Advertisement
Guest User

Untitled

a guest
May 26th, 2022
49
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.30 KB | None | 0 0
  1. May 20 09:00:12 sftpuser sshd[22358]: debug1: SELinux support disabled
  2. May 20 09:00:12 sftpuser sshd[22358]: Changed root directory to "/var/sftp/whatever"
  3. May 20 09:00:12 sftpuser sshd[22358]: debug1: PAM: establishing credentials
  4. May 20 09:00:12 sftpuser sshd[22358]: debug1: permanently_set_uid: 1468/1007
  5. May 20 09:00:12 sftpuser sshd[22358]: debug3: safely_chroot: checking '/'
  6. May 20 09:00:12 sftpuser sshd[22358]: debug3: monitor_apply_keystate: packet_set_state
  7. May 20 09:00:12 sftpuser sshd[22358]: debug3: safely_chroot: checking '/var/'
  8. May 20 09:00:12 sftpuser sshd[22358]: debug2: set_newkeys: mode 0
  9. May 20 09:00:12 sftpuser sshd[22358]: debug3: safely_chroot: checking '/var/sftp/'
  10. May 20 09:00:12 sftpuser sshd[22358]: debug1: rekey after 4294967296 blocks
  11. May 20 09:00:12 sftpuser sshd[22358]: debug2: set_newkeys: mode 1
  12. May 20 09:00:12 sftpuser sshd[22358]: debug1: rekey after 4294967296 blocks
  13. May 20 09:00:12 sftpuser sshd[22358]: debug1: ssh_packet_set_postauth: called
  14. May 20 09:00:12 sftpuser sshd[22358]: debug3: ssh_packet_set_state: done
  15. May 20 09:00:12 sftpuser sshd[22358]: debug3: notify_hostkeys: key 0: ssh-rsa SHA256:Vhsf1V72TE9e+B3yikTn6hGEaIJlw0HAWhJuqgeeyWE
  16. May 20 09:00:12 sftpuser sshd[22358]: debug3: notify_hostkeys: key 1: ssh-dss SHA256:EXA07ul2jcJrOpjSuaiJjiK3I8eXQW4UtfsGB/HdsEc
  17. May 20 09:00:12 sftpuser sshd[22358]: debug3: notify_hostkeys: key 2: ecdsa-sha2-nistp256 SHA256:KklUDOuAW5IA7MDDCxpXeFj9clbetoaFTyVokobHAQA
  18. May 20 09:00:12 sftpuser sshd[22358]: debug3: notify_hostkeys: sent 3 hostkeys
  19. May 20 09:00:12 sftpuser sshd[22358]: debug3: send packet: type 80
  20. May 20 09:00:12 sftpuser sshd[22358]: debug1: Entering interactive session for SSH2.
  21. May 20 09:00:12 sftpuser sshd[22358]: debug2: fd 4 setting O_NONBLOCK
  22. May 20 09:00:12 sftpuser sshd[22358]: debug2: fd 6 setting O_NONBLOCK
  23. May 20 09:00:12 sftpuser sshd[22358]: debug1: server_init_dispatch
  24. May 20 09:00:12 sftpuser sshd[22358]: debug3: receive packet: type 90
  25. May 20 09:00:12 sftpuser sshd[22358]: debug1: server_input_channel_open: ctype session rchan 256 win 2147483647 max 16384
  26. May 20 09:00:12 sftpuser sshd[22358]: debug1: input_session_request
  27. May 20 09:00:12 sftpuser sshd[22358]: debug1: channel 0: new [server-session]
  28. May 20 09:00:12 sftpuser sshd[22358]: debug2: session_new: allocate (allocated 0 max 10)
  29. May 20 09:00:12 sftpuser sshd[22358]: debug3: session_unused: session id 0 unused
  30. May 20 09:00:12 sftpuser sshd[22358]: debug1: session_new: session 0
  31. May 20 09:00:12 sftpuser sshd[22358]: debug1: session_open: channel 0
  32. May 20 09:00:12 sftpuser sshd[22358]: debug1: session_open: session 0: link with channel 0
  33. May 20 09:00:12 sftpuser sshd[22358]: debug1: server_input_channel_open: confirm session
  34. May 20 09:00:12 sftpuser sshd[22358]: debug3: send packet: type 91
  35. May 20 09:00:12 sftpuser sshd[22358]: debug3: safely_chroot: checking '/var/sftp/whatever'
  36. May 20 09:00:12 sftpuser sshd[22358]: debug3: receive packet: type 82
  37. May 20 09:00:12 sftpuser sshd[22358]: debug1: Got 82/8 for keepalive
  38. May 20 09:00:12 sftpuser sshd[22358]: debug3: receive packet: type 98
  39. May 20 09:00:12 sftpuser sshd[22358]: debug1: server_input_channel_req: channel 0 request subsystem reply 1
  40. May 20 09:00:12 sftpuser sshd[22358]: debug1: session_by_channel: session 0 channel 0
  41. May 20 09:00:12 sftpuser sshd[22358]: debug1: session_input_channel_req: session 0 req subsystem
  42. May 20 09:00:12 sftpuser sshd[22358]: debug2: subsystem request for sftp by user whatever-sftp
  43. May 20 09:00:12 sftpuser sshd[22358]: debug1: subsystem: internal-sftp
  44. May 20 09:00:12 sftpuser sshd[22358]: Starting session: forced-command (config) 'internal-sftp -f LOCAL7 -l INFO' for whatever-sftp from 192.168.100.1 port 50074 id 0
  45. May 20 09:00:12 sftpuser sshd[22358]: debug3: mm_audit_run_command entering command internal-sftp -f LOCAL7 -l INFO
  46. May 20 09:00:12 sftpuser sshd[22358]: debug3: mm_request_send entering: type 113
  47. May 20 09:00:12 sftpuser sshd[22358]: debug2: fd 3 setting TCP_NODELAY
  48. May 20 09:00:12 sftpuser sshd[22358]: debug3: ssh_packet_set_tos: set IP_TOS 0x08
  49. May 20 09:00:12 sftpuser sshd[22358]: debug2: fd 10 setting O_NONBLOCK
  50. May 20 09:00:12 sftpuser sshd[22358]: debug2: fd 9 setting O_NONBLOCK
  51. May 20 09:00:12 sftpuser sshd[22358]: debug2: fd 12 setting O_NONBLOCK
  52. May 20 09:00:12 sftpuser sshd[22358]: debug3: send packet: type 99
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement