
  576. Nov 14 18:17:01 VirtualDebian CRON[2157]: pam_unix(cron:session): session closed for user root
  577. Nov 14 18:27:07 VirtualDebian login[2123]: pam_unix(login:session): session closed for user root
  578. Nov 14 18:27:14 VirtualDebian login[2194]: pam_unix(login:session): session opened for user vsh0t by LOGIN(uid=0)
  579. Nov 14 18:29:13 VirtualDebian login[2125]: pam_unix(login:session): session opened for user root by (uid=0)
  580. Nov 14 18:29:13 VirtualDebian login[2218]: ROOT LOGIN on 'tty2'
  581. Nov 14 19:15:12 VirtualDebian sshd[1753]: debug2: fd 3 setting O_NONBLOCK
  582. Nov 14 19:15:12 VirtualDebian sshd[1753]: debug1: Bind to port 22 on ::.
  583. Nov 14 19:15:12 VirtualDebian sshd[1753]: Server listening on :: port 22.
  584. Nov 14 19:15:12 VirtualDebian sshd[1753]: debug2: fd 4 setting O_NONBLOCK
  585. Nov 14 19:15:12 VirtualDebian sshd[1753]: debug1: Bind to port 22 on 0.0.0.0.
  586. Nov 14 19:15:12 VirtualDebian sshd[1753]: Server listening on 0.0.0.0 port 22.
  587. Nov 14 19:15:13 VirtualDebian sshd[1753]: Received signal 15; terminating.
  588. Nov 14 19:15:13 VirtualDebian sshd[2024]: debug2: fd 3 setting O_NONBLOCK
  589. Nov 14 19:15:13 VirtualDebian sshd[2024]: debug1: Bind to port 22 on ::.
  590. Nov 14 19:15:13 VirtualDebian sshd[2024]: Server listening on :: port 22.
  591. Nov 14 19:15:13 VirtualDebian sshd[2024]: debug2: fd 4 setting O_NONBLOCK
  592. Nov 14 19:15:13 VirtualDebian sshd[2024]: debug1: Bind to port 22 on 0.0.0.0.
  593. Nov 14 19:15:13 VirtualDebian sshd[2024]: Server listening on 0.0.0.0 port 22.
  594. Nov 14 19:15:22 VirtualDebian login[2109]: pam_unix(login:session): session opened for user root by (uid=0)
  595. Nov 14 19:15:22 VirtualDebian login[2133]: ROOT LOGIN on 'tty1'
  596. Nov 14 19:17:01 VirtualDebian CRON[2138]: pam_unix(cron:session): session opened for user root by (uid=0)
  597. Nov 14 19:17:01 VirtualDebian CRON[2138]: pam_unix(cron:session): session closed for user root
  598. Nov 14 20:17:01 VirtualDebian CRON[2145]: pam_unix(cron:session): session opened for user root by (uid=0)
  599. Nov 14 20:17:01 VirtualDebian CRON[2145]: pam_unix(cron:session): session closed for user root
  600. Nov 14 21:17:01 VirtualDebian CRON[2151]: pam_unix(cron:session): session opened for user root by (uid=0)
  601. Nov 14 21:17:01 VirtualDebian CRON[2151]: pam_unix(cron:session): session closed for user root
  602. Nov 14 22:17:01 VirtualDebian CRON[2157]: pam_unix(cron:session): session opened for user root by (uid=0)
  603. Nov 14 22:17:01 VirtualDebian CRON[2157]: pam_unix(cron:session): session closed for user root
  604. Nov 14 23:17:01 VirtualDebian CRON[2163]: pam_unix(cron:session): session opened for user root by (uid=0)
  605. Nov 14 23:17:01 VirtualDebian CRON[2163]: pam_unix(cron:session): session closed for user root
  606. Nov 15 00:17:01 VirtualDebian CRON[2169]: pam_unix(cron:session): session opened for user root by (uid=0)
  607. Nov 15 00:17:01 VirtualDebian CRON[2169]: pam_unix(cron:session): session closed for user root
  608. Nov 21 22:46:49 VirtualDebian sshd[1796]: debug2: fd 3 setting O_NONBLOCK
  609. Nov 21 22:46:49 VirtualDebian sshd[1796]: debug1: Bind to port 22 on ::.
  610. Nov 21 22:46:49 VirtualDebian sshd[1796]: Server listening on :: port 22.
  611. Nov 21 22:46:49 VirtualDebian sshd[1796]: debug2: fd 4 setting O_NONBLOCK
  612. Nov 21 22:46:49 VirtualDebian sshd[1796]: debug1: Bind to port 22 on 0.0.0.0.
  613. Nov 21 22:46:49 VirtualDebian sshd[1796]: Server listening on 0.0.0.0 port 22.
  614. Nov 21 22:47:05 VirtualDebian login[2118]: pam_unix(login:session): session opened for user root by (uid=0)
  615. Nov 21 22:47:05 VirtualDebian login[2142]: ROOT LOGIN on 'tty1'
  616. Nov 23 20:02:56 VirtualDebian sshd[1779]: debug2: fd 3 setting O_NONBLOCK
  617. Nov 23 20:02:56 VirtualDebian sshd[1779]: debug1: Bind to port 22 on ::.
  618. Nov 23 20:02:56 VirtualDebian sshd[1779]: Server listening on :: port 22.
  619. Nov 23 20:02:56 VirtualDebian sshd[1779]: debug2: fd 4 setting O_NONBLOCK
  620. Nov 23 20:02:56 VirtualDebian sshd[1779]: debug1: Bind to port 22 on 0.0.0.0.
  621. Nov 23 20:02:56 VirtualDebian sshd[1779]: Server listening on 0.0.0.0 port 22.
  622. Nov 23 20:03:00 VirtualDebian login[2101]: pam_unix(login:session): session opened for user root by (uid=0)
  623. Nov 23 20:03:00 VirtualDebian login[2125]: ROOT LOGIN on 'tty1'
  624. Nov 23 20:03:08 VirtualDebian sshd[1779]: Received signal 15; terminating.
  625. Nov 23 20:03:08 VirtualDebian sshd[2136]: debug2: fd 3 setting O_NONBLOCK
  626. Nov 23 20:03:08 VirtualDebian sshd[2136]: debug1: Bind to port 22 on ::.
  627. Nov 23 20:03:08 VirtualDebian sshd[2136]: Server listening on :: port 22.
  628. Nov 23 20:03:08 VirtualDebian sshd[2136]: debug2: fd 4 setting O_NONBLOCK
  629. Nov 23 20:03:08 VirtualDebian sshd[2136]: debug1: Bind to port 22 on 0.0.0.0.
  630. Nov 23 20:03:08 VirtualDebian sshd[2136]: Server listening on 0.0.0.0 port 22.
  631. Nov 23 20:05:38 VirtualDebian sshd[1774]: debug2: fd 3 setting O_NONBLOCK
  632. Nov 23 20:05:38 VirtualDebian sshd[1774]: debug1: Bind to port 22 on ::.
  633. Nov 23 20:05:38 VirtualDebian sshd[1774]: Server listening on :: port 22.
  634. Nov 23 20:05:38 VirtualDebian sshd[1774]: debug2: fd 4 setting O_NONBLOCK
  635. Nov 23 20:05:38 VirtualDebian sshd[1774]: debug1: Bind to port 22 on 0.0.0.0.
  636. Nov 23 20:05:38 VirtualDebian sshd[1774]: Server listening on 0.0.0.0 port 22.
  637. Nov 23 20:05:50 VirtualDebian login[2096]: pam_unix(login:session): session opened for user root by (uid=0)
  638. Nov 23 20:05:50 VirtualDebian login[2120]: ROOT LOGIN on 'tty1'
  639. Nov 23 20:06:40 VirtualDebian sshd[1774]: Received signal 15; terminating.
  640. Nov 23 20:06:40 VirtualDebian sshd[2167]: debug2: fd 3 setting O_NONBLOCK
  641. Nov 23 20:06:40 VirtualDebian sshd[2167]: debug1: Bind to port 22 on ::.
  642. Nov 23 20:06:40 VirtualDebian sshd[2167]: Server listening on :: port 22.
  643. Nov 23 20:06:40 VirtualDebian sshd[2167]: debug2: fd 4 setting O_NONBLOCK
  644. Nov 23 20:06:40 VirtualDebian sshd[2167]: debug1: Bind to port 22 on 0.0.0.0.
  645. Nov 23 20:06:40 VirtualDebian sshd[2167]: Server listening on 0.0.0.0 port 22.
  646. Nov 23 20:10:35 VirtualDebian sshd[1780]: debug2: fd 3 setting O_NONBLOCK
  647. Nov 23 20:10:35 VirtualDebian sshd[1780]: debug1: Bind to port 22 on ::.
  648. Nov 23 20:10:35 VirtualDebian sshd[1780]: Server listening on :: port 22.
  649. Nov 23 20:10:35 VirtualDebian sshd[1780]: debug2: fd 4 setting O_NONBLOCK
  650. Nov 23 20:10:35 VirtualDebian sshd[1780]: debug1: Bind to port 22 on 0.0.0.0.
  651. Nov 23 20:10:35 VirtualDebian sshd[1780]: Server listening on 0.0.0.0 port 22.
  652. Nov 23 20:11:37 VirtualDebian sshd[1780]: Received signal 15; terminating.
  653. Nov 23 20:11:37 VirtualDebian sshd[2152]: debug2: fd 3 setting O_NONBLOCK
  654. Nov 23 20:11:37 VirtualDebian sshd[2152]: debug1: Bind to port 22 on ::.
  655. Nov 23 20:11:37 VirtualDebian sshd[2152]: Server listening on :: port 22.
  656. Nov 23 20:11:37 VirtualDebian sshd[2152]: debug2: fd 4 setting O_NONBLOCK
  657. Nov 23 20:11:37 VirtualDebian sshd[2152]: debug1: Bind to port 22 on 0.0.0.0.
  658. Nov 23 20:11:37 VirtualDebian sshd[2152]: Server listening on 0.0.0.0 port 22.
  659. Nov 23 22:19:44 VirtualDebian sshd[1763]: debug2: fd 3 setting O_NONBLOCK
  660. Nov 23 22:19:44 VirtualDebian sshd[1763]: debug1: Bind to port 22 on ::.
  661. Nov 23 22:19:44 VirtualDebian sshd[1763]: Server listening on :: port 22.
  662. Nov 23 22:19:44 VirtualDebian sshd[1763]: debug2: fd 4 setting O_NONBLOCK
  663. Nov 23 22:19:44 VirtualDebian sshd[1763]: debug1: Bind to port 22 on 0.0.0.0.
  664. Nov 23 22:19:44 VirtualDebian sshd[1763]: Server listening on 0.0.0.0 port 22.
  665. Nov 23 22:19:48 VirtualDebian login[2085]: pam_unix(login:session): session opened for user root by (uid=0)
  666. Nov 23 22:19:48 VirtualDebian login[2109]: ROOT LOGIN on 'tty1'
  667. Nov 23 22:25:00 VirtualDebian sshd[1765]: debug2: fd 3 setting O_NONBLOCK
  668. Nov 23 22:25:00 VirtualDebian sshd[1765]: debug1: Bind to port 22 on ::.
  669. Nov 23 22:25:00 VirtualDebian sshd[1765]: Server listening on :: port 22.
  670. Nov 23 22:25:00 VirtualDebian sshd[1765]: debug2: fd 4 setting O_NONBLOCK
  671. Nov 23 22:25:00 VirtualDebian sshd[1765]: debug1: Bind to port 22 on 0.0.0.0.
  672. Nov 23 22:25:00 VirtualDebian sshd[1765]: Server listening on 0.0.0.0 port 22.
  673. Nov 23 22:25:04 VirtualDebian login[2087]: pam_unix(login:session): session opened for user root by (uid=0)
  674. Nov 23 22:25:04 VirtualDebian login[2111]: ROOT LOGIN on 'tty1'
  675. Nov 24 00:20:08 VirtualDebian sshd[1804]: debug2: fd 3 setting O_NONBLOCK
  676. Nov 24 00:20:08 VirtualDebian sshd[1804]: debug1: Bind to port 22 on ::.
  677. Nov 24 00:20:08 VirtualDebian sshd[1804]: Server listening on :: port 22.
  678. Nov 24 00:20:08 VirtualDebian sshd[1804]: debug2: fd 4 setting O_NONBLOCK
  679. Nov 24 00:20:08 VirtualDebian sshd[1804]: debug1: Bind to port 22 on 0.0.0.0.
  680. Nov 24 00:20:08 VirtualDebian sshd[1804]: Server listening on 0.0.0.0 port 22.
  681. Nov 24 00:20:48 VirtualDebian login[2126]: pam_unix(login:session): session opened for user root by (uid=0)
  682. Nov 24 00:20:48 VirtualDebian login[2150]: ROOT LOGIN on 'tty1'
  683. Nov 24 00:21:11 VirtualDebian sshd[1804]: Received signal 15; terminating.
  684. Nov 24 00:21:11 VirtualDebian sshd[2183]: debug2: fd 3 setting O_NONBLOCK
  685. Nov 24 00:21:11 VirtualDebian sshd[2183]: debug1: Bind to port 22 on ::.
  686. Nov 24 00:21:11 VirtualDebian sshd[2183]: Server listening on :: port 22.
  687. Nov 24 00:21:11 VirtualDebian sshd[2183]: debug2: fd 4 setting O_NONBLOCK
  688. Nov 24 00:21:11 VirtualDebian sshd[2183]: debug1: Bind to port 22 on 0.0.0.0.
  689. Nov 24 00:21:11 VirtualDebian sshd[2183]: Server listening on 0.0.0.0 port 22.
  690. Nov 24 00:26:41 VirtualDebian sshd[2183]: debug3: fd 5 is not O_NONBLOCK
  691. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  692. Nov 24 00:26:41 VirtualDebian sshd[2183]: debug1: Forked child 2197.
  693. Nov 24 00:26:41 VirtualDebian sshd[2183]: debug3: send_rexec_state: entering fd = 8 config len 638
  694. Nov 24 00:26:41 VirtualDebian sshd[2183]: debug3: ssh_msg_send: type 0
  695. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug1: inetd sockets after dupping: 3, 3
  696. Nov 24 00:26:41 VirtualDebian sshd[2183]: debug3: send_rexec_state: done
  697. Nov 24 00:26:41 VirtualDebian sshd[2197]: Connection from 192.168.1.2 port 43338
  698. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-5
  699. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug1: match: OpenSSH_5.1p1 Debian-5 pat OpenSSH*
  700. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug1: Enabling compatibility mode for protocol 2.0
  701. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  702. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug2: fd 3 setting O_NONBLOCK
  703. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug2: Network child is on pid 2198
  704. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug3: preauth child monitor started
  705. Nov 24 00:26:41 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  706. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: monitor_read: checking request 0
  707. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  708. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: mm_request_send entering: type 1
  709. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug2: monitor_read: 0 used once, disabling now
  710. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  711. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: monitor_read: checking request 5
  712. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: mm_answer_sign
  713. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: mm_answer_sign: signature 0x7fc38f441be0(271)
  714. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: mm_request_send entering: type 6
  715. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug2: monitor_read: 5 used once, disabling now
  716. Nov 24 00:26:42 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  717. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: monitor_read: checking request 7
  718. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_answer_pwnamallow
  719. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: Trying to reverse map address 192.168.1.2.
  720. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug2: parse_server_config: config reprocess config len 638
  721. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  722. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_send entering: type 8
  723. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug2: monitor_read: 7 used once, disabling now
  724. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  725. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: monitor_read: checking request 48
  726. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug1: PAM: initializing for "vsh0t"
  727. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug1: PAM: setting PAM_RHOST to "192.168.1.2"
  728. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug1: PAM: setting PAM_TTY to "ssh"
  729. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug2: monitor_read: 48 used once, disabling now
  730. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  731. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: monitor_read: checking request 3
  732. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  733. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug2: monitor_read: 3 used once, disabling now
  734. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  735. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: monitor_read: checking request 11
  736. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_answer_authpassword: sending result 0
  737. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_send entering: type 12
  738. Nov 24 00:26:44 VirtualDebian sshd[2197]: Failed none for vsh0t from 192.168.1.2 port 43338 ssh2
  739. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  740. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: monitor_read: checking request 51
  741. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_answer_pam_init_ctx
  742. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: PAM: sshpam_init_ctx entering
  743. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_send entering: type 52
  744. Nov 24 00:26:44 VirtualDebian sshd[2199]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  745. Nov 24 00:26:44 VirtualDebian sshd[2199]: debug3: ssh_msg_send: type 1
  746. Nov 24 00:26:44 VirtualDebian sshd[2199]: debug3: ssh_msg_recv entering
  747. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  748. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: monitor_read: checking request 53
  749. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_answer_pam_query
  750. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: PAM: sshpam_query entering
  751. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: ssh_msg_recv entering
  752. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_send entering: type 54
  753. Nov 24 00:26:44 VirtualDebian sshd[2197]: debug3: mm_request_receive entering
  754. Nov 24 00:26:46 VirtualDebian sshd[2197]: debug1: do_cleanup
  755. Nov 24 00:26:46 VirtualDebian sshd[2197]: debug1: PAM: cleanup
  756. Nov 24 00:26:46 VirtualDebian sshd[2197]: debug3: PAM: sshpam_thread_cleanup entering
  757. Nov 24 01:05:18 VirtualDebian sshd[1774]: debug2: fd 3 setting O_NONBLOCK
  758. Nov 24 01:05:18 VirtualDebian sshd[1774]: debug1: Bind to port 22 on ::.
  759. Nov 24 01:05:18 VirtualDebian sshd[1774]: Server listening on :: port 22.
  760. Nov 24 01:05:18 VirtualDebian sshd[1774]: debug2: fd 4 setting O_NONBLOCK
  761. Nov 24 01:05:18 VirtualDebian sshd[1774]: debug1: Bind to port 22 on 0.0.0.0.
  762. Nov 24 01:05:18 VirtualDebian sshd[1774]: Server listening on 0.0.0.0 port 22.
  763. Nov 24 01:06:21 VirtualDebian sshd[1774]: Received signal 15; terminating.
  764. Nov 24 01:06:21 VirtualDebian sshd[2146]: debug2: fd 3 setting O_NONBLOCK
  765. Nov 24 01:06:21 VirtualDebian sshd[2146]: debug1: Bind to port 22 on ::.
  766. Nov 24 01:06:21 VirtualDebian sshd[2146]: Server listening on :: port 22.
  767. Nov 24 01:06:21 VirtualDebian sshd[2146]: debug2: fd 4 setting O_NONBLOCK
  768. Nov 24 01:06:21 VirtualDebian sshd[2146]: debug1: Bind to port 22 on 0.0.0.0.
  769. Nov 24 01:06:21 VirtualDebian sshd[2146]: Server listening on 0.0.0.0 port 22.
  770. Nov 24 01:07:17 VirtualDebian login[2096]: pam_unix(login:session): session opened for user root by (uid=0)
  771. Nov 24 01:07:17 VirtualDebian login[2147]: ROOT LOGIN on 'tty1'
  772. Nov 24 01:08:13 VirtualDebian sshd[1765]: debug2: fd 3 setting O_NONBLOCK
  773. Nov 24 01:08:13 VirtualDebian sshd[1765]: debug1: Bind to port 22 on ::.
  774. Nov 24 01:08:13 VirtualDebian sshd[1765]: Server listening on :: port 22.
  775. Nov 24 01:08:13 VirtualDebian sshd[1765]: debug2: fd 4 setting O_NONBLOCK
  776. Nov 24 01:08:13 VirtualDebian sshd[1765]: debug1: Bind to port 22 on 0.0.0.0.
  777. Nov 24 01:08:13 VirtualDebian sshd[1765]: Server listening on 0.0.0.0 port 22.
  778. Nov 24 01:08:48 VirtualDebian login[2087]: pam_unix(login:session): session opened for user root by (uid=0)
  779. Nov 24 01:08:48 VirtualDebian login[2111]: ROOT LOGIN on 'tty1'
  780. Nov 24 01:09:18 VirtualDebian sshd[1765]: Received signal 15; terminating.
  781. Nov 24 01:09:18 VirtualDebian sshd[2145]: debug2: fd 3 setting O_NONBLOCK
  782. Nov 24 01:09:18 VirtualDebian sshd[2145]: debug1: Bind to port 22 on ::.
  783. Nov 24 01:09:18 VirtualDebian sshd[2145]: Server listening on :: port 22.
  784. Nov 24 01:09:18 VirtualDebian sshd[2145]: debug2: fd 4 setting O_NONBLOCK
  785. Nov 24 01:09:18 VirtualDebian sshd[2145]: debug1: Bind to port 22 on 0.0.0.0.
  786. Nov 24 01:09:18 VirtualDebian sshd[2145]: Server listening on 0.0.0.0 port 22.
  787. Nov 24 01:10:19 VirtualDebian sshd[1752]: debug2: fd 3 setting O_NONBLOCK
  788. Nov 24 01:10:19 VirtualDebian sshd[1752]: debug1: Bind to port 22 on ::.
  789. Nov 24 01:10:19 VirtualDebian sshd[1752]: Server listening on :: port 22.
  790. Nov 24 01:10:19 VirtualDebian sshd[1752]: debug2: fd 4 setting O_NONBLOCK
  791. Nov 24 01:10:19 VirtualDebian sshd[1752]: debug1: Bind to port 22 on 0.0.0.0.
  792. Nov 24 01:10:19 VirtualDebian sshd[1752]: Server listening on 0.0.0.0 port 22.
  793. Nov 24 01:10:41 VirtualDebian login[2074]: pam_unix(login:session): session opened for user root by (uid=0)
  794. Nov 24 01:10:41 VirtualDebian login[2098]: ROOT LOGIN on 'tty1'
  795. Nov 24 01:15:05 VirtualDebian sshd[1752]: debug2: fd 3 setting O_NONBLOCK
  796. Nov 24 01:15:05 VirtualDebian sshd[1752]: debug1: Bind to port 22 on ::.
  797. Nov 24 01:15:05 VirtualDebian sshd[1752]: Server listening on :: port 22.
  798. Nov 24 01:15:05 VirtualDebian sshd[1752]: debug2: fd 4 setting O_NONBLOCK
  799. Nov 24 01:15:05 VirtualDebian sshd[1752]: debug1: Bind to port 22 on 0.0.0.0.
  800. Nov 24 01:15:05 VirtualDebian sshd[1752]: Server listening on 0.0.0.0 port 22.
  801. Nov 24 01:15:40 VirtualDebian login[2074]: pam_unix(login:session): session opened for user root by (uid=0)
  802. Nov 24 01:15:40 VirtualDebian login[2098]: ROOT LOGIN on 'tty1'
  803. Nov 24 01:16:10 VirtualDebian sshd[1752]: Received signal 15; terminating.
  804. Nov 24 01:16:10 VirtualDebian sshd[2131]: debug2: fd 3 setting O_NONBLOCK
  805. Nov 24 01:16:10 VirtualDebian sshd[2131]: debug1: Bind to port 22 on ::.
  806. Nov 24 01:16:10 VirtualDebian sshd[2131]: Server listening on :: port 22.
  807. Nov 24 01:16:10 VirtualDebian sshd[2131]: debug2: fd 4 setting O_NONBLOCK
  808. Nov 24 01:16:10 VirtualDebian sshd[2131]: debug1: Bind to port 22 on 0.0.0.0.
  809. Nov 24 01:16:10 VirtualDebian sshd[2131]: Server listening on 0.0.0.0 port 22.
  810. Nov 24 01:17:01 VirtualDebian CRON[2133]: pam_unix(cron:session): session opened for user root by (uid=0)
  811. Nov 24 01:17:01 VirtualDebian CRON[2133]: pam_unix(cron:session): session closed for user root
  812. Nov 24 02:09:47 VirtualDebian sshd[1772]: debug2: fd 3 setting O_NONBLOCK
  813. Nov 24 02:09:47 VirtualDebian sshd[1772]: debug1: Bind to port 22 on ::.
  814. Nov 24 02:09:47 VirtualDebian sshd[1772]: Server listening on :: port 22.
  815. Nov 24 02:09:47 VirtualDebian sshd[1772]: debug2: fd 4 setting O_NONBLOCK
  816. Nov 24 02:09:47 VirtualDebian sshd[1772]: debug1: Bind to port 22 on 0.0.0.0.
  817. Nov 24 02:09:47 VirtualDebian sshd[1772]: Server listening on 0.0.0.0 port 22.
  818. Nov 26 20:27:06 VirtualDebian sshd[1762]: debug2: fd 3 setting O_NONBLOCK
  819. Nov 26 20:27:06 VirtualDebian sshd[1762]: debug1: Bind to port 22 on ::.
  820. Nov 26 20:27:06 VirtualDebian sshd[1762]: Server listening on :: port 22.
  821. Nov 26 20:27:06 VirtualDebian sshd[1762]: debug2: fd 4 setting O_NONBLOCK
  822. Nov 26 20:27:06 VirtualDebian sshd[1762]: debug1: Bind to port 22 on 0.0.0.0.
  823. Nov 26 20:27:06 VirtualDebian sshd[1762]: Server listening on 0.0.0.0 port 22.
  824. Nov 26 20:27:07 VirtualDebian sshd[1762]: Received signal 15; terminating.
  825. Nov 26 20:27:07 VirtualDebian sshd[2081]: debug2: fd 3 setting O_NONBLOCK
  826. Nov 26 20:27:07 VirtualDebian sshd[2081]: debug1: Bind to port 22 on ::.
  827. Nov 26 20:27:07 VirtualDebian sshd[2081]: Server listening on :: port 22.
  828. Nov 26 20:27:07 VirtualDebian sshd[2081]: debug2: fd 4 setting O_NONBLOCK
  829. Nov 26 20:27:07 VirtualDebian sshd[2081]: debug1: Bind to port 22 on 0.0.0.0.
  830. Nov 26 20:27:07 VirtualDebian sshd[2081]: Server listening on 0.0.0.0 port 22.
  831. Nov 26 20:27:14 VirtualDebian login[2118]: pam_unix(login:session): session opened for user root by (uid=0)
  832. Nov 26 20:27:14 VirtualDebian login[2142]: ROOT LOGIN on 'tty1'
  833. Nov 26 20:50:48 VirtualDebian sshd[1798]: debug2: fd 3 setting O_NONBLOCK
  834. Nov 26 20:50:48 VirtualDebian sshd[1798]: debug1: Bind to port 22 on ::.
  835. Nov 26 20:50:48 VirtualDebian sshd[1798]: Server listening on :: port 22.
  836. Nov 26 20:50:48 VirtualDebian sshd[1798]: debug2: fd 4 setting O_NONBLOCK
  837. Nov 26 20:50:48 VirtualDebian sshd[1798]: debug1: Bind to port 22 on 0.0.0.0.
  838. Nov 26 20:50:48 VirtualDebian sshd[1798]: Server listening on 0.0.0.0 port 22.
  839. Nov 26 20:50:52 VirtualDebian login[2120]: pam_unix(login:session): session opened for user root by (uid=0)
  840. Nov 26 20:50:52 VirtualDebian login[2144]: ROOT LOGIN on 'tty1'
  841. Nov 26 20:51:20 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  842. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  843. Nov 26 20:51:20 VirtualDebian sshd[1798]: debug1: Forked child 2149.
  844. Nov 26 20:51:20 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  845. Nov 26 20:51:20 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  846. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug1: inetd sockets after dupping: 3, 3
  847. Nov 26 20:51:20 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  848. Nov 26 20:51:20 VirtualDebian sshd[2149]: Connection from 10.0.2.2 port 56283
  849. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  850. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  851. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug1: Enabling compatibility mode for protocol 2.0
  852. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  853. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug2: fd 3 setting O_NONBLOCK
  854. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug2: Network child is on pid 2150
  855. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: preauth child monitor started
  856. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  857. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: monitor_read: checking request 0
  858. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  859. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: mm_request_send entering: type 1
  860. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug2: monitor_read: 0 used once, disabling now
  861. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  862. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: monitor_read: checking request 5
  863. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: mm_answer_sign
  864. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: mm_answer_sign: signature 0x7fd605d1cca0(271)
  865. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: mm_request_send entering: type 6
  866. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug2: monitor_read: 5 used once, disabling now
  867. Nov 26 20:51:20 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  868. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: monitor_read: checking request 7
  869. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_answer_pwnamallow
  870. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: Trying to reverse map address 10.0.2.2.
  871. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug2: parse_server_config: config reprocess config len 638
  872. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  873. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_send entering: type 8
  874. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug2: monitor_read: 7 used once, disabling now
  875. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  876. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: monitor_read: checking request 48
  877. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug1: PAM: initializing for "vsh0t"
  878. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  879. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug1: PAM: setting PAM_TTY to "ssh"
  880. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug2: monitor_read: 48 used once, disabling now
  881. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  882. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: monitor_read: checking request 3
  883. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  884. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug2: monitor_read: 3 used once, disabling now
  885. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  886. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: monitor_read: checking request 11
  887. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_answer_authpassword: sending result 0
  888. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_send entering: type 12
  889. Nov 26 20:51:22 VirtualDebian sshd[2149]: Failed none for vsh0t from 10.0.2.2 port 56283 ssh2
  890. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  891. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: monitor_read: checking request 51
  892. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_answer_pam_init_ctx
  893. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: PAM: sshpam_init_ctx entering
  894. Nov 26 20:51:22 VirtualDebian sshd[2151]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  895. Nov 26 20:51:22 VirtualDebian sshd[2151]: debug3: ssh_msg_send: type 1
  896. Nov 26 20:51:22 VirtualDebian sshd[2151]: debug3: ssh_msg_recv entering
  897. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_send entering: type 52
  898. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  899. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: monitor_read: checking request 53
  900. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_answer_pam_query
  901. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: PAM: sshpam_query entering
  902. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: ssh_msg_recv entering
  903. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_send entering: type 54
  904. Nov 26 20:51:22 VirtualDebian sshd[2149]: debug3: mm_request_receive entering
  905. Nov 26 20:51:33 VirtualDebian sshd[2149]: debug1: do_cleanup
  906. Nov 26 20:51:33 VirtualDebian sshd[2149]: debug1: PAM: cleanup
  907. Nov 26 20:51:33 VirtualDebian sshd[2149]: debug3: PAM: sshpam_thread_cleanup entering
  908. Nov 26 20:51:33 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  909. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  910. Nov 26 20:51:33 VirtualDebian sshd[1798]: debug1: Forked child 2152.
  911. Nov 26 20:51:33 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  912. Nov 26 20:51:33 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  913. Nov 26 20:51:33 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  914. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug1: inetd sockets after dupping: 3, 3
  915. Nov 26 20:51:33 VirtualDebian sshd[2152]: Connection from 10.0.2.2 port 56285
  916. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  917. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  918. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug1: Enabling compatibility mode for protocol 2.0
  919. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  920. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug2: fd 3 setting O_NONBLOCK
  921. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug2: Network child is on pid 2153
  922. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: preauth child monitor started
  923. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  924. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: monitor_read: checking request 0
  925. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  926. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: mm_request_send entering: type 1
  927. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug2: monitor_read: 0 used once, disabling now
  928. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  929. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: monitor_read: checking request 5
  930. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: mm_answer_sign
  931. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: mm_answer_sign: signature 0x7fe229ed3ca0(271)
  932. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: mm_request_send entering: type 6
  933. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug2: monitor_read: 5 used once, disabling now
  934. Nov 26 20:51:33 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  935. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: monitor_read: checking request 7
  936. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_answer_pwnamallow
  937. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: Trying to reverse map address 10.0.2.2.
  938. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug2: parse_server_config: config reprocess config len 638
  939. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  940. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_send entering: type 8
  941. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug2: monitor_read: 7 used once, disabling now
  942. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  943. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: monitor_read: checking request 48
  944. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug1: PAM: initializing for "vsh0t"
  945. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  946. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug1: PAM: setting PAM_TTY to "ssh"
  947. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug2: monitor_read: 48 used once, disabling now
  948. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  949. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: monitor_read: checking request 3
  950. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  951. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug2: monitor_read: 3 used once, disabling now
  952. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  953. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: monitor_read: checking request 11
  954. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_answer_authpassword: sending result 0
  955. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_send entering: type 12
  956. Nov 26 20:51:34 VirtualDebian sshd[2152]: Failed none for vsh0t from 10.0.2.2 port 56285 ssh2
  957. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  958. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: monitor_read: checking request 51
  959. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_answer_pam_init_ctx
  960. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: PAM: sshpam_init_ctx entering
  961. Nov 26 20:51:34 VirtualDebian sshd[2154]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  962. Nov 26 20:51:34 VirtualDebian sshd[2154]: debug3: ssh_msg_send: type 1
  963. Nov 26 20:51:34 VirtualDebian sshd[2154]: debug3: ssh_msg_recv entering
  964. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_send entering: type 52
  965. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  966. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: monitor_read: checking request 53
  967. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_answer_pam_query
  968. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: PAM: sshpam_query entering
  969. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: ssh_msg_recv entering
  970. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_send entering: type 54
  971. Nov 26 20:51:34 VirtualDebian sshd[2152]: debug3: mm_request_receive entering
  972. Nov 26 20:51:36 VirtualDebian sshd[2152]: debug1: do_cleanup
  973. Nov 26 20:51:36 VirtualDebian sshd[2152]: debug1: PAM: cleanup
  974. Nov 26 20:51:36 VirtualDebian sshd[2152]: debug3: PAM: sshpam_thread_cleanup entering
  975. Nov 26 20:52:10 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  976. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  977. Nov 26 20:52:10 VirtualDebian sshd[1798]: debug1: Forked child 2156.
  978. Nov 26 20:52:10 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  979. Nov 26 20:52:10 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  980. Nov 26 20:52:10 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  981. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug1: inetd sockets after dupping: 3, 3
  982. Nov 26 20:52:10 VirtualDebian sshd[2156]: Connection from 127.0.0.1 port 43828
  983. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-5
  984. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug1: match: OpenSSH_5.1p1 Debian-5 pat OpenSSH*
  985. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug1: Enabling compatibility mode for protocol 2.0
  986. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  987. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug2: fd 3 setting O_NONBLOCK
  988. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug2: Network child is on pid 2157
  989. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: preauth child monitor started
  990. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  991. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: monitor_read: checking request 0
  992. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  993. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: mm_request_send entering: type 1
  994. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug2: monitor_read: 0 used once, disabling now
  995. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  996. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: monitor_read: checking request 5
  997. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: mm_answer_sign
  998. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: mm_answer_sign: signature 0x7fe8694a3ca0(271)
  999. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: mm_request_send entering: type 6
  1000. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug2: monitor_read: 5 used once, disabling now
  1001. Nov 26 20:52:10 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  1002. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: monitor_read: checking request 7
  1003. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_answer_pwnamallow
  1004. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: Trying to reverse map address 127.0.0.1.
  1005. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug2: parse_server_config: config reprocess config len 638
  1006. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  1007. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_send entering: type 8
  1008. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug2: monitor_read: 7 used once, disabling now
  1009. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  1010. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: monitor_read: checking request 48
  1011. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug1: PAM: initializing for "vsh0t"
  1012. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug1: PAM: setting PAM_RHOST to "localhost"
  1013. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug1: PAM: setting PAM_TTY to "ssh"
  1014. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug2: monitor_read: 48 used once, disabling now
  1015. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  1016. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: monitor_read: checking request 3
  1017. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  1018. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug2: monitor_read: 3 used once, disabling now
  1019. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  1020. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: monitor_read: checking request 11
  1021. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_answer_authpassword: sending result 0
  1022. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_send entering: type 12
  1023. Nov 26 20:52:11 VirtualDebian sshd[2156]: Failed none for vsh0t from 127.0.0.1 port 43828 ssh2
  1024. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  1025. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: monitor_read: checking request 51
  1026. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_answer_pam_init_ctx
  1027. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: PAM: sshpam_init_ctx entering
  1028. Nov 26 20:52:11 VirtualDebian sshd[2158]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1029. Nov 26 20:52:11 VirtualDebian sshd[2158]: debug3: ssh_msg_send: type 1
  1030. Nov 26 20:52:11 VirtualDebian sshd[2158]: debug3: ssh_msg_recv entering
  1031. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_send entering: type 52
  1032. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  1033. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: monitor_read: checking request 53
  1034. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_answer_pam_query
  1035. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: PAM: sshpam_query entering
  1036. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: ssh_msg_recv entering
  1037. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_send entering: type 54
  1038. Nov 26 20:52:11 VirtualDebian sshd[2156]: debug3: mm_request_receive entering
  1039. Nov 26 20:52:13 VirtualDebian sshd[2156]: debug1: do_cleanup
  1040. Nov 26 20:52:13 VirtualDebian sshd[2156]: debug1: PAM: cleanup
  1041. Nov 26 20:52:13 VirtualDebian sshd[2156]: debug3: PAM: sshpam_thread_cleanup entering
  1042. Nov 26 20:52:14 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  1043. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  1044. Nov 26 20:52:14 VirtualDebian sshd[1798]: debug1: Forked child 2160.
  1045. Nov 26 20:52:14 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  1046. Nov 26 20:52:14 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  1047. Nov 26 20:52:14 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  1048. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: inetd sockets after dupping: 3, 3
  1049. Nov 26 20:52:14 VirtualDebian sshd[2160]: Connection from 127.0.0.1 port 43829
  1050. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-5
  1051. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: match: OpenSSH_5.1p1 Debian-5 pat OpenSSH*
  1052. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: Enabling compatibility mode for protocol 2.0
  1053. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  1054. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug2: fd 3 setting O_NONBLOCK
  1055. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug2: Network child is on pid 2161
  1056. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: preauth child monitor started
  1057. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1058. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: monitor_read: checking request 0
  1059. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  1060. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_send entering: type 1
  1061. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug2: monitor_read: 0 used once, disabling now
  1062. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1063. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: monitor_read: checking request 5
  1064. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_sign
  1065. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_sign: signature 0x7f8a7bad0ca0(271)
  1066. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_send entering: type 6
  1067. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug2: monitor_read: 5 used once, disabling now
  1068. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1069. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: monitor_read: checking request 7
  1070. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_pwnamallow
  1071. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: Trying to reverse map address 127.0.0.1.
  1072. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug2: parse_server_config: config reprocess config len 638
  1073. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  1074. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_send entering: type 8
  1075. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug2: monitor_read: 7 used once, disabling now
  1076. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1077. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: monitor_read: checking request 48
  1078. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: PAM: initializing for "vsh0t"
  1079. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: PAM: setting PAM_RHOST to "localhost"
  1080. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug1: PAM: setting PAM_TTY to "ssh"
  1081. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug2: monitor_read: 48 used once, disabling now
  1082. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1083. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: monitor_read: checking request 3
  1084. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  1085. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug2: monitor_read: 3 used once, disabling now
  1086. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1087. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: monitor_read: checking request 11
  1088. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_authpassword: sending result 0
  1089. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_send entering: type 12
  1090. Nov 26 20:52:14 VirtualDebian sshd[2160]: Failed none for vsh0t from 127.0.0.1 port 43829 ssh2
  1091. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1092. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: monitor_read: checking request 51
  1093. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_pam_init_ctx
  1094. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: PAM: sshpam_init_ctx entering
  1095. Nov 26 20:52:14 VirtualDebian sshd[2162]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1096. Nov 26 20:52:14 VirtualDebian sshd[2162]: debug3: ssh_msg_send: type 1
  1097. Nov 26 20:52:14 VirtualDebian sshd[2162]: debug3: ssh_msg_recv entering
  1098. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_send entering: type 52
  1099. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1100. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: monitor_read: checking request 53
  1101. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_answer_pam_query
  1102. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: PAM: sshpam_query entering
  1103. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: ssh_msg_recv entering
  1104. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_send entering: type 54
  1105. Nov 26 20:52:14 VirtualDebian sshd[2160]: debug3: mm_request_receive entering
  1106. Nov 26 20:52:15 VirtualDebian sshd[2160]: debug1: do_cleanup
  1107. Nov 26 20:52:15 VirtualDebian sshd[2160]: debug1: PAM: cleanup
  1108. Nov 26 20:52:15 VirtualDebian sshd[2160]: debug3: PAM: sshpam_thread_cleanup entering
  1109. Nov 26 20:52:16 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  1110. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  1111. Nov 26 20:52:16 VirtualDebian sshd[1798]: debug1: Forked child 2164.
  1112. Nov 26 20:52:16 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  1113. Nov 26 20:52:16 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  1114. Nov 26 20:52:16 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  1115. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: inetd sockets after dupping: 3, 3
  1116. Nov 26 20:52:16 VirtualDebian sshd[2164]: Connection from 127.0.0.1 port 43830
  1117. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-5
  1118. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: match: OpenSSH_5.1p1 Debian-5 pat OpenSSH*
  1119. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: Enabling compatibility mode for protocol 2.0
  1120. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  1121. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug2: fd 3 setting O_NONBLOCK
  1122. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug2: Network child is on pid 2165
  1123. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: preauth child monitor started
  1124. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1125. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: monitor_read: checking request 0
  1126. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  1127. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_send entering: type 1
  1128. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug2: monitor_read: 0 used once, disabling now
  1129. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1130. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: monitor_read: checking request 5
  1131. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_sign
  1132. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_sign: signature 0x7f3c81783ca0(271)
  1133. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_send entering: type 6
  1134. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug2: monitor_read: 5 used once, disabling now
  1135. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1136. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: monitor_read: checking request 7
  1137. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_pwnamallow
  1138. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: Trying to reverse map address 127.0.0.1.
  1139. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug2: parse_server_config: config reprocess config len 638
  1140. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  1141. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_send entering: type 8
  1142. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug2: monitor_read: 7 used once, disabling now
  1143. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1144. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: monitor_read: checking request 48
  1145. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: PAM: initializing for "vsh0t"
  1146. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: PAM: setting PAM_RHOST to "localhost"
  1147. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: PAM: setting PAM_TTY to "ssh"
  1148. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug2: monitor_read: 48 used once, disabling now
  1149. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1150. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: monitor_read: checking request 3
  1151. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  1152. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug2: monitor_read: 3 used once, disabling now
  1153. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1154. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: monitor_read: checking request 11
  1155. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_authpassword: sending result 0
  1156. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_send entering: type 12
  1157. Nov 26 20:52:16 VirtualDebian sshd[2164]: Failed none for vsh0t from 127.0.0.1 port 43830 ssh2
  1158. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1159. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: monitor_read: checking request 51
  1160. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_pam_init_ctx
  1161. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: PAM: sshpam_init_ctx entering
  1162. Nov 26 20:52:16 VirtualDebian sshd[2166]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1163. Nov 26 20:52:16 VirtualDebian sshd[2166]: debug3: ssh_msg_send: type 1
  1164. Nov 26 20:52:16 VirtualDebian sshd[2166]: debug3: ssh_msg_recv entering
  1165. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_send entering: type 52
  1166. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1167. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: monitor_read: checking request 53
  1168. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_answer_pam_query
  1169. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: PAM: sshpam_query entering
  1170. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: ssh_msg_recv entering
  1171. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_send entering: type 54
  1172. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: mm_request_receive entering
  1173. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: do_cleanup
  1174. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug1: PAM: cleanup
  1175. Nov 26 20:52:16 VirtualDebian sshd[2164]: debug3: PAM: sshpam_thread_cleanup entering
  1176. Nov 26 20:52:42 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  1177. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  1178. Nov 26 20:52:42 VirtualDebian sshd[1798]: debug1: Forked child 2171.
  1179. Nov 26 20:52:42 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  1180. Nov 26 20:52:42 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  1181. Nov 26 20:52:42 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  1182. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: inetd sockets after dupping: 3, 3
  1183. Nov 26 20:52:42 VirtualDebian sshd[2171]: Connection from 10.0.2.2 port 56287
  1184. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  1185. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  1186. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: Enabling compatibility mode for protocol 2.0
  1187. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  1188. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug2: fd 3 setting O_NONBLOCK
  1189. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug2: Network child is on pid 2172
  1190. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: preauth child monitor started
  1191. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1192. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 0
  1193. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  1194. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 1
  1195. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug2: monitor_read: 0 used once, disabling now
  1196. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1197. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 5
  1198. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_sign
  1199. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_sign: signature 0x7fbfcf3e4ca0(271)
  1200. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 6
  1201. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug2: monitor_read: 5 used once, disabling now
  1202. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1203. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 7
  1204. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_pwnamallow
  1205. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: Trying to reverse map address 10.0.2.2.
  1206. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug2: parse_server_config: config reprocess config len 638
  1207. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  1208. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 8
  1209. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug2: monitor_read: 7 used once, disabling now
  1210. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1211. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 48
  1212. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: PAM: initializing for "testopie"
  1213. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  1214. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug1: PAM: setting PAM_TTY to "ssh"
  1215. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug2: monitor_read: 48 used once, disabling now
  1216. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1217. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 3
  1218. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  1219. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug2: monitor_read: 3 used once, disabling now
  1220. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1221. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 11
  1222. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_authpassword: sending result 0
  1223. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 12
  1224. Nov 26 20:52:42 VirtualDebian sshd[2171]: Failed none for testopie from 10.0.2.2 port 56287 ssh2
  1225. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1226. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 51
  1227. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_pam_init_ctx
  1228. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: PAM: sshpam_init_ctx entering
  1229. Nov 26 20:52:42 VirtualDebian sshd[2173]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1230. Nov 26 20:52:42 VirtualDebian sshd[2173]: debug3: ssh_msg_send: type 1
  1231. Nov 26 20:52:42 VirtualDebian sshd[2173]: debug3: ssh_msg_recv entering
  1232. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 52
  1233. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1234. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 53
  1235. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_answer_pam_query
  1236. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: PAM: sshpam_query entering
  1237. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: ssh_msg_recv entering
  1238. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 54
  1239. Nov 26 20:52:42 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1240. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 55
  1241. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_answer_pam_respond
  1242. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug2: PAM: sshpam_respond entering, 1 responses
  1243. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: ssh_msg_send: type 6
  1244. Nov 26 20:54:08 VirtualDebian sshd[2173]: debug3: ssh_msg_send: type 7
  1245. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 56
  1246. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1247. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 53
  1248. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_answer_pam_query
  1249. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: PAM: sshpam_query entering
  1250. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: ssh_msg_recv entering
  1251. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: PAM: Authentication failure
  1252. Nov 26 20:54:08 VirtualDebian sshd[2171]: error: PAM: Authentication failure for testopie from 10.0.2.2
  1253. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 54
  1254. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1255. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 57
  1256. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_answer_pam_free_ctx
  1257. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: PAM: sshpam_free_ctx entering
  1258. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: PAM: sshpam_thread_cleanup entering
  1259. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 58
  1260. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug2: monitor_read: 57 used once, disabling now
  1261. Nov 26 20:54:08 VirtualDebian sshd[2171]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 56287 ssh2
  1262. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1263. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 51
  1264. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_answer_pam_init_ctx
  1265. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: PAM: sshpam_init_ctx entering
  1266. Nov 26 20:54:08 VirtualDebian sshd[2175]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1267. Nov 26 20:54:08 VirtualDebian sshd[2175]: debug3: ssh_msg_send: type 1
  1268. Nov 26 20:54:08 VirtualDebian sshd[2175]: debug3: ssh_msg_recv entering
  1269. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 52
  1270. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1271. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 53
  1272. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_answer_pam_query
  1273. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: PAM: sshpam_query entering
  1274. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: ssh_msg_recv entering
  1275. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 54
  1276. Nov 26 20:54:08 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1277. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 55
  1278. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_answer_pam_respond
  1279. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug2: PAM: sshpam_respond entering, 1 responses
  1280. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: ssh_msg_send: type 6
  1281. Nov 26 20:54:32 VirtualDebian sshd[2175]: debug3: ssh_msg_send: type 7
  1282. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 56
  1283. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1284. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 53
  1285. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_answer_pam_query
  1286. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: PAM: sshpam_query entering
  1287. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: ssh_msg_recv entering
  1288. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: PAM: Authentication failure
  1289. Nov 26 20:54:32 VirtualDebian sshd[2171]: error: PAM: Authentication failure for testopie from 10.0.2.2
  1290. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 54
  1291. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1292. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 57
  1293. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_answer_pam_free_ctx
  1294. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: PAM: sshpam_free_ctx entering
  1295. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: PAM: sshpam_thread_cleanup entering
  1296. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 58
  1297. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug2: monitor_read: 57 used once, disabling now
  1298. Nov 26 20:54:32 VirtualDebian sshd[2171]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 56287 ssh2
  1299. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1300. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 51
  1301. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_answer_pam_init_ctx
  1302. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: PAM: sshpam_init_ctx entering
  1303. Nov 26 20:54:32 VirtualDebian sshd[2176]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1304. Nov 26 20:54:32 VirtualDebian sshd[2176]: debug3: ssh_msg_send: type 1
  1305. Nov 26 20:54:32 VirtualDebian sshd[2176]: debug3: ssh_msg_recv entering
  1306. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 52
  1307. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1308. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: monitor_read: checking request 53
  1309. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_answer_pam_query
  1310. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: PAM: sshpam_query entering
  1311. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: ssh_msg_recv entering
  1312. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_send entering: type 54
  1313. Nov 26 20:54:32 VirtualDebian sshd[2171]: debug3: mm_request_receive entering
  1314. Nov 26 20:55:00 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  1315. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  1316. Nov 26 20:55:00 VirtualDebian sshd[1798]: debug1: Forked child 2177.
  1317. Nov 26 20:55:00 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  1318. Nov 26 20:55:00 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  1319. Nov 26 20:55:00 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  1320. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: inetd sockets after dupping: 3, 3
  1321. Nov 26 20:55:00 VirtualDebian sshd[2177]: Connection from 10.0.2.2 port 58697
  1322. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  1323. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  1324. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: Enabling compatibility mode for protocol 2.0
  1325. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  1326. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug2: fd 3 setting O_NONBLOCK
  1327. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug2: Network child is on pid 2178
  1328. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: preauth child monitor started
  1329. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1330. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 0
  1331. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  1332. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 1
  1333. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug2: monitor_read: 0 used once, disabling now
  1334. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1335. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 5
  1336. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_sign
  1337. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_sign: signature 0x7fb4c8531ca0(271)
  1338. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 6
  1339. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug2: monitor_read: 5 used once, disabling now
  1340. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1341. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 7
  1342. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_pwnamallow
  1343. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: Trying to reverse map address 10.0.2.2.
  1344. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug2: parse_server_config: config reprocess config len 638
  1345. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  1346. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 8
  1347. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug2: monitor_read: 7 used once, disabling now
  1348. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1349. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 48
  1350. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: PAM: initializing for "testopie"
  1351. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  1352. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug1: PAM: setting PAM_TTY to "ssh"
  1353. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug2: monitor_read: 48 used once, disabling now
  1354. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1355. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 3
  1356. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  1357. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug2: monitor_read: 3 used once, disabling now
  1358. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1359. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 11
  1360. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_authpassword: sending result 0
  1361. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 12
  1362. Nov 26 20:55:00 VirtualDebian sshd[2177]: Failed none for testopie from 10.0.2.2 port 58697 ssh2
  1363. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1364. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 51
  1365. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_pam_init_ctx
  1366. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: PAM: sshpam_init_ctx entering
  1367. Nov 26 20:55:00 VirtualDebian sshd[2179]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1368. Nov 26 20:55:00 VirtualDebian sshd[2179]: debug3: ssh_msg_send: type 1
  1369. Nov 26 20:55:00 VirtualDebian sshd[2179]: debug3: ssh_msg_recv entering
  1370. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 52
  1371. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1372. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 53
  1373. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_answer_pam_query
  1374. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: PAM: sshpam_query entering
  1375. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: ssh_msg_recv entering
  1376. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 54
  1377. Nov 26 20:55:00 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1378. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 55
  1379. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_answer_pam_respond
  1380. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug2: PAM: sshpam_respond entering, 1 responses
  1381. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: ssh_msg_send: type 6
  1382. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 56
  1383. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1384. Nov 26 20:56:33 VirtualDebian sshd[2179]: debug3: ssh_msg_send: type 7
  1385. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 53
  1386. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_answer_pam_query
  1387. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: PAM: sshpam_query entering
  1388. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: ssh_msg_recv entering
  1389. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: PAM: Authentication failure
  1390. Nov 26 20:56:33 VirtualDebian sshd[2177]: error: PAM: Authentication failure for testopie from 10.0.2.2
  1391. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 54
  1392. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1393. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 57
  1394. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_answer_pam_free_ctx
  1395. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: PAM: sshpam_free_ctx entering
  1396. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: PAM: sshpam_thread_cleanup entering
  1397. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 58
  1398. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug2: monitor_read: 57 used once, disabling now
  1399. Nov 26 20:56:33 VirtualDebian sshd[2177]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 58697 ssh2
  1400. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1401. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 51
  1402. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_answer_pam_init_ctx
  1403. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: PAM: sshpam_init_ctx entering
  1404. Nov 26 20:56:33 VirtualDebian sshd[2181]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1405. Nov 26 20:56:33 VirtualDebian sshd[2181]: debug3: ssh_msg_send: type 1
  1406. Nov 26 20:56:33 VirtualDebian sshd[2181]: debug3: ssh_msg_recv entering
  1407. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 52
  1408. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1409. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 53
  1410. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_answer_pam_query
  1411. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: PAM: sshpam_query entering
  1412. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: ssh_msg_recv entering
  1413. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 54
  1414. Nov 26 20:56:33 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1415. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 55
  1416. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_answer_pam_respond
  1417. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug2: PAM: sshpam_respond entering, 1 responses
  1418. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: ssh_msg_send: type 6
  1419. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 56
  1420. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1421. Nov 26 20:56:42 VirtualDebian sshd[2181]: debug3: ssh_msg_send: type 7
  1422. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 53
  1423. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_answer_pam_query
  1424. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: PAM: sshpam_query entering
  1425. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: ssh_msg_recv entering
  1426. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: PAM: Authentication failure
  1427. Nov 26 20:56:42 VirtualDebian sshd[2177]: error: PAM: Authentication failure for testopie from 10.0.2.2
  1428. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 54
  1429. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1430. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 57
  1431. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_answer_pam_free_ctx
  1432. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: PAM: sshpam_free_ctx entering
  1433. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: PAM: sshpam_thread_cleanup entering
  1434. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 58
  1435. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug2: monitor_read: 57 used once, disabling now
  1436. Nov 26 20:56:42 VirtualDebian sshd[2177]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 58697 ssh2
  1437. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1438. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 51
  1439. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_answer_pam_init_ctx
  1440. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: PAM: sshpam_init_ctx entering
  1441. Nov 26 20:56:42 VirtualDebian sshd[2182]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1442. Nov 26 20:56:42 VirtualDebian sshd[2182]: debug3: ssh_msg_send: type 1
  1443. Nov 26 20:56:42 VirtualDebian sshd[2182]: debug3: ssh_msg_recv entering
  1444. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 52
  1445. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1446. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 53
  1447. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_answer_pam_query
  1448. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: PAM: sshpam_query entering
  1449. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: ssh_msg_recv entering
  1450. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 54
  1451. Nov 26 20:56:42 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1452. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 55
  1453. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_answer_pam_respond
  1454. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug2: PAM: sshpam_respond entering, 1 responses
  1455. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: ssh_msg_send: type 6
  1456. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 56
  1457. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1458. Nov 26 20:56:44 VirtualDebian sshd[2182]: debug3: ssh_msg_send: type 7
  1459. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 53
  1460. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_answer_pam_query
  1461. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: PAM: sshpam_query entering
  1462. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: ssh_msg_recv entering
  1463. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: PAM: Authentication failure
  1464. Nov 26 20:56:44 VirtualDebian sshd[2177]: error: PAM: Authentication failure for testopie from 10.0.2.2
  1465. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 54
  1466. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1467. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 57
  1468. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_answer_pam_free_ctx
  1469. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: PAM: sshpam_free_ctx entering
  1470. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: PAM: sshpam_thread_cleanup entering
  1471. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 58
  1472. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug2: monitor_read: 57 used once, disabling now
  1473. Nov 26 20:56:44 VirtualDebian sshd[2177]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 58697 ssh2
  1474. Nov 26 20:56:44 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1475. Nov 26 20:56:45 VirtualDebian sshd[2177]: debug3: monitor_read: checking request 11
  1476. Nov 26 20:56:45 VirtualDebian sshd[2177]: debug3: mm_answer_authpassword: sending result 0
  1477. Nov 26 20:56:45 VirtualDebian sshd[2177]: debug3: mm_request_send entering: type 12
  1478. Nov 26 20:56:45 VirtualDebian sshd[2177]: Failed password for testopie from 10.0.2.2 port 58697 ssh2
  1479. Nov 26 20:56:45 VirtualDebian sshd[2177]: debug3: mm_request_receive entering
  1480. Nov 26 20:56:46 VirtualDebian sshd[2177]: debug1: do_cleanup
  1481. Nov 26 20:56:46 VirtualDebian sshd[2177]: debug1: PAM: cleanup
  1482. Nov 26 20:56:46 VirtualDebian sshd[2177]: debug3: PAM: sshpam_thread_cleanup entering
  1483. Nov 26 20:56:46 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  1484. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  1485. Nov 26 20:56:46 VirtualDebian sshd[1798]: debug1: Forked child 2183.
  1486. Nov 26 20:56:46 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  1487. Nov 26 20:56:46 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  1488. Nov 26 20:56:46 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  1489. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: inetd sockets after dupping: 3, 3
  1490. Nov 26 20:56:46 VirtualDebian sshd[2183]: Connection from 10.0.2.2 port 58699
  1491. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  1492. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  1493. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: Enabling compatibility mode for protocol 2.0
  1494. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  1495. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug2: fd 3 setting O_NONBLOCK
  1496. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug2: Network child is on pid 2184
  1497. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: preauth child monitor started
  1498. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1499. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 0
  1500. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  1501. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 1
  1502. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug2: monitor_read: 0 used once, disabling now
  1503. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1504. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 5
  1505. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_sign
  1506. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_sign: signature 0x7fa550723ca0(271)
  1507. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 6
  1508. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug2: monitor_read: 5 used once, disabling now
  1509. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1510. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 7
  1511. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_pwnamallow
  1512. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: Trying to reverse map address 10.0.2.2.
  1513. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug2: parse_server_config: config reprocess config len 638
  1514. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  1515. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 8
  1516. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug2: monitor_read: 7 used once, disabling now
  1517. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1518. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 48
  1519. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: PAM: initializing for "testopie"
  1520. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  1521. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug1: PAM: setting PAM_TTY to "ssh"
  1522. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug2: monitor_read: 48 used once, disabling now
  1523. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1524. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 3
  1525. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  1526. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug2: monitor_read: 3 used once, disabling now
  1527. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1528. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 11
  1529. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_authpassword: sending result 0
  1530. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 12
  1531. Nov 26 20:56:46 VirtualDebian sshd[2183]: Failed none for testopie from 10.0.2.2 port 58699 ssh2
  1532. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1533. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 51
  1534. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_pam_init_ctx
  1535. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: PAM: sshpam_init_ctx entering
  1536. Nov 26 20:56:46 VirtualDebian sshd[2185]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1537. Nov 26 20:56:46 VirtualDebian sshd[2185]: debug3: ssh_msg_send: type 1
  1538. Nov 26 20:56:46 VirtualDebian sshd[2185]: debug3: ssh_msg_recv entering
  1539. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 52
  1540. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1541. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 53
  1542. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_answer_pam_query
  1543. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: PAM: sshpam_query entering
  1544. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: ssh_msg_recv entering
  1545. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 54
  1546. Nov 26 20:56:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1547. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 55
  1548. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_answer_pam_respond
  1549. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug2: PAM: sshpam_respond entering, 1 responses
  1550. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: ssh_msg_send: type 6
  1551. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 56
  1552. Nov 26 20:57:05 VirtualDebian sshd[2185]: debug3: ssh_msg_send: type 7
  1553. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1554. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 53
  1555. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_answer_pam_query
  1556. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: PAM: sshpam_query entering
  1557. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: ssh_msg_recv entering
  1558. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: PAM: Authentication failure
  1559. Nov 26 20:57:05 VirtualDebian sshd[2183]: error: PAM: Authentication failure for testopie from 10.0.2.2
  1560. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 54
  1561. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1562. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 57
  1563. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_answer_pam_free_ctx
  1564. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: PAM: sshpam_free_ctx entering
  1565. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: PAM: sshpam_thread_cleanup entering
  1566. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 58
  1567. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug2: monitor_read: 57 used once, disabling now
  1568. Nov 26 20:57:05 VirtualDebian sshd[2183]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 58699 ssh2
  1569. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1570. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 51
  1571. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_answer_pam_init_ctx
  1572. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: PAM: sshpam_init_ctx entering
  1573. Nov 26 20:57:05 VirtualDebian sshd[2186]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1574. Nov 26 20:57:05 VirtualDebian sshd[2186]: debug3: ssh_msg_send: type 1
  1575. Nov 26 20:57:05 VirtualDebian sshd[2186]: debug3: ssh_msg_recv entering
  1576. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 52
  1577. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1578. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 53
  1579. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_answer_pam_query
  1580. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: PAM: sshpam_query entering
  1581. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: ssh_msg_recv entering
  1582. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 54
  1583. Nov 26 20:57:05 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1584. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 55
  1585. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_answer_pam_respond
  1586. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug2: PAM: sshpam_respond entering, 1 responses
  1587. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: ssh_msg_send: type 6
  1588. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 56
  1589. Nov 26 20:57:30 VirtualDebian sshd[2186]: debug3: ssh_msg_send: type 7
  1590. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1591. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 53
  1592. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_answer_pam_query
  1593. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: PAM: sshpam_query entering
  1594. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: ssh_msg_recv entering
  1595. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: PAM: Authentication failure
  1596. Nov 26 20:57:30 VirtualDebian sshd[2183]: error: PAM: Authentication failure for testopie from 10.0.2.2
  1597. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 54
  1598. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1599. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 57
  1600. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_answer_pam_free_ctx
  1601. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: PAM: sshpam_free_ctx entering
  1602. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: PAM: sshpam_thread_cleanup entering
  1603. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 58
  1604. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug2: monitor_read: 57 used once, disabling now
  1605. Nov 26 20:57:30 VirtualDebian sshd[2183]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 58699 ssh2
  1606. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1607. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 51
  1608. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_answer_pam_init_ctx
  1609. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: PAM: sshpam_init_ctx entering
  1610. Nov 26 20:57:30 VirtualDebian sshd[2187]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1611. Nov 26 20:57:30 VirtualDebian sshd[2187]: debug3: ssh_msg_send: type 1
  1612. Nov 26 20:57:30 VirtualDebian sshd[2187]: debug3: ssh_msg_recv entering
  1613. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 52
  1614. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1615. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 53
  1616. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_answer_pam_query
  1617. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: PAM: sshpam_query entering
  1618. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: ssh_msg_recv entering
  1619. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 54
  1620. Nov 26 20:57:30 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1621. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 55
  1622. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_answer_pam_respond
  1623. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug2: PAM: sshpam_respond entering, 1 responses
  1624. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: ssh_msg_send: type 6
  1625. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 56
  1626. Nov 26 20:57:39 VirtualDebian sshd[2187]: debug3: ssh_msg_send: type 7
  1627. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1628. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 53
  1629. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_answer_pam_query
  1630. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: PAM: sshpam_query entering
  1631. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: ssh_msg_recv entering
  1632. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: PAM: Authentication failure
  1633. Nov 26 20:57:39 VirtualDebian sshd[2183]: error: PAM: Authentication failure for testopie from 10.0.2.2
  1634. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 54
  1635. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1636. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 57
  1637. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_answer_pam_free_ctx
  1638. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: PAM: sshpam_free_ctx entering
  1639. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: PAM: sshpam_thread_cleanup entering
  1640. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 58
  1641. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug2: monitor_read: 57 used once, disabling now
  1642. Nov 26 20:57:39 VirtualDebian sshd[2183]: Failed keyboard-interactive/pam for testopie from 10.0.2.2 port 58699 ssh2
  1643. Nov 26 20:57:39 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1644. Nov 26 20:57:44 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 11
  1645. Nov 26 20:57:44 VirtualDebian sshd[2183]: debug3: PAM: sshpam_passwd_conv called with 1 messages
  1646. Nov 26 20:57:44 VirtualDebian sshd[2183]: debug1: PAM: password authentication failed for testopie: Authentication failure
  1647. Nov 26 20:57:44 VirtualDebian sshd[2183]: debug3: mm_answer_authpassword: sending result 0
  1648. Nov 26 20:57:44 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 12
  1649. Nov 26 20:57:44 VirtualDebian sshd[2183]: Failed password for testopie from 10.0.2.2 port 58699 ssh2
  1650. Nov 26 20:57:44 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1651. Nov 26 20:57:46 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 11
  1652. Nov 26 20:57:46 VirtualDebian sshd[2183]: debug3: PAM: sshpam_passwd_conv called with 1 messages
  1653. Nov 26 20:57:46 VirtualDebian sshd[2183]: debug1: PAM: password authentication failed for testopie: Authentication failure
  1654. Nov 26 20:57:46 VirtualDebian sshd[2183]: debug3: mm_answer_authpassword: sending result 0
  1655. Nov 26 20:57:46 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 12
  1656. Nov 26 20:57:46 VirtualDebian sshd[2183]: Failed password for testopie from 10.0.2.2 port 58699 ssh2
  1657. Nov 26 20:57:46 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1658. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug3: monitor_read: checking request 11
  1659. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug3: PAM: sshpam_passwd_conv called with 1 messages
  1660. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug1: PAM: password authentication failed for testopie: Authentication failure
  1661. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug3: mm_answer_authpassword: sending result 0
  1662. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug3: mm_request_send entering: type 12
  1663. Nov 26 20:57:48 VirtualDebian sshd[2183]: Failed password for testopie from 10.0.2.2 port 58699 ssh2
  1664. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug3: mm_request_receive entering
  1665. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug1: do_cleanup
  1666. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug1: PAM: cleanup
  1667. Nov 26 20:57:48 VirtualDebian sshd[2183]: debug3: PAM: sshpam_thread_cleanup entering
  1668. Nov 26 20:57:51 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  1669. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  1670. Nov 26 20:57:51 VirtualDebian sshd[1798]: debug1: Forked child 2188.
  1671. Nov 26 20:57:51 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  1672. Nov 26 20:57:51 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  1673. Nov 26 20:57:51 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  1674. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: inetd sockets after dupping: 3, 3
  1675. Nov 26 20:57:51 VirtualDebian sshd[2188]: Connection from 10.0.2.2 port 58701
  1676. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  1677. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  1678. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: Enabling compatibility mode for protocol 2.0
  1679. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  1680. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug2: fd 3 setting O_NONBLOCK
  1681. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug2: Network child is on pid 2189
  1682. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: preauth child monitor started
  1683. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1684. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 0
  1685. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  1686. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 1
  1687. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug2: monitor_read: 0 used once, disabling now
  1688. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1689. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 5
  1690. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_sign
  1691. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_sign: signature 0x7fc756b4dca0(271)
  1692. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 6
  1693. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug2: monitor_read: 5 used once, disabling now
  1694. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1695. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 7
  1696. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_pwnamallow
  1697. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: Trying to reverse map address 10.0.2.2.
  1698. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug2: parse_server_config: config reprocess config len 638
  1699. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  1700. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 8
  1701. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug2: monitor_read: 7 used once, disabling now
  1702. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1703. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 48
  1704. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: PAM: initializing for "testopie"
  1705. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  1706. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug1: PAM: setting PAM_TTY to "ssh"
  1707. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug2: monitor_read: 48 used once, disabling now
  1708. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1709. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 3
  1710. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  1711. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug2: monitor_read: 3 used once, disabling now
  1712. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1713. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 11
  1714. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_authpassword: sending result 0
  1715. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 12
  1716. Nov 26 20:57:51 VirtualDebian sshd[2188]: Failed none for testopie from 10.0.2.2 port 58701 ssh2
  1717. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1718. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 51
  1719. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_pam_init_ctx
  1720. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: PAM: sshpam_init_ctx entering
  1721. Nov 26 20:57:51 VirtualDebian sshd[2190]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1722. Nov 26 20:57:51 VirtualDebian sshd[2190]: debug3: ssh_msg_send: type 1
  1723. Nov 26 20:57:51 VirtualDebian sshd[2190]: debug3: ssh_msg_recv entering
  1724. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 52
  1725. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1726. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 53
  1727. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_answer_pam_query
  1728. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: PAM: sshpam_query entering
  1729. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: ssh_msg_recv entering
  1730. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 54
  1731. Nov 26 20:57:51 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1732. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 55
  1733. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_answer_pam_respond
  1734. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug2: PAM: sshpam_respond entering, 1 responses
  1735. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: ssh_msg_send: type 6
  1736. Nov 26 20:58:06 VirtualDebian sshd[2190]: debug1: do_pam_account: called
  1737. Nov 26 20:58:06 VirtualDebian sshd[2190]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
  1738. Nov 26 20:58:06 VirtualDebian sshd[2190]: debug3: ssh_msg_send: type 0
  1739. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 56
  1740. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1741. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 53
  1742. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_answer_pam_query
  1743. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: PAM: sshpam_query entering
  1744. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: ssh_msg_recv entering
  1745. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: PAM: import_environments entering
  1746. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: sshpam_password_change_required 0
  1747. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: PAM: num env strings 0
  1748. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug1: PAM: num PAM env strings 0
  1749. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 54
  1750. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1751. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 55
  1752. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_answer_pam_respond
  1753. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug2: PAM: sshpam_respond entering, 0 responses
  1754. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 56
  1755. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1756. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 57
  1757. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_answer_pam_free_ctx
  1758. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: PAM: sshpam_free_ctx entering
  1759. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: PAM: sshpam_thread_cleanup entering
  1760. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 58
  1761. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug2: monitor_read: 57 used once, disabling now
  1762. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive_expect entering: type 49
  1763. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1764. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug1: do_pam_account: called
  1765. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 50
  1766. Nov 26 20:58:06 VirtualDebian sshd[2188]: Accepted keyboard-interactive/pam for testopie from 10.0.2.2 port 58701 ssh2
  1767. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug1: monitor_child_preauth: testopie has been authenticated by privileged process
  1768. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_get_keystate: Waiting for new keys
  1769. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive_expect entering: type 25
  1770. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1771. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_newkeys_from_blob: 0x7fc756b4cc60(122)
  1772. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug2: mac_setup: found hmac-md5
  1773. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_get_keystate: Waiting for second key
  1774. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_newkeys_from_blob: 0x7fc756b4cc60(122)
  1775. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug2: mac_setup: found hmac-md5
  1776. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_get_keystate: Getting compression state
  1777. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_get_keystate: Getting Network I/O buffers
  1778. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_share_sync: Share sync
  1779. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_share_sync: Share sync end
  1780. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug1: PAM: establishing credentials
  1781. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: PAM: opening session
  1782. Nov 26 20:58:06 VirtualDebian sshd[2188]: pam_unix(sshd:session): session opened for user testopie by (uid=0)
  1783. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: PAM: sshpam_store_conv called with 1 messages
  1784. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: SELinux support disabled
  1785. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: PAM: establishing credentials
  1786. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: permanently_set_uid: 1001/1001
  1787. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: set_newkeys: mode 0
  1788. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: set_newkeys: mode 1
  1789. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: Entering interactive session for SSH2.
  1790. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: fd 5 setting O_NONBLOCK
  1791. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: fd 6 setting O_NONBLOCK
  1792. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: server_init_dispatch_20
  1793. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
  1794. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: input_session_request
  1795. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: channel 0: new [server-session]
  1796. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: session_new: allocate (allocated 0 max 10)
  1797. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: session_unused: session id 0 unused
  1798. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_new: session 0
  1799. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_open: channel 0
  1800. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_open: session 0: link with channel 0
  1801. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: server_input_channel_open: confirm session
  1802. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: server_input_global_request: rtype no-more-sessions@openssh.com want_reply 0
  1803. Nov 26 20:58:06 VirtualDebian sshd[2188]: User child is on pid 2191
  1804. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
  1805. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_by_channel: session 0 channel 0
  1806. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_input_channel_req: session 0 req pty-req
  1807. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: Allocating pty.
  1808. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: mm_request_send entering: type 26
  1809. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
  1810. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: mm_request_receive_expect entering: type 27
  1811. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: mm_request_receive entering
  1812. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1813. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 26
  1814. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_answer_pty entering
  1815. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug2: session_new: allocate (allocated 0 max 10)
  1816. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: session_unused: session id 0 unused
  1817. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug1: session_new: session 0
  1818. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug1: SELinux support disabled
  1819. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_send entering: type 27
  1820. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_answer_pty: tty /dev/pts/0 ptyfd 4
  1821. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_pty_req: session 0 alloc /dev/pts/0
  1822. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: tty_parse_modes: SSH2 n_bytes 256
  1823. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: tty_parse_modes: ospeed 38400
  1824. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: tty_parse_modes: ispeed 38400
  1825. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: server_input_channel_req: channel 0 request env reply 0
  1826. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_by_channel: session 0 channel 0
  1827. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_input_channel_req: session 0 req env
  1828. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: Setting env 0: LANG=it_IT.UTF-8
  1829. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: server_input_channel_req: channel 0 request shell reply 1
  1830. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_by_channel: session 0 channel 0
  1831. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug1: session_input_channel_req: session 0 req shell
  1832. Nov 26 20:58:06 VirtualDebian sshd[2192]: debug1: Setting controlling tty using TIOCSCTTY.
  1833. Nov 26 20:58:06 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1834. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: fd 3 setting TCP_NODELAY
  1835. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: channel 0: rfd 9 isatty
  1836. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug2: fd 9 setting O_NONBLOCK
  1837. Nov 26 20:58:06 VirtualDebian sshd[2191]: debug3: fd 7 is O_NONBLOCK
  1838. Nov 26 20:58:06 VirtualDebian sshd[2192]: debug3: channel 0: close_fds r -1 w -1 e -1 c -1
  1839. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: read<=0 rfd 9 len -1
  1840. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: read failed
  1841. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: close_read
  1842. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: input open -> drain
  1843. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: ibuf empty
  1844. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: send eof
  1845. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: input drain -> closed
  1846. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: Received SIGCHLD.
  1847. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: session_by_pid: pid 2192
  1848. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: session_exit_message: session 0 channel 0 pid 2192
  1849. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: request exit-status confirm 0
  1850. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: session_exit_message: release channel 0
  1851. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: write failed
  1852. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: close_write
  1853. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: send eow
  1854. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: output open -> closed
  1855. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: mm_request_send entering: type 28
  1856. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 28
  1857. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug3: mm_answer_pty_cleanup entering
  1858. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug1: session_by_tty: session 0 tty /dev/pts/0
  1859. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug3: mm_session_close: session 0 pid 2191
  1860. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug3: mm_session_close: tty /dev/pts/0 ptyfd 4
  1861. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug1: session_pty_cleanup: session 0 release /dev/pts/0
  1862. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug3: session_unused: session id 0 unused
  1863. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug3: mm_request_receive entering
  1864. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: send close
  1865. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: channel 0: will not send data after close
  1866. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: notify_done: reading
  1867. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: channel 0: will not send data after close
  1868. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: rcvd close
  1869. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: channel 0: will not send data after close
  1870. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: is dead
  1871. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: gc: notify user
  1872. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: session_by_channel: session 0 channel 0
  1873. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: session_close_by_channel: channel 0 child 0
  1874. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: session_close: session 0 pid 0
  1875. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: session_unused: session id 0 unused
  1876. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: gc: user detached
  1877. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: is dead
  1878. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug2: channel 0: garbage collecting
  1879. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: channel 0: free: server-session, nchannels 1
  1880. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: channel 0: status: The following connections are open:\r\n #0 server-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)\r\n
  1881. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: channel 0: close_fds r -1 w -1 e -1 c -1
  1882. Nov 26 20:58:28 VirtualDebian sshd[2191]: Connection closed by 10.0.2.2
  1883. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug1: do_cleanup
  1884. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: PAM: sshpam_thread_cleanup entering
  1885. Nov 26 20:58:28 VirtualDebian sshd[2191]: Transferred: sent 12360, received 3888 bytes
  1886. Nov 26 20:58:28 VirtualDebian sshd[2191]: Closing connection to 10.0.2.2 port 58701
  1887. Nov 26 20:58:28 VirtualDebian sshd[2191]: debug3: mm_request_send entering: type 61
  1888. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug3: monitor_read: checking request 61
  1889. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug3: mm_answer_term: tearing down sessions
  1890. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug1: PAM: cleanup
  1891. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug1: PAM: deleting credentials
  1892. Nov 26 20:58:28 VirtualDebian sshd[2188]: debug1: PAM: closing session
  1893. Nov 26 20:58:28 VirtualDebian sshd[2188]: pam_unix(sshd:session): session closed for user testopie
  1894. Nov 26 20:58:31 VirtualDebian sshd[1798]: debug3: fd 5 is not O_NONBLOCK
  1895. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  1896. Nov 26 20:58:31 VirtualDebian sshd[1798]: debug1: Forked child 2207.
  1897. Nov 26 20:58:31 VirtualDebian sshd[1798]: debug3: send_rexec_state: entering fd = 8 config len 638
  1898. Nov 26 20:58:31 VirtualDebian sshd[1798]: debug3: ssh_msg_send: type 0
  1899. Nov 26 20:58:31 VirtualDebian sshd[1798]: debug3: send_rexec_state: done
  1900. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: inetd sockets after dupping: 3, 3
  1901. Nov 26 20:58:31 VirtualDebian sshd[2207]: Connection from 10.0.2.2 port 58703
  1902. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  1903. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  1904. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: Enabling compatibility mode for protocol 2.0
  1905. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  1906. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug2: fd 3 setting O_NONBLOCK
  1907. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug2: Network child is on pid 2208
  1908. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: preauth child monitor started
  1909. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1910. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 0
  1911. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_moduli: got parameters: 1024 1024 8192
  1912. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 1
  1913. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug2: monitor_read: 0 used once, disabling now
  1914. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1915. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 5
  1916. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_sign
  1917. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_sign: signature 0x7f46629cdca0(271)
  1918. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 6
  1919. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug2: monitor_read: 5 used once, disabling now
  1920. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1921. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 7
  1922. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_pwnamallow
  1923. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: Trying to reverse map address 10.0.2.2.
  1924. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug2: parse_server_config: config reprocess config len 638
  1925. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
  1926. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 8
  1927. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug2: monitor_read: 7 used once, disabling now
  1928. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1929. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 48
  1930. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: PAM: initializing for "testopie"
  1931. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  1932. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug1: PAM: setting PAM_TTY to "ssh"
  1933. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug2: monitor_read: 48 used once, disabling now
  1934. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1935. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 3
  1936. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  1937. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug2: monitor_read: 3 used once, disabling now
  1938. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1939. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 11
  1940. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_authpassword: sending result 0
  1941. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 12
  1942. Nov 26 20:58:31 VirtualDebian sshd[2207]: Failed none for testopie from 10.0.2.2 port 58703 ssh2
  1943. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1944. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 51
  1945. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_pam_init_ctx
  1946. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: PAM: sshpam_init_ctx entering
  1947. Nov 26 20:58:31 VirtualDebian sshd[2209]: debug3: PAM: sshpam_thread_conv entering, 1 messages
  1948. Nov 26 20:58:31 VirtualDebian sshd[2209]: debug3: ssh_msg_send: type 1
  1949. Nov 26 20:58:31 VirtualDebian sshd[2209]: debug3: ssh_msg_recv entering
  1950. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 52
  1951. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1952. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 53
  1953. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_answer_pam_query
  1954. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: PAM: sshpam_query entering
  1955. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: ssh_msg_recv entering
  1956. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 54
  1957. Nov 26 20:58:31 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1958. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 55
  1959. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_answer_pam_respond
  1960. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug2: PAM: sshpam_respond entering, 1 responses
  1961. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: ssh_msg_send: type 6
  1962. Nov 26 20:58:53 VirtualDebian sshd[2209]: debug1: do_pam_account: called
  1963. Nov 26 20:58:53 VirtualDebian sshd[2209]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
  1964. Nov 26 20:58:53 VirtualDebian sshd[2209]: debug3: ssh_msg_send: type 0
  1965. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 56
  1966. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1967. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 53
  1968. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_answer_pam_query
  1969. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: PAM: sshpam_query entering
  1970. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: ssh_msg_recv entering
  1971. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: PAM: import_environments entering
  1972. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: sshpam_password_change_required 0
  1973. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: PAM: num env strings 0
  1974. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug1: PAM: num PAM env strings 0
  1975. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 54
  1976. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1977. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 55
  1978. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_answer_pam_respond
  1979. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug2: PAM: sshpam_respond entering, 0 responses
  1980. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 56
  1981. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1982. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 57
  1983. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_answer_pam_free_ctx
  1984. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: PAM: sshpam_free_ctx entering
  1985. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: PAM: sshpam_thread_cleanup entering
  1986. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 58
  1987. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug2: monitor_read: 57 used once, disabling now
  1988. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive_expect entering: type 49
  1989. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1990. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug1: do_pam_account: called
  1991. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 50
  1992. Nov 26 20:58:53 VirtualDebian sshd[2207]: Accepted keyboard-interactive/pam for testopie from 10.0.2.2 port 58703 ssh2
  1993. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug1: monitor_child_preauth: testopie has been authenticated by privileged process
  1994. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_get_keystate: Waiting for new keys
  1995. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive_expect entering: type 25
  1996. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  1997. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_newkeys_from_blob: 0x7f46629ccc60(122)
  1998. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug2: mac_setup: found hmac-md5
  1999. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_get_keystate: Waiting for second key
  2000. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_newkeys_from_blob: 0x7f46629ccc60(122)
  2001. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug2: mac_setup: found hmac-md5
  2002. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_get_keystate: Getting compression state
  2003. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_get_keystate: Getting Network I/O buffers
  2004. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_share_sync: Share sync
  2005. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_share_sync: Share sync end
  2006. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug1: PAM: establishing credentials
  2007. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: PAM: opening session
  2008. Nov 26 20:58:53 VirtualDebian sshd[2207]: pam_unix(sshd:session): session opened for user testopie by (uid=0)
  2009. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: PAM: sshpam_store_conv called with 1 messages
  2010. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: SELinux support disabled
  2011. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: PAM: establishing credentials
  2012. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: permanently_set_uid: 1001/1001
  2013. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: set_newkeys: mode 0
  2014. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: set_newkeys: mode 1
  2015. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: Entering interactive session for SSH2.
  2016. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: fd 5 setting O_NONBLOCK
  2017. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: fd 6 setting O_NONBLOCK
  2018. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: server_init_dispatch_20
  2019. Nov 26 20:58:53 VirtualDebian sshd[2207]: User child is on pid 2210
  2020. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  2021. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
  2022. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: input_session_request
  2023. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: channel 0: new [server-session]
  2024. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: session_new: allocate (allocated 0 max 10)
  2025. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: session_unused: session id 0 unused
  2026. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_new: session 0
  2027. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_open: channel 0
  2028. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_open: session 0: link with channel 0
  2029. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: server_input_channel_open: confirm session
  2030. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: server_input_global_request: rtype no-more-sessions@openssh.com want_reply 0
  2031. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
  2032. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_by_channel: session 0 channel 0
  2033. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_input_channel_req: session 0 req pty-req
  2034. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: Allocating pty.
  2035. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: mm_request_send entering: type 26
  2036. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
  2037. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: mm_request_receive_expect entering: type 27
  2038. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: mm_request_receive entering
  2039. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 26
  2040. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_answer_pty entering
  2041. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug2: session_new: allocate (allocated 0 max 10)
  2042. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: session_unused: session id 0 unused
  2043. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug1: session_new: session 0
  2044. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug1: SELinux support disabled
  2045. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_send entering: type 27
  2046. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_answer_pty: tty /dev/pts/0 ptyfd 4
  2047. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_pty_req: session 0 alloc /dev/pts/0
  2048. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: tty_parse_modes: SSH2 n_bytes 256
  2049. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: tty_parse_modes: ospeed 38400
  2050. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: tty_parse_modes: ispeed 38400
  2051. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: server_input_channel_req: channel 0 request env reply 0
  2052. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_by_channel: session 0 channel 0
  2053. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_input_channel_req: session 0 req env
  2054. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: Setting env 0: LANG=it_IT.UTF-8
  2055. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: server_input_channel_req: channel 0 request shell reply 1
  2056. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_by_channel: session 0 channel 0
  2057. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug1: session_input_channel_req: session 0 req shell
  2058. Nov 26 20:58:53 VirtualDebian sshd[2211]: debug1: Setting controlling tty using TIOCSCTTY.
  2059. Nov 26 20:58:53 VirtualDebian sshd[2211]: debug3: channel 0: close_fds r -1 w -1 e -1 c -1
  2060. Nov 26 20:58:53 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  2061. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: fd 3 setting TCP_NODELAY
  2062. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: channel 0: rfd 9 isatty
  2063. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug2: fd 9 setting O_NONBLOCK
  2064. Nov 26 20:58:53 VirtualDebian sshd[2210]: debug3: fd 7 is O_NONBLOCK
  2065. Nov 26 21:17:01 VirtualDebian CRON[2234]: pam_unix(cron:session): session opened for user root by (uid=0)
  2066. Nov 26 21:17:01 VirtualDebian CRON[2234]: pam_unix(cron:session): session closed for user root
  2067. Nov 26 22:17:01 VirtualDebian CRON[2240]: pam_unix(cron:session): session opened for user root by (uid=0)
  2068. Nov 26 22:17:01 VirtualDebian CRON[2240]: pam_unix(cron:session): session closed for user root
  2069. Nov 26 23:17:01 VirtualDebian CRON[2253]: pam_unix(cron:session): session opened for user root by (uid=0)
  2070. Nov 26 23:17:01 VirtualDebian CRON[2253]: pam_unix(cron:session): session closed for user root
  2071. Nov 27 00:17:02 VirtualDebian CRON[2259]: pam_unix(cron:session): session opened for user root by (uid=0)
  2072. Nov 27 00:17:02 VirtualDebian CRON[2259]: pam_unix(cron:session): session closed for user root
  2073. Nov 27 00:26:33 VirtualDebian su[2264]: Successful su for root by testopie
  2074. Nov 27 00:26:33 VirtualDebian su[2264]: + pts/0 testopie:root
  2075. Nov 27 00:26:33 VirtualDebian su[2264]: pam_unix(su:session): session opened for user root by testopie(uid=1001)
  2076. Nov 27 00:28:13 VirtualDebian sshd[1798]: Received signal 15; terminating.
  2077. Nov 27 00:28:13 VirtualDebian sshd[2278]: debug2: fd 3 setting O_NONBLOCK
  2078. Nov 27 00:28:13 VirtualDebian sshd[2278]: debug1: Bind to port 22 on ::.
  2079. Nov 27 00:28:13 VirtualDebian sshd[2278]: Server listening on :: port 22.
  2080. Nov 27 00:28:13 VirtualDebian sshd[2278]: debug2: fd 4 setting O_NONBLOCK
  2081. Nov 27 00:28:13 VirtualDebian sshd[2278]: debug1: Bind to port 22 on 0.0.0.0.
  2082. Nov 27 00:28:13 VirtualDebian sshd[2278]: Server listening on 0.0.0.0 port 22.
  2083. Nov 27 00:28:15 VirtualDebian su[2264]: pam_unix(su:session): session closed for user root
  2084. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: read<=0 rfd 9 len -1
  2085. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: read failed
  2086. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: close_read
  2087. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: input open -> drain
  2088. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: ibuf empty
  2089. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: send eof
  2090. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: input drain -> closed
  2091. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: Received SIGCHLD.
  2092. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: session_by_pid: pid 2211
  2093. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: session_exit_message: session 0 channel 0 pid 2211
  2094. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: request exit-status confirm 0
  2095. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: session_exit_message: release channel 0
  2096. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: write failed
  2097. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: close_write
  2098. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: send eow
  2099. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: output open -> closed
  2100. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: mm_request_send entering: type 28
  2101. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 28
  2102. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug3: mm_answer_pty_cleanup entering
  2103. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug1: session_by_tty: session 0 tty /dev/pts/0
  2104. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug3: mm_session_close: session 0 pid 2210
  2105. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug3: mm_session_close: tty /dev/pts/0 ptyfd 4
  2106. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug1: session_pty_cleanup: session 0 release /dev/pts/0
  2107. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug3: session_unused: session id 0 unused
  2108. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug3: mm_request_receive entering
  2109. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: send close
  2110. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: channel 0: will not send data after close
  2111. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: notify_done: reading
  2112. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: channel 0: will not send data after close
  2113. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: rcvd close
  2114. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: channel 0: will not send data after close
  2115. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: is dead
  2116. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: gc: notify user
  2117. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: session_by_channel: session 0 channel 0
  2118. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: session_close_by_channel: channel 0 child 0
  2119. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: session_close: session 0 pid 0
  2120. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: session_unused: session id 0 unused
  2121. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: gc: user detached
  2122. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: is dead
  2123. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug2: channel 0: garbage collecting
  2124. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: channel 0: free: server-session, nchannels 1
  2125. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: channel 0: status: The following connections are open:\r\n #0 server-session (t4 r0 i3/0 o3/0 fd -1/-1 cfd -1)\r\n
  2126. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: channel 0: close_fds r -1 w -1 e -1 c -1
  2127. Nov 27 00:28:17 VirtualDebian sshd[2210]: Connection closed by 10.0.2.2
  2128. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug1: do_cleanup
  2129. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: PAM: sshpam_thread_cleanup entering
  2130. Nov 27 00:28:17 VirtualDebian sshd[2210]: Transferred: sent 20680, received 6896 bytes
  2131. Nov 27 00:28:17 VirtualDebian sshd[2210]: Closing connection to 10.0.2.2 port 58703
  2132. Nov 27 00:28:17 VirtualDebian sshd[2210]: debug3: mm_request_send entering: type 61
  2133. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug3: monitor_read: checking request 61
  2134. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug3: mm_answer_term: tearing down sessions
  2135. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug1: PAM: cleanup
  2136. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug1: PAM: deleting credentials
  2137. Nov 27 00:28:17 VirtualDebian sshd[2207]: debug1: PAM: closing session
  2138. Nov 27 00:28:17 VirtualDebian sshd[2207]: pam_unix(sshd:session): session closed for user testopie
  2139. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
  2140. Nov 27 00:28:20 VirtualDebian sshd[2278]: debug1: Forked child 2286.
  2141. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: inetd sockets after dupping: 3, 3
  2142. Nov 27 00:28:20 VirtualDebian sshd[2286]: Connection from 10.0.2.2 port 38600
  2143. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-8
  2144. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: match: OpenSSH_5.1p1 Debian-8 pat OpenSSH*
  2145. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: Enabling compatibility mode for protocol 2.0
  2146. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
  2147. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug2: fd 3 setting O_NONBLOCK
  2148. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug2: Network child is on pid 2287
  2149. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug2: monitor_read: 0 used once, disabling now
  2150. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug2: monitor_read: 5 used once, disabling now
  2151. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug2: parse_server_config: config reprocess config len 638
  2152. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug2: monitor_read: 7 used once, disabling now
  2153. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: PAM: initializing for "testopie"
  2154. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: PAM: setting PAM_RHOST to "10.0.2.2"
  2155. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug1: PAM: setting PAM_TTY to "ssh"
  2156. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug2: monitor_read: 48 used once, disabling now
  2157. Nov 27 00:28:20 VirtualDebian sshd[2286]: debug2: monitor_read: 3 used once, disabling now
  2158. Nov 27 00:28:20 VirtualDebian sshd[2286]: Failed none for testopie from 10.0.2.2 port 38600 ssh2
  2159. Nov 27 00:28:45 VirtualDebian login[2120]: pam_unix(login:session): session closed for user root
  2160. Nov 27 00:28:52 VirtualDebian login[2290]: pam_unix(login:session): session opened for user vsh0t by LOGIN(uid=0)
  2161. Nov 27 00:29:10 VirtualDebian su[2332]: pam_unix(su:auth): authentication failure; logname=vsh0t uid=1000 euid=0 tty=tty1 ruser=vsh0t rhost= user=root
  2162. Nov 27 00:29:12 VirtualDebian su[2332]: pam_authenticate: Authentication failure
  2163. Nov 27 00:29:12 VirtualDebian su[2332]: FAILED su for root by vsh0t
  2164. Nov 27 00:29:12 VirtualDebian su[2332]: - tty1 vsh0t:root
  2165. Nov 27 00:29:12 VirtualDebian login[2290]: pam_unix(login:session): session closed for user vsh0t
  2166. Nov 27 00:29:16 VirtualDebian login[2335]: pam_unix(login:auth): authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost= user=testopie
  2167. Nov 27 00:29:20 VirtualDebian login[2335]: FAILED LOGIN (1) on 'tty1' FOR `testopie', Authentication failure
  2168. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug2: PAM: sshpam_respond entering, 1 responses
  2169. Nov 27 00:29:45 VirtualDebian sshd[2288]: debug1: do_pam_account: called
  2170. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug1: PAM: num PAM env strings 0
  2171. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug2: PAM: sshpam_respond entering, 0 responses
  2172. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug2: monitor_read: 57 used once, disabling now
  2173. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug1: do_pam_account: called
  2174. Nov 27 00:29:45 VirtualDebian sshd[2286]: Accepted keyboard-interactive/pam for testopie from 10.0.2.2 port 38600 ssh2
  2175. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug1: monitor_child_preauth: testopie has been authenticated by privileged process
  2176. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug2: mac_setup: found hmac-md5
  2177. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug2: mac_setup: found hmac-md5
  2178. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug1: PAM: establishing credentials
  2179. Nov 27 00:29:45 VirtualDebian sshd[2286]: pam_unix(sshd:session): session opened for user testopie by (uid=0)
  2180. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: SELinux support disabled
  2181. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: PAM: establishing credentials
  2182. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: permanently_set_uid: 1001/1001
  2183. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: set_newkeys: mode 0
  2184. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: set_newkeys: mode 1
  2185. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: Entering interactive session for SSH2.
  2186. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: fd 4 setting O_NONBLOCK
  2187. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: fd 6 setting O_NONBLOCK
  2188. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: server_init_dispatch_20
  2189. Nov 27 00:29:45 VirtualDebian sshd[2286]: User child is on pid 2352
  2190. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
  2191. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: input_session_request
  2192. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: channel 0: new [server-session]
  2193. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: session_new: allocate (allocated 0 max 10)
  2194. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_new: session 0
  2195. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_open: channel 0
  2196. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_open: session 0: link with channel 0
  2197. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: server_input_channel_open: confirm session
  2198. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: server_input_global_request: rtype no-more-sessions@openssh.com want_reply 0
  2199. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
  2200. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_by_channel: session 0 channel 0
  2201. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_input_channel_req: session 0 req pty-req
  2202. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: Allocating pty.
  2203. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug2: session_new: allocate (allocated 0 max 10)
  2204. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug1: session_new: session 0
  2205. Nov 27 00:29:45 VirtualDebian sshd[2286]: debug1: SELinux support disabled
  2206. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_pty_req: session 0 alloc /dev/pts/0
  2207. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: server_input_channel_req: channel 0 request env reply 0
  2208. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_by_channel: session 0 channel 0
  2209. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_input_channel_req: session 0 req env
  2210. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: Setting env 0: LANG=it_IT.UTF-8
  2211. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: server_input_channel_req: channel 0 request shell reply 1
  2212. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_by_channel: session 0 channel 0
  2213. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug1: session_input_channel_req: session 0 req shell
  2214. Nov 27 00:29:45 VirtualDebian sshd[2353]: debug1: Setting controlling tty using TIOCSCTTY.
  2215. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: fd 3 setting TCP_NODELAY
  2216. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: channel 0: rfd 9 isatty
  2217. Nov 27 00:29:45 VirtualDebian sshd[2352]: debug2: fd 9 setting O_NONBLOCK
  2218. Nov 27 00:29:49 VirtualDebian login[2343]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
  2219. Nov 27 00:29:49 VirtualDebian login[2366]: ROOT LOGIN on 'tty1'
  2220. Nov 27 00:30:51 VirtualDebian login[2343]: pam_unix(login:session): session closed for user root
  2221. Nov 27 00:31:01 VirtualDebian su[2386]: Successful su for root by testopie
  2222. Nov 27 00:31:01 VirtualDebian su[2386]: + pts/0 testopie:root
  2223. Nov 27 00:31:01 VirtualDebian su[2386]: pam_unix(su:session): session opened for user root by testopie(uid=1001)
  2224. Nov 27 00:31:04 VirtualDebian su[2386]: pam_unix(su:session): session closed for user root
  2225. Nov 27 00:35:25 VirtualDebian sshd[1751]: debug2: fd 3 setting O_NONBLOCK
  2226. Nov 27 00:35:25 VirtualDebian sshd[1751]: debug1: Bind to port 22 on ::.
  2227. Nov 27 00:35:25 VirtualDebian sshd[1751]: Server listening on :: port 22.
  2228. Nov 27 00:35:25 VirtualDebian sshd[1751]: debug2: fd 4 setting O_NONBLOCK
  2229. Nov 27 00:35:25 VirtualDebian sshd[1751]: debug1: Bind to port 22 on 0.0.0.0.
  2230. Nov 27 00:35:25 VirtualDebian sshd[1751]: Server listening on 0.0.0.0 port 22.
  2231. Nov 27 00:35:28 VirtualDebian sshd[1751]: Received signal 15; terminating.
  2232. Nov 27 00:35:28 VirtualDebian sshd[2130]: debug2: fd 3 setting O_NONBLOCK
  2233. Nov 27 00:35:28 VirtualDebian sshd[2130]: debug1: Bind to port 22 on ::.
  2234. Nov 27 00:35:28 VirtualDebian sshd[2130]: Server listening on :: port 22.
  2235. Nov 27 00:35:28 VirtualDebian sshd[2130]: debug2: fd 4 setting O_NONBLOCK
  2236. Nov 27 00:35:28 VirtualDebian sshd[2130]: debug1: Bind to port 22 on 0.0.0.0.
  2237. Nov 27 00:35:28 VirtualDebian sshd[2130]: Server listening on 0.0.0.0 port 22.
  2238. Nov 27 00:36:03 VirtualDebian login[2073]: pam_unix(login:session): session opened for user root by (uid=0)
  2239. Nov 27 00:36:03 VirtualDebian login[2131]: ROOT LOGIN on 'tty1'
  2240. Nov 27 00:42:31 VirtualDebian su[2159]: Successful su for testopie by root
  2241. Nov 27 00:42:31 VirtualDebian su[2159]: + tty1 root:testopie
  2242. Nov 27 00:42:31 VirtualDebian su[2159]: pam_unix(su:session): session opened for user testopie by root(uid=0)
  2243. Nov 27 00:42:39 VirtualDebian su[2159]: pam_unix(su:session): session closed for user testopie
  2244. Nov 27 00:55:10 VirtualDebian sshd[1752]: debug2: fd 3 setting O_NONBLOCK
  2245. Nov 27 00:55:10 VirtualDebian sshd[1752]: debug1: Bind to port 22 on ::.
  2246. Nov 27 00:55:10 VirtualDebian sshd[1752]: Server listening on :: port 22.
  2247. Nov 27 00:55:10 VirtualDebian sshd[1752]: debug2: fd 4 setting O_NONBLOCK
  2248. Nov 27 00:55:10 VirtualDebian sshd[1752]: debug1: Bind to port 22 on 0.0.0.0.
  2249. Nov 27 00:55:10 VirtualDebian sshd[1752]: Server listening on 0.0.0.0 port 22.
  2250. Nov 27 00:55:13 VirtualDebian sshd[1752]: Received signal 15; terminating.
  2251. Nov 27 00:55:13 VirtualDebian sshd[2131]: debug2: fd 3 setting O_NONBLOCK
  2252. Nov 27 00:55:13 VirtualDebian sshd[2131]: debug1: Bind to port 22 on ::.
  2253. Nov 27 00:55:13 VirtualDebian sshd[2131]: Server listening on :: port 22.
  2254. Nov 27 00:55:13 VirtualDebian sshd[2131]: debug2: fd 4 setting O_NONBLOCK
  2255. Nov 27 00:55:13 VirtualDebian sshd[2131]: debug1: Bind to port 22 on 0.0.0.0.
  2256. Nov 27 00:55:13 VirtualDebian sshd[2131]: Server listening on 0.0.0.0 port 22.
  2257. Nov 27 01:06:15 VirtualDebian login[2074]: pam_unix(login:session): session opened for user root by (uid=0)
  2258. Nov 27 01:06:15 VirtualDebian login[2134]: ROOT LOGIN on 'tty1'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement