Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 315686 Details for
Bug 461002
sshd name resolution
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
sshd debug level 3 log
sshd_log (text/plain), 8.69 KB, created by
Mohammed Safwat
on 2008-09-03 20:41:02 UTC
(
hide
)
Description:
sshd debug level 3 log
Filename:
MIME Type:
Creator:
Mohammed Safwat
Created:
2008-09-03 20:41:02 UTC
Size:
8.69 KB
patch
obsolete
>[<user1>@localhost ~]$ sudo /usr/sbin/sshd -d -d -d >debug2: load_server_config: filename /etc/ssh/sshd_config >debug2: load_server_config: done config len = 609 >debug2: parse_server_config: config /etc/ssh/sshd_config len 609 >debug3: /etc/ssh/sshd_config:14 setting Port 911 >debug3: /etc/ssh/sshd_config:22 setting Protocol 2 >debug3: /etc/ssh/sshd_config:37 setting SyslogFacility AUTHPRIV >debug3: /etc/ssh/sshd_config:64 setting PasswordAuthentication yes >debug3: /etc/ssh/sshd_config:68 setting ChallengeResponseAuthentication no >debug3: /etc/ssh/sshd_config:78 setting GSSAPIAuthentication yes >debug3: /etc/ssh/sshd_config:80 setting GSSAPICleanupCredentials yes >debug3: /etc/ssh/sshd_config:92 setting UsePAM yes >debug3: /etc/ssh/sshd_config:95 setting AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES >debug3: /etc/ssh/sshd_config:96 setting AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT >debug3: /etc/ssh/sshd_config:97 setting AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE >debug3: /etc/ssh/sshd_config:101 setting X11Forwarding yes >debug3: /etc/ssh/sshd_config:124 setting Subsystem sftp /usr/libexec/openssh/sftp-server >debug3: /etc/ssh/sshd_config:132 setting AllowUsers root@localhost.localdomain <user1>@<host1> nx >debug1: sshd version OpenSSH_5.0p1 >debug3: Not a RSA1 key file /etc/ssh/ssh_host_rsa_key. >debug1: read PEM private key done: type RSA >debug1: private host key: #0 type 1 RSA >debug3: Not a RSA1 key file /etc/ssh/ssh_host_dsa_key. >debug1: read PEM private key done: type DSA >debug1: private host key: #1 type 2 DSA >debug1: rexec_argv[0]='/usr/sbin/sshd' >debug1: rexec_argv[1]='-d' >debug1: rexec_argv[2]='-d' >debug1: rexec_argv[3]='-d' >debug2: fd 3 setting O_NONBLOCK >debug1: Bind to port 911 on 0.0.0.0. >Server listening on 0.0.0.0 port 911. >debug2: fd 4 setting O_NONBLOCK >debug1: Bind to port 911 on ::. >Server listening on :: port 911. >debug3: fd 5 is not O_NONBLOCK >debug1: Server will not fork when running in debugging mode. >debug3: send_rexec_state: entering fd = 8 config len 609 >debug3: ssh_msg_send: type 0 >debug3: send_rexec_state: done >debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 >debug1: inetd sockets after dupping: 3, 3 >Connection from 192.168.1.201 port 1052 >debug1: Client protocol version 2.0; client software version OpenSSH_4.3 >debug1: match: OpenSSH_4.3 pat OpenSSH* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_5.0 >debug2: fd 3 setting O_NONBLOCK >debug3: privsep user:group 74:74 >debug1: permanently_set_uid: 74/74 >debug1: list_hostkey_types: ssh-rsa,ssh-dss >debug1: SSH2_MSG_KEXINIT sent >debug1: SSH2_MSG_KEXINIT received >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: none,zlib@openssh.com >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 >debug2: kex_parse_kexinit: ssh-rsa,ssh-dss >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96 >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: >debug2: kex_parse_kexinit: first_kex_follows 0 >debug2: kex_parse_kexinit: reserved 0 >debug2: mac_setup: found hmac-md5 >debug1: kex: client->server aes128-cbc hmac-md5 none >debug2: mac_setup: found hmac-md5 >debug1: kex: server->client aes128-cbc hmac-md5 none >debug2: Network child is on pid 2933 >debug3: preauth child monitor started >debug3: mm_request_receive entering >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received >debug3: mm_request_send entering: type 0 >debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI >debug3: mm_request_receive_expect entering: type 1 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 0 >debug3: mm_answer_moduli: got parameters: 1024 1024 8192 >debug3: mm_request_send entering: type 1 >debug3: mm_choose_dh: remaining 0 >debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent >debug2: dh_gen_key: priv key bits set: 130/256 >debug2: bits set: 516/1024 >debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT >debug2: monitor_read: 0 used once, disabling now >debug3: mm_request_receive entering >debug2: bits set: 506/1024 >debug3: mm_key_sign entering >debug3: mm_request_send entering: type 5 >debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN >debug3: mm_request_receive_expect entering: type 6 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 5 >debug3: mm_answer_sign >debug3: mm_answer_sign: signature 0x7fbb342fa9a0(271) >debug3: mm_request_send entering: type 6 >debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent >debug2: kex_derive_keys >debug2: set_newkeys: mode 1 >debug1: SSH2_MSG_NEWKEYS sent >debug1: expecting SSH2_MSG_NEWKEYS >debug2: monitor_read: 5 used once, disabling now >debug3: mm_request_receive entering >debug2: set_newkeys: mode 0 >debug1: SSH2_MSG_NEWKEYS received >debug1: KEX done >debug1: userauth-request for user <user1> service ssh-connection method none >debug1: attempt 0 failures 0 >debug3: mm_getpwnamallow entering >debug3: mm_request_send entering: type 7 >debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM >debug3: mm_request_receive_expect entering: type 8 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 7 >debug3: mm_answer_pwnamallow >debug3: Trying to reverse map address 192.168.1.201. >debug2: parse_server_config: config reprocess config len 609 >User <user1> from 192.168.1.201 not allowed because not listed in AllowUsers >debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 0 >debug3: mm_request_send entering: type 8 >input_userauth_request: invalid user <user1> >debug3: mm_start_pam entering >debug3: mm_request_send entering: type 46 >debug3: mm_inform_authserv entering >debug3: mm_request_send entering: type 3 >debug3: mm_inform_authrole entering >debug3: mm_request_send entering: type 4 >debug2: input_userauth_request: try method none >debug2: monitor_read: 7 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 46 >debug1: PAM: initializing for "<user1>" >debug1: PAM: setting PAM_RHOST to "192.168.1.201" >debug1: PAM: setting PAM_TTY to "ssh" >debug2: monitor_read: 46 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 3 >debug3: mm_answer_authserv: service=ssh-connection, style= >debug2: monitor_read: 3 used once, disabling now >debug3: mm_request_receive entering >debug3: monitor_read: checking request 4 >debug3: mm_answer_authrole: role= >debug2: monitor_read: 4 used once, disabling now >debug3: mm_request_receive entering >debug1: userauth-request for user <user1> service ssh-connection method password >debug1: attempt 1 failures 1 >debug2: input_userauth_request: try method password >debug3: mm_auth_password entering >debug3: mm_request_send entering: type 11 >debug3: mm_auth_password: waiting for MONITOR_ANS_AUTHPASSWORD >debug3: mm_request_receive_expect entering: type 12 >debug3: mm_request_receive entering >debug3: monitor_read: checking request 11 >debug3: PAM: sshpam_passwd_conv called with 1 messages >debug1: PAM: password authentication failed for an illegal user: Authentication failure >debug3: mm_answer_authpassword: sending result 0 >debug3: mm_request_send entering: type 12 >Failed password for invalid user <user1> from 192.168.1.201 port 1052 ssh2 >debug3: mm_request_receive entering >debug3: mm_auth_password: user not authenticated
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 461002
: 315686 |
315688