1 | Nov 16 16:44:26 localhost sshd[24793]: debug1: Forked child 25095.
|
---|
2 | Nov 16 16:44:26 localhost sshd[25095]: debug1: Set /proc/self/oom_score_adj to 0
|
---|
3 | Nov 16 16:44:26 localhost sshd[25095]: debug1: rexec start in 7 out 7 newsock 7 pipe 9 sock 10
|
---|
4 | Nov 16 16:44:26 localhost sshd[25095]: debug1: inetd sockets after dupping: 5, 5
|
---|
5 | Nov 16 16:44:26 localhost sshd[25095]: Connection from ::1%enp3s0 port 46648 on ::1%enp3s0 port 22 rdomain "enp3s0"
|
---|
6 | Nov 16 16:44:26 localhost sshd[25095]: debug1: Local version string SSH-2.0-OpenSSH_8.4
|
---|
7 | Nov 16 16:44:26 localhost sshd[25095]: debug1: Remote protocol version 2.0, remote software version OpenSSH_8.4
|
---|
8 | Nov 16 16:44:26 localhost sshd[25095]: debug1: match: OpenSSH_8.4 pat OpenSSH* compat 0x04000000
|
---|
9 | Nov 16 16:44:26 localhost sshd[25095]: debug1: SELinux support enabled [preauth]
|
---|
10 | Nov 16 16:44:26 localhost sshd[25095]: debug1: ssh_selinux_change_context: setting context from 'system_u:system_r:sshd_t:s0-s0:c0.c1023' to 'system_u:system_r:sshd_net_t:s0-s0:c0.c1023' [preauth]
|
---|
11 | Nov 16 16:44:26 localhost sshd[25095]: debug1: permanently_set_uid: 74/74 [preauth]
|
---|
12 | Nov 16 16:44:26 localhost sshd[25095]: debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
|
---|
13 | Nov 16 16:44:26 localhost sshd[25095]: debug1: SSH2_MSG_KEXINIT sent [preauth]
|
---|
14 | Nov 16 16:44:26 localhost sshd[25095]: debug1: SSH2_MSG_KEXINIT received [preauth]
|
---|
15 | Nov 16 16:44:26 localhost sshd[25095]: debug1: kex: algorithm: curve25519-sha256 [preauth]
|
---|
16 | Nov 16 16:44:26 localhost sshd[25095]: debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
|
---|
17 | Nov 16 16:44:26 localhost sshd[25095]: debug1: kex: client->server cipher: aes256-gcm@openssh.com MAC: <implicit> compression: none [preauth]
|
---|
18 | Nov 16 16:44:26 localhost sshd[25095]: debug1: kex: server->client cipher: aes256-gcm@openssh.com MAC: <implicit> compression: none [preauth]
|
---|
19 | Nov 16 16:44:26 localhost sshd[25095]: debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth]
|
---|
20 | Nov 16 16:44:26 localhost sshd[25095]: debug1: kex: curve25519-sha256 need=32 dh_need=32 [preauth]
|
---|
21 | Nov 16 16:44:26 localhost sshd[25095]: debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
|
---|
22 | Nov 16 16:44:26 localhost sshd[25095]: debug1: rekey out after 4294967296 blocks [preauth]
|
---|
23 | Nov 16 16:44:26 localhost sshd[25095]: debug1: SSH2_MSG_NEWKEYS sent [preauth]
|
---|
24 | Nov 16 16:44:26 localhost sshd[25095]: debug1: Sending SSH2_MSG_EXT_INFO [preauth]
|
---|
25 | Nov 16 16:44:26 localhost sshd[25095]: debug1: expecting SSH2_MSG_NEWKEYS [preauth]
|
---|
26 | Nov 16 16:44:26 localhost sshd[25095]: debug1: SSH2_MSG_NEWKEYS received [preauth]
|
---|
27 | Nov 16 16:44:26 localhost sshd[25095]: debug1: rekey in after 4294967296 blocks [preauth]
|
---|
28 | Nov 16 16:44:26 localhost sshd[25095]: debug1: KEX done [preauth]
|
---|
29 | Nov 16 16:44:26 localhost sshd[25095]: debug1: userauth-request for user vitaly service ssh-connection method none [preauth]
|
---|
30 | Nov 16 16:44:26 localhost sshd[25095]: debug1: attempt 0 failures 0 [preauth]
|
---|
31 | Nov 16 16:44:26 localhost sshd[25095]: debug1: PAM: initializing for "vitaly"
|
---|
32 | Nov 16 16:44:26 localhost sshd[25095]: debug1: PAM: setting PAM_RHOST to "::1%enp3s0"
|
---|
33 | Nov 16 16:44:26 localhost sshd[25095]: debug1: PAM: setting PAM_TTY to "ssh"
|
---|
34 | Nov 16 16:44:26 localhost sshd[25095]: debug1: userauth-request for user vitaly service ssh-connection method publickey [preauth]
|
---|
35 | Nov 16 16:44:26 localhost sshd[25095]: debug1: attempt 1 failures 0 [preauth]
|
---|
36 | Nov 16 16:44:26 localhost sshd[25095]: debug1: userauth_pubkey: test pkalg rsa-sha2-256 pkblob RSA SHA256:NVFD3EnLU3E9Wk8IK/+4Lm6H/pER5hQ1WvhG+91a/uU [preauth]
|
---|
37 | Nov 16 16:44:26 localhost sshd[25095]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
|
---|
38 | Nov 16 16:44:26 localhost sshd[25095]: debug1: trying public key file /home/vitaly/.ssh/authorized_keys
|
---|
39 | Nov 16 16:44:26 localhost sshd[25095]: debug1: fd 11 clearing O_NONBLOCK
|
---|
40 | Nov 16 16:44:26 localhost sshd[25095]: debug1: /home/vitaly/.ssh/authorized_keys:2: matching key found: RSA SHA256:NVFD3EnLU3E9Wk8IK/+4Lm6H/pER5hQ1WvhG+91a/uU
|
---|
41 | Nov 16 16:44:26 localhost sshd[25095]: debug1: /home/vitaly/.ssh/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
|
---|
42 | Nov 16 16:44:26 localhost sshd[25095]: Accepted key RSA SHA256:NVFD3EnLU3E9Wk8IK/+4Lm6H/pER5hQ1WvhG+91a/uU found at /home/vitaly/.ssh/authorized_keys:2
|
---|
43 | Nov 16 16:44:26 localhost sshd[25095]: debug1: restore_uid: 0/0
|
---|
44 | Nov 16 16:44:26 localhost sshd[25095]: Postponed publickey for vitaly from ::1%enp3s0 port 46648 ssh2 [preauth]
|
---|
45 | Nov 16 16:44:26 localhost sshd[25095]: debug1: userauth-request for user vitaly service ssh-connection method publickey [preauth]
|
---|
46 | Nov 16 16:44:26 localhost sshd[25095]: debug1: attempt 2 failures 0 [preauth]
|
---|
47 | Nov 16 16:44:26 localhost sshd[25095]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
|
---|
48 | Nov 16 16:44:26 localhost sshd[25095]: debug1: trying public key file /home/vitaly/.ssh/authorized_keys
|
---|
49 | Nov 16 16:44:26 localhost sshd[25095]: debug1: fd 11 clearing O_NONBLOCK
|
---|
50 | Nov 16 16:44:26 localhost sshd[25095]: debug1: /home/vitaly/.ssh/authorized_keys:2: matching key found: RSA SHA256:NVFD3EnLU3E9Wk8IK/+4Lm6H/pER5hQ1WvhG+91a/uU
|
---|
51 | Nov 16 16:44:26 localhost sshd[25095]: debug1: /home/vitaly/.ssh/authorized_keys:2: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding
|
---|
52 | Nov 16 16:44:26 localhost sshd[25095]: Accepted key RSA SHA256:NVFD3EnLU3E9Wk8IK/+4Lm6H/pER5hQ1WvhG+91a/uU found at /home/vitaly/.ssh/authorized_keys:2
|
---|
53 | Nov 16 16:44:26 localhost sshd[25095]: debug1: restore_uid: 0/0
|
---|
54 | Nov 16 16:44:26 localhost sshd[25095]: debug1: auth_activate_options: setting new authentication options
|
---|
55 | Nov 16 16:44:26 localhost sshd[25095]: debug1: do_pam_account: called
|
---|
56 | Nov 16 16:44:26 localhost sshd[25095]: Accepted publickey for vitaly from ::1%enp3s0 port 46648 ssh2: RSA SHA256:NVFD3EnLU3E9Wk8IK/+4Lm6H/pER5hQ1WvhG+91a/uU
|
---|
57 | Nov 16 16:44:26 localhost sshd[25095]: debug1: monitor_child_preauth: vitaly has been authenticated by privileged process
|
---|
58 | Nov 16 16:44:26 localhost sshd[25095]: debug1: auth_activate_options: setting new authentication options [preauth]
|
---|
59 | Nov 16 16:44:26 localhost sshd[25095]: debug1: monitor_read_log: child log fd closed
|
---|
60 | Nov 16 16:44:26 localhost sshd[25095]: debug1: audit_event: unhandled event 2
|
---|
61 | Nov 16 16:44:26 localhost sshd[25095]: debug1: SELinux support enabled
|
---|
62 | Nov 16 16:44:26 localhost sshd[25095]: debug1: PAM: establishing credentials
|
---|
63 | Nov 16 16:44:26 localhost sshd[25095]: pam_unix(sshd:session): session opened for user vitaly(uid=1000) by (uid=0)
|
---|
64 | Nov 16 16:44:26 localhost sshd[25095]: User child is on pid 25098
|
---|
65 | Nov 16 16:44:26 localhost sshd[25095]: debug1: session_new: session 0
|
---|
66 | Nov 16 16:44:26 localhost sshd[25095]: debug1: SELinux support enabled
|
---|