Desktopové prostředí Budgie bylo vydáno ve verzi 10.10. Dokončena byla migrace z X11 na Wayland. Budgie 10 vstupuje do režimu údržby. Vývoj se přesouvá k Budgie 11. Dlouho se řešilo, v čem bude nové Budgie napsáno. Budgie 10 je postaveno nad GTK 3. Přemýšlelo se také nad přepsáním z GTK do EFL. Budgie 11 bude nakonec postaveno nad Qt 6.
OpenChaos.dev je 'samovolně se vyvíjející open source projekt' s nedefinovaným cílem. Každý týden mohou lidé hlasovat o návrzích (pull requestech), přičemž vítězný návrh se integruje do kódu projektu (repozitář na GitHubu). Hlasováním je možné změnit téměř vše, včetně tohoto pravidla. Hlasování končí vždy v neděli v 9:00 UTC.
Byl vydán Debian 13.3, tj. třetí opravná verze Debianu 13 s kódovým názvem Trixie a Debian 12.13, tj. třináctá opravná verze Debianu 12 s kódovým názvem Bookworm. Řešeny jsou především bezpečnostní problémy, ale také několik vážných chyb. Instalační média Debianu 13 a Debianu 12 lze samozřejmě nadále k instalaci používat. Po instalaci stačí systém aktualizovat.
Na stránkách Evropské komise, na portálu Podělte se o svůj názor, se lze do 3. února podělit o názor k iniciativě Evropské otevřené digitální ekosystémy řešící přístup EU k otevřenému softwaru.
Společnost Kagi stojící za stejnojmenným placeným vyhledávačem vydala (𝕏) alfa verzi linuxové verze (flatpak) svého proprietárního webového prohlížeče Orion.
Firma Bose se po tlaku uživatelů rozhodla, že otevře API svých chytrých reproduktorů SoundTouch, což umožní pokračovat v jejich používání i po plánovaném ukončení podpory v letošním roce. Pro ovládání také bude stále možné využívat oficiální aplikaci, ale už pouze lokálně bez cloudových služeb. Dokumentace API dostupná zde (soubor PDF).
Jiří Eischmann se v příspěvku na svém blogu rozepsal o open source AdGuard Home jako domácí ochraně nejen před reklamou. Adguard Home není plnohodnotným DNS resolverem, funguje jako DNS forwarder s možností filtrování. To znamená, že když přijme DNS dotaz, sám na něj neodpoví, ale přepošle ho na vybraný DNS server a odpovědi zpracovává a filtruje dle nastavených pravidel a následně posílá zpět klientům. Dá se tedy používat k blokování reklamy a škodlivých stránek a k rodičovské kontrole na úrovni DNS.
AI Claude Code od Anthropicu lépe rozumí frameworku Nette, tj. open source frameworku pro tvorbu webových aplikací v PHP. David Grudl napsal plugin Nette pro Claude Code.
Byla vydána prosincová aktualizace aneb nová verze 1.108 editoru zdrojových kódů Visual Studio Code (Wikipedie). Přehled novinek i s náhledy a videi v poznámkách k vydání. Ve verzi 1.108 vyjde také VSCodium, tj. komunitní sestavení Visual Studia Code bez telemetrie a licenčních podmínek Microsoftu.
Na lasvegaském veletrhu elektroniky CES byl předveden prototyp notebooku chlazeného pomocí plazmových aktuátorů (DBD). Ačkoliv se nejedná o první nápad svého druhu, nepochybně to je první ukázka praktického použití tohoto způsobu chlazení v běžné elektronice. Co činí plazmové chladící akční členy technologickou výzvou je především vysoká produkce jedovatého ozonu, tu se prý podařilo firmě YPlasma zredukovat dielektrickou
… více »Mar 1 15:07:06 arm sshd[5400]: Connection from 217.29.7.25 port 45657 on IPSERVERU port 22
Mar 1 15:07:06 arm sshd[5400]: Accepted publickey for XXX from 217.29.7.25 port 45657 ssh2: RSA SHA256:XXX
Mar 1 15:07:06 arm sshd[5400]: pam_unix(sshd:session): session opened for user XXX by (uid=0)
Mar 1 15:07:06 arm sshd[5400]: User child is on pid 5409
Mar 1 15:07:06 arm sshd[5409]: error: Received disconnect from 217.29.7.25 port 45657:5: Message authentication failed.
Mar 1 15:07:06 arm sshd[5409]: Disconnected from 217.29.7.25 port 45657
Mar 1 15:07:06 arm sshd[5400]: pam_unix(sshd:session): session closed for user XXX
Na armu Ubuntu 16.04.2 LTS (GNU/Linux 4.4.46-armv7-rt-x13 armv7l), u sebe Arch.
Co může být špatně?
ssh -i/klíč - není problém.
Je normální mit na serveru několik public klíčů - pro X lidí, který se tam budou přihlašovat nebo ne?
XmbTextListToTextProperty result code -2
LogLevel DEBUG3
Mar 1 16:28:56 arm sshd[6020]: debug3: fd 5 is not O_NONBLOCK
Mar 1 16:28:56 arm sshd[6020]: debug1: Forked child 6055.
Mar 1 16:28:56 arm sshd[6055]: debug3: oom_adjust_restore
Mar 1 16:28:56 arm sshd[6020]: debug3: send_rexec_state: entering fd = 9 config len 787
Mar 1 16:28:56 arm sshd[6055]: debug1: Set /proc/self/oom_score_adj to 0
Mar 1 16:28:56 arm sshd[6055]: debug1: rexec start in 5 out 5 newsock 5 pipe 8 sock 9
Mar 1 16:28:56 arm sshd[6020]: debug3: ssh_msg_send: type 0
Mar 1 16:28:56 arm sshd[6020]: debug3: send_rexec_state: done
Mar 1 16:28:56 arm sshd[6055]: debug1: inetd sockets after dupping: 3, 3
Mar 1 16:28:56 arm sshd[6055]: Connection from 217.29.7.25 port 48397 on IPSERVERU port 22
Mar 1 16:28:56 arm sshd[6055]: debug1: Client protocol version 2.0; client software version QtCreator
Mar 1 16:28:56 arm sshd[6055]: debug1: no match: QtCreator
Mar 1 16:28:56 arm sshd[6055]: debug1: Enabling compatibility mode for protocol 2.0
Mar 1 16:28:56 arm sshd[6055]: debug1: Local version string SSH-2.0-OpenSSH_7.2p2 Ubuntu-4ubuntu2.1
Mar 1 16:28:56 arm sshd[6055]: debug2: fd 3 setting O_NONBLOCK
Mar 1 16:28:56 arm sshd[6055]: debug2: Network child is on pid 6056
Mar 1 16:28:56 arm sshd[6055]: debug3: preauth child monitor started
Mar 1 16:28:56 arm sshd[6055]: debug3: privsep user:group 107:65534 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: permanently_set_uid: 107/65534 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: list_hostkey_types: ssh-dss key not permitted by HostkeyAlgorithms [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: list_hostkey_types: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: send packet: type 20 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: SSH2_MSG_KEXINIT sent [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: receive packet: type 20 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: SSH2_MSG_KEXINIT received [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: local server KEXINIT proposal [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: KEX algorithms: curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: compression ctos: none,zlib@openssh.com [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: compression stoc: none,zlib@openssh.com [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: languages ctos: [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: languages stoc: [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: first_kex_follows 0 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: reserved 0 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: peer client KEXINIT proposal [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: KEX algorithms: ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group1-sha1,diffie-hellman-group14-sha1 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: host key algorithms: ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,ssh-dss [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: ciphers ctos: aes256-ctr,aes192-ctr,aes128-ctr,3des-ctr,aes128-cbc,3des-cbc [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: ciphers stoc: aes256-ctr,aes192-ctr,aes128-ctr,3des-ctr,aes128-cbc,3des-cbc [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: MACs ctos: hmac-sha2-256,hmac-sha2-384,hmac-sha2-512,hmac-sha1 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: MACs stoc: hmac-sha2-256,hmac-sha2-384,hmac-sha2-512,hmac-sha1 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: compression ctos: none [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: compression stoc: none [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: languages ctos: [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: languages stoc: [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: first_kex_follows 0 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: reserved 0 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: kex: algorithm: ecdh-sha2-nistp256 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: kex: host key algorithm: ecdsa-sha2-nistp256 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: kex: client->server cipher: aes256-ctr MAC: hmac-sha2-256 compression: none [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: kex: server->client cipher: aes256-ctr MAC: hmac-sha2-256 compression: none [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: receive packet: type 30 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_key_sign entering [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_send entering: type 6 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:56 arm sshd[6055]: debug3: monitor_read: checking request 6
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_answer_sign
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_answer_sign: hostkey proof signature 0x810da1b0(100)
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_send entering: type 7
Mar 1 16:28:56 arm sshd[6055]: debug2: monitor_read: 6 used once, disabling now
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive_expect entering: type 7 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive entering [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: send packet: type 31 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: send packet: type 21 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: set_newkeys: mode 1 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: rekey after 4294967296 blocks [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: SSH2_MSG_NEWKEYS sent [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: expecting SSH2_MSG_NEWKEYS [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: receive packet: type 21 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: set_newkeys: mode 0 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: rekey after 4294967296 blocks [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: SSH2_MSG_NEWKEYS received [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: KEX done [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: receive packet: type 5 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: send packet: type 6 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: receive packet: type 50 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: userauth-request for user XXX service ssh-connection method publickey [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug1: attempt 0 failures 0 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_getpwnamallow entering [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_send entering: type 8 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive_expect entering: type 9 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive entering [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:56 arm sshd[6055]: debug3: monitor_read: checking request 8
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_answer_pwnamallow
Mar 1 16:28:56 arm sshd[6055]: debug2: parse_server_config: config reprocess config len 787
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_send entering: type 9
Mar 1 16:28:56 arm sshd[6055]: debug2: monitor_read: 8 used once, disabling now
Mar 1 16:28:56 arm sshd[6055]: debug2: input_userauth_request: setting up authctxt for XXX [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_start_pam entering [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_send entering: type 100 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_inform_authserv entering [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_send entering: type 4 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug2: input_userauth_request: try method publickey [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: userauth_pubkey: have signature for RSA SHA256:XXX [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_key_allowed entering [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_send entering: type 22 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive_expect entering: type 23 [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive entering [preauth]
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:56 arm sshd[6055]: debug3: monitor_read: checking request 100
Mar 1 16:28:56 arm sshd[6055]: debug1: PAM: initializing for "XXX"
Mar 1 16:28:56 arm sshd[6055]: debug1: PAM: setting PAM_RHOST to "217.29.7.25"
Mar 1 16:28:56 arm sshd[6055]: debug1: PAM: setting PAM_TTY to "ssh"
Mar 1 16:28:56 arm sshd[6055]: debug2: monitor_read: 100 used once, disabling now
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:56 arm sshd[6055]: debug3: monitor_read: checking request 4
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
Mar 1 16:28:56 arm sshd[6055]: debug2: monitor_read: 4 used once, disabling now
Mar 1 16:28:56 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:57 arm sshd[6055]: debug3: monitor_read: checking request 22
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_answer_keyallowed entering
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_answer_keyallowed: key_from_blob: 0x810d9d48
Mar 1 16:28:57 arm sshd[6055]: debug1: temporarily_use_uid: 1000/1000 (e=0/0)
Mar 1 16:28:57 arm sshd[6055]: debug1: trying public key file /home/XXX/.ssh/authorized_keys
Mar 1 16:28:57 arm sshd[6055]: debug1: fd 4 clearing O_NONBLOCK
Mar 1 16:28:57 arm sshd[6055]: debug2: user_key_allowed: check options: 'KLÍČ S HESLEM'
Mar 1 16:28:57 arm sshd[6055]: debug2: user_key_allowed: advance: 'KLÍČ BEZ HESLA - TIM SE SNAŽIM PŘIPOJIT'
Mar 1 16:28:57 arm sshd[6055]: debug1: matching key found: file /home/XXX/.ssh/authorized_keys, line 2 RSA SHA256:XXX
Mar 1 16:28:57 arm sshd[6055]: debug1: restore_uid: 0/0
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_answer_keyallowed: key 0x810d9d48 is allowed
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_send entering: type 23
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_key_verify entering [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_send entering: type 24 [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_key_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive_expect entering: type 25 [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive entering [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:57 arm sshd[6055]: debug3: monitor_read: checking request 24
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_answer_keyverify: key 0x810daf30 signature verified
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_send entering: type 25
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive_expect entering: type 102
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:57 arm sshd[6055]: debug1: do_pam_account: called
Mar 1 16:28:57 arm sshd[6055]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_send entering: type 103
Mar 1 16:28:57 arm sshd[6055]: Accepted publickey for XXX from 217.29.7.25 port 48397 ssh2: RSA SHA256:XXX
Mar 1 16:28:57 arm sshd[6055]: debug1: monitor_child_preauth: XXX has been authenticated by privileged process
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_get_keystate: Waiting for new keys
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive_expect entering: type 26
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_get_keystate: GOT new keys
Mar 1 16:28:57 arm sshd[6055]: debug2: userauth_pubkey: authenticated 1 pkalg ssh-rsa [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_do_pam_account entering [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_send entering: type 102 [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive_expect entering: type 103 [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive entering [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_do_pam_account returning 1 [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: send packet: type 52 [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_send entering: type 26 [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_send_keystate: Finished sending state [preauth]
Mar 1 16:28:57 arm sshd[6055]: debug1: monitor_read_log: child log fd closed
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_share_sync: Share sync
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_share_sync: Share sync end
Mar 1 16:28:57 arm sshd[6055]: debug1: PAM: establishing credentials
Mar 1 16:28:57 arm sshd[6055]: debug3: PAM: opening session
Mar 1 16:28:57 arm sshd[6055]: pam_unix(sshd:session): session opened for user XXX by (uid=0)
Mar 1 16:28:57 arm sshd[6055]: debug3: PAM: sshpam_store_conv called with 1 messages
Mar 1 16:28:57 arm sshd[6055]: User child is on pid 6064
Mar 1 16:28:57 arm sshd[6064]: debug1: SELinux support disabled
Mar 1 16:28:57 arm sshd[6064]: debug1: PAM: establishing credentials
Mar 1 16:28:57 arm sshd[6064]: debug1: permanently_set_uid: 1000/1000
Mar 1 16:28:57 arm sshd[6064]: debug3: monitor_apply_keystate: packet_set_state
Mar 1 16:28:57 arm sshd[6064]: debug2: set_newkeys: mode 0
Mar 1 16:28:57 arm sshd[6064]: debug1: rekey after 4294967296 blocks
Mar 1 16:28:57 arm sshd[6064]: debug2: set_newkeys: mode 1
Mar 1 16:28:57 arm sshd[6064]: debug1: rekey after 4294967296 blocks
Mar 1 16:28:57 arm sshd[6064]: debug1: ssh_packet_set_postauth: called
Mar 1 16:28:57 arm sshd[6064]: debug3: ssh_packet_set_state: done
Mar 1 16:28:57 arm sshd[6064]: debug3: notify_hostkeys: key 0: ssh-rsa SHA256:XXX
Mar 1 16:28:57 arm sshd[6064]: debug3: notify_hostkeys: key 1: ssh-dss SHA256:XXX
Mar 1 16:28:57 arm sshd[6064]: debug3: notify_hostkeys: key 2: ecdsa-sha2-nistp256 SHA256:XXX
Mar 1 16:28:57 arm sshd[6064]: debug3: notify_hostkeys: key 3: ssh-ed25519 SHA256:XXX
Mar 1 16:28:57 arm sshd[6064]: debug3: notify_hostkeys: sent 4 hostkeys
Mar 1 16:28:57 arm sshd[6064]: debug3: send packet: type 80
Mar 1 16:28:57 arm sshd[6064]: debug1: Entering interactive session for SSH2.
Mar 1 16:28:57 arm sshd[6064]: debug2: fd 5 setting O_NONBLOCK
Mar 1 16:28:57 arm sshd[6064]: debug2: fd 6 setting O_NONBLOCK
Mar 1 16:28:57 arm sshd[6064]: debug1: server_init_dispatch_20
Mar 1 16:28:57 arm sshd[6064]: debug3: receive packet: type 90
Mar 1 16:28:57 arm sshd[6064]: debug1: server_input_channel_open: ctype session rchan 0 win 16777216 max 16777216
Mar 1 16:28:57 arm sshd[6064]: debug1: input_session_request
Mar 1 16:28:57 arm sshd[6064]: debug1: channel 0: new [server-session]
Mar 1 16:28:57 arm sshd[6064]: debug2: session_new: allocate (allocated 0 max 10)
Mar 1 16:28:57 arm sshd[6064]: debug3: session_unused: session id 0 unused
Mar 1 16:28:57 arm sshd[6064]: debug1: session_new: session 0
Mar 1 16:28:57 arm sshd[6064]: debug1: session_open: channel 0
Mar 1 16:28:57 arm sshd[6064]: debug1: session_open: session 0: link with channel 0
Mar 1 16:28:57 arm sshd[6064]: debug1: server_input_channel_open: confirm session
Mar 1 16:28:57 arm sshd[6064]: debug3: send packet: type 91
Mar 1 16:28:57 arm sshd[6064]: debug3: receive packet: type 1
Mar 1 16:28:57 arm sshd[6064]: error: Received disconnect from 217.29.7.25 port 48397:5: Message authentication failed.
Mar 1 16:28:57 arm sshd[6064]: Disconnected from 217.29.7.25 port 48397
Mar 1 16:28:57 arm sshd[6064]: debug1: do_cleanup
Mar 1 16:28:57 arm sshd[6064]: debug3: PAM: sshpam_thread_cleanup entering
Mar 1 16:28:57 arm sshd[6055]: debug3: mm_request_receive entering
Mar 1 16:28:57 arm sshd[6055]: debug1: do_cleanup
Mar 1 16:28:57 arm sshd[6055]: debug1: PAM: cleanup
Mar 1 16:28:57 arm sshd[6055]: debug1: PAM: closing session
Mar 1 16:28:57 arm sshd[6055]: pam_unix(sshd:session): session closed for user XXX
Mar 1 16:28:57 arm sshd[6055]: debug1: PAM: deleting credentials
Mar 1 16:28:57 arm sshd[6055]: debug3: PAM: sshpam_thread_cleanup entering
Mar 1 16:28:57 arm sshd[6055]: debug1: audit_event: unhandled event 12
Tiskni
Sdílej: