Advertisement
Guest User

Untitled

a guest
Apr 12th, 2018
329
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.76 KB | None | 0 0
  1. debug2: languages ctos: [preauth]
  2. debug2: languages stoc: [preauth]
  3. debug2: first_kex_follows 0 [preauth]
  4. debug2: reserved 0 [preauth]
  5. debug2: peer client KEXINIT proposal [preauth]
  6. debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,
  7. cdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-
  8. roup-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group
  9. 8-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha2
  10. 6,diffie-hellman-group14-sha1,ext-info-c [preauth]
  11. debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,e
  12. dsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@ope
  13. ssh.com,ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,e
  14. dsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,r
  15. a-sha2-512,rsa-sha2-256,ssh-rsa [preauth]
  16. debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-c
  17. r,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,a
  18. s192-cbc,aes256-cbc [preauth]
  19. debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-c
  20. r,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,a
  21. s192-cbc,aes256-cbc [preauth]
  22. debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hma
  23. -sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@o
  24. enssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-s
  25. a2-512,hmac-sha1 [preauth]
  26. debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hma
  27. -sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@o
  28. enssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-s
  29. a2-512,hmac-sha1 [preauth]
  30. debug2: compression ctos: none,zlib@openssh.com,zlib [preauth]
  31. debug2: compression stoc: none,zlib@openssh.com,zlib [preauth]
  32. debug2: languages ctos: [preauth]
  33. debug2: languages stoc: [preauth]
  34. debug2: first_kex_follows 0 [preauth]
  35. debug2: reserved 0 [preauth]
  36. debug1: kex: algorithm: curve25519-sha256@libssh.org [preauth]
  37. debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
  38. debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC:
  39. implicit> compression: none [preauth]
  40. debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC:
  41. implicit> compression: none [preauth]
  42. debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
  43. debug3: receive packet: type 30 [preauth]
  44. debug3: mm_key_sign entering [preauth]
  45. debug3: mm_request_send entering: type 6 [preauth]
  46. debug3: mm_request_receive entering
  47. debug3: monitor_read: checking request 6
  48. debug3: mm_answer_sign
  49. debug3: mm_answer_sign: hostkey proof signature 0x560401a35bd0(99)
  50. debug3: mm_request_send entering: type 7
  51. debug2: monitor_read: 6 used once, disabling now
  52. debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth]
  53. debug3: mm_request_receive_expect entering: type 7 [preauth]
  54. debug3: mm_request_receive entering [preauth]
  55. debug3: send packet: type 31 [preauth]
  56. debug3: send packet: type 21 [preauth]
  57. debug2: set_newkeys: mode 1 [preauth]
  58. debug1: rekey after 134217728 blocks [preauth]
  59. debug1: SSH2_MSG_NEWKEYS sent [preauth]
  60. debug1: expecting SSH2_MSG_NEWKEYS [preauth]
  61. debug3: send packet: type 7 [preauth]
  62. debug3: receive packet: type 21 [preauth]
  63. debug2: set_newkeys: mode 0 [preauth]
  64. debug1: rekey after 134217728 blocks [preauth]
  65. debug1: SSH2_MSG_NEWKEYS received [preauth]
  66. debug1: KEX done [preauth]
  67. debug3: receive packet: type 5 [preauth]
  68. debug3: send packet: type 6 [preauth]
  69. debug3: receive packet: type 50 [preauth]
  70. debug1: userauth-request for user root service ssh-connection method no
  71. e [preauth]
  72. debug1: attempt 0 failures 0 [preauth]
  73. debug3: mm_getpwnamallow entering [preauth]
  74. debug3: mm_request_send entering: type 8 [preauth]
  75. debug3: mm_request_receive entering
  76. debug3: monitor_read: checking request 8
  77. debug3: mm_answer_pwnamallow
  78. debug2: parse_server_config: config reprocess config len 749
  79. debug3: auth_shadow_acctexpired: today 17633 sp_expire -1 days left -17
  80. 34
  81. debug3: account expiration disabled
  82. User root not allowed because account is locked
  83. debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0
  84. debug3: mm_request_send entering: type 9
  85. debug2: monitor_read: 8 used once, disabling now
  86. debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
  87. debug3: mm_request_receive_expect entering: type 9 [preauth]
  88. debug3: mm_request_receive entering [preauth]
  89. input_userauth_request: invalid user root [preauth]
  90. debug3: mm_audit_event entering [preauth]
  91. debug3: mm_request_send entering: type 112 [preauth]
  92. debug3: mm_request_receive entering
  93. debug3: monitor_read: checking request 112
  94. debug3: mm_answer_audit_event entering
  95. debug3: mm_inform_authserv entering [preauth]
  96. debug3: mm_request_send entering: type 4 [preauth]
  97. debug3: mm_request_receive entering
  98. debug3: monitor_read: checking request 4
  99. debug3: mm_answer_authserv: service=ssh-connection, style=, role=
  100. debug2: monitor_read: 4 used once, disabling now
  101. debug2: input_userauth_request: try method none [preauth]
  102. debug3: userauth_finish: failure partial=0 next methods="publickey" [pr
  103. auth]
  104. debug3: send packet: type 51 [preauth]
  105. debug3: receive packet: type 50 [preauth]
  106. debug1: userauth-request for user root service ssh-connection method pu
  107. lickey [preauth]
  108. debug1: attempt 1 failures 0 [preauth]
  109. debug2: input_userauth_request: try method publickey [preauth]
  110. debug2: userauth_pubkey: disabled because of invalid user [preauth]
  111. debug3: userauth_finish: failure partial=0 next methods="publickey" [pr
  112. auth]
  113. debug3: send packet: type 51 [preauth]
  114. Connection closed by 93.93.131.51 port 33068 [preauth]
  115. debug1: do_cleanup [preauth]
  116. debug1: monitor_read_log: child log fd closed
  117. debug3: mm_request_receive entering
  118. debug1: do_cleanup
  119. debug1: Killing privsep child 2315
  120. debug1: audit_event: unhandled event 12
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement