Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 306395 Details for
Bug 447943
Detection of SELinux enforcing mode is broken in sshd
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
output of sshd -Dde
sshd.log (text/plain), 3.44 KB, created by
Bryan O'Sullivan
on 2008-05-22 16:16:44 UTC
(
hide
)
Description:
output of sshd -Dde
Filename:
MIME Type:
Creator:
Bryan O'Sullivan
Created:
2008-05-22 16:16:44 UTC
Size:
3.44 KB
patch
obsolete
># /usr/sbin/sshd -Dde >debug1: sshd version OpenSSH_5.0p1 >debug1: read PEM private key done: type RSA >debug1: private host key: #0 type 1 RSA >debug1: read PEM private key done: type DSA >debug1: private host key: #1 type 2 DSA >debug1: rexec_argv[0]='/usr/sbin/sshd' >debug1: rexec_argv[1]='-Dde' >debug1: Bind to port 22 on ::. >Server listening on :: port 22. >debug1: Bind to port 22 on 0.0.0.0. >Server listening on 0.0.0.0 port 22. >debug1: Server will not fork when running in debugging mode. >debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 >debug1: sshd version OpenSSH_5.0p1 >debug1: read PEM private key done: type RSA >debug1: private host key: #0 type 1 RSA >debug1: read PEM private key done: type DSA >debug1: private host key: #1 type 2 DSA >debug1: inetd sockets after dupping: 3, 3 >Connection from 64.154.223.249 port 35458 >debug1: Client protocol version 2.0; client software version OpenSSH_5.0 >debug1: match: OpenSSH_5.0 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_5.0 >debug1: permanently_set_uid: 74/74 >debug1: list_hostkey_types: ssh-rsa,ssh-dss >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug1: kex: client->server aes128-cbc hmac-md5 none >debug1: kex: server->client aes128-cbc hmac-md5 none >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received >debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent >debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT >debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug1: SSH2_MSG_NEWKEYS received >debug1: KEX done >debug1: userauth-request for user bos service ssh-connection method none >debug1: attempt 0 failures 0 >debug1: PAM: initializing for "bos" >debug1: PAM: setting PAM_RHOST to "nat.945battery.lindenlab.com" >debug1: PAM: setting PAM_TTY to "ssh" >debug1: userauth-request for user bos service ssh-connection method publickey >debug1: attempt 1 failures 1 >debug1: test whether pkalg/pkblob are acceptable >debug1: temporarily_use_uid: 1000/1000 (e=0/0) >debug1: trying public key file /home/bos/.ssh/authorized_keys >debug1: matching key found: file /home/bos/.ssh/authorized_keys, line 1 >Found matching RSA key: fe:70:98:24:51:de:8d:7c:70:71:9d:9f:c7:a1:19:e8 >debug1: restore_uid: 0/0 >Postponed publickey for bos from 64.154.223.249 port 35458 ssh2 >debug1: userauth-request for user bos service ssh-connection method publickey >debug1: attempt 2 failures 1 >debug1: temporarily_use_uid: 1000/1000 (e=0/0) >debug1: trying public key file /home/bos/.ssh/authorized_keys >debug1: matching key found: file /home/bos/.ssh/authorized_keys, line 1 >Found matching RSA key: fe:70:98:24:51:de:8d:7c:70:71:9d:9f:c7:a1:19:e8 >debug1: restore_uid: 0/0 >debug1: ssh_rsa_verify: signature correct >debug1: do_pam_account: called >Accepted publickey for bos from 64.154.223.249 port 35458 ssh2 >debug1: monitor_child_preauth: bos has been authenticated by privileged process >debug1: temporarily_use_uid: 1000/1000 (e=0/0) >debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism >debug1: restore_uid: 0/0 >debug1: SELinux support enabled >ssh_selinux_getctxbyname: Failed to get default SELinux security context for bos >ssh_selinux_setup_exec_context: SELinux failure. Continuing in permissive mode. >debug1: PAM: establishing credentials >debug1: PAM: establishing credentials >debug1: permanently_set_uid: 1000/1000 >setresuid 1000: Resource temporarily unavailable >debug1: do_cleanup >debug1: do_cleanup >debug1: PAM: cleanup >debug1: PAM: deleting credentials >debug1: PAM: closing session
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 447943
: 306395