Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 06 Apr 2023 16:57:09 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 270668] ssh logons via public key fail after target upgraded to FreeBSD-12.4-p2
Message-ID:  <bug-270668-227-iHgCTOBZ4B@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-270668-227@https.bugs.freebsd.org/bugzilla/>
References:  <bug-270668-227@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270668

--- Comment #1 from James B. Byrne <byrnejb@harte-lyne.ca> ---
This is what /usr/sbin/sshd -ddd show when processing a connection from the
remote client:

# /usr/sbin/sshd -ddd
debug2: load_server_config: filename /etc/ssh/sshd_config
debug2: load_server_config: done config len =3D 3505
debug2: parse_server_config_depth: config /etc/ssh/sshd_config len 3505
debug3: /etc/ssh/sshd_config:45 setting AuthorizedKeysFile .ssh/authorized_=
keys
debug3: /etc/ssh/sshd_config:115 setting Subsystem sftp
/usr/libexec/sftp-server
debug3: /etc/ssh/sshd_config:125 setting PubkeyAcceptedAlgorithms +ssh-rsa
debug1: sshd version OpenSSH_9.1, OpenSSL 1.1.1q-freebsd  5 Jul 2022
debug1: private host key #0: ssh-rsa
SHA256:Vou63TmF8OcESVytHOhjBB9FQp4tftAJvifYnok8PSw
debug1: private host key #1: ecdsa-sha2-nistp256
SHA256:uhLYoQx7y7OwGyPsjpbQrb1a0tgunmIlr8MhTPK8GAA
debug1: private host key #2: ssh-ed25519
SHA256:q2N77sbjHlZ35RzCZCCP1+V/yqiVzS56oFhH4UzX0zk
debug1: rexec_argv[0]=3D'/usr/sbin/sshd'
debug1: rexec_argv[1]=3D'-ddd'
debug2: fd 3 setting O_NONBLOCK
debug3: Fssh_sock_set_v6only: set socket 3 IPV6_V6ONLY
debug1: Bind to port 22 on ::.
Server listening on :: port 22.
debug2: fd 4 setting O_NONBLOCK
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
debug1: fd 5 clearing O_NONBLOCK
debug1: Server will not fork when running in debugging mode.
debug3: send_rexec_state: entering fd =3D 8 config len 3505
debug3: Fssh_ssh_msg_send: type 0
debug3: send_rexec_state: done
debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8
debug3: recv_rexec_state: entering fd =3D 5
debug3: ssh_msg_recv entering
debug3: recv_rexec_state: done
debug2: parse_server_config_depth: config rexec len 3505
debug3: rexec:45 setting AuthorizedKeysFile .ssh/authorized_keys
debug3: rexec:115 setting Subsystem sftp        /usr/libexec/sftp-server
debug3: rexec:125 setting PubkeyAcceptedAlgorithms +ssh-rsa
debug1: sshd version OpenSSH_9.1, OpenSSL 1.1.1q-freebsd  5 Jul 2022
debug1: private host key #0: ssh-rsa
SHA256:Vou63TmF8OcESVytHOhjBB9FQp4tftAJvifYnok8PSw
debug1: private host key #1: ecdsa-sha2-nistp256
SHA256:uhLYoQx7y7OwGyPsjpbQrb1a0tgunmIlr8MhTPK8GAA
debug1: private host key #2: ssh-ed25519
SHA256:q2N77sbjHlZ35RzCZCCP1+V/yqiVzS56oFhH4UzX0zk
debug1: inetd sockets after dupping: 3, 3
debug1: res_init()
debug3: Trying to reverse map address 216.185.71.46.
Connection from 216.185.71.46 port 61524 on 216.185.71.41 port 22
debug1: Local version string SSH-2.0-OpenSSH_9.1 FreeBSD-20221019
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8
FreeBSD-20211221
debug1: Fssh_compat_banner: match: OpenSSH_8.8 FreeBSD-20211221 pat OpenSSH*
compat 0x04000000
debug2: fd 3 setting O_NONBLOCK
debug3: ssh_sandbox_init: preparing capsicum sandbox
debug2: Network child is on pid 24923
debug3: preauth child monitor started
debug3: privsep user:group 22:22 [preauth]
debug1: permanently_set_uid: 22/22 [preauth]
debug1: list_hostkey_types:
rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
debug3: send packet: type 20 [preauth]
debug1: SSH2_MSG_KEXINIT sent [preauth]
debug3: receive packet: type 20 [preauth]
debug1: SSH2_MSG_KEXINIT received [preauth]
debug2: local server KEXINIT proposal [preauth]
debug2: KEX algorithms:
sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libs=
sh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hell=
man-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-grou=
p18-sha512,diffie-hellman-group14-sha256
[preauth]
debug2: host key algorithms:
rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth]
debug2: ciphers ctos:
chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@o=
penssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
[preauth]
debug2: ciphers stoc:
chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@o=
penssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
[preauth]
debug2: MACs ctos:
umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.=
com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh=
.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[preauth]
debug2: MACs stoc:
umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.=
com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh=
.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[preauth]
debug2: compression ctos: none,zlib@openssh.com [preauth]
debug2: compression stoc: none,zlib@openssh.com [preauth]
debug2: languages ctos:  [preauth]
debug2: languages stoc:  [preauth]
debug2: first_kex_follows 0  [preauth]
debug2: reserved 0  [preauth]
debug2: peer client KEXINIT proposal [preauth]
debug2: KEX algorithms:
curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2=
-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-he=
llman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-s=
ha256,ext-info-c
[preauth]
debug2: host key algorithms:
ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,e=
cdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openss=
h.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@o=
penssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.=
com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2=
-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nist=
p256@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa
[preauth]
debug2: ciphers ctos:
chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@o=
penssh.com,aes256-gcm@openssh.com
[preauth]
debug2: ciphers stoc:
chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@o=
penssh.com,aes256-gcm@openssh.com
[preauth]
debug2: MACs ctos:
umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.=
com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh=
.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[preauth]
debug2: MACs stoc:
umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.=
com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh=
.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
[preauth]
debug2: compression ctos: none,zlib@openssh.com,zlib [preauth]
debug2: compression stoc: none,zlib@openssh.com,zlib [preauth]
debug2: languages ctos:  [preauth]
debug2: languages stoc:  [preauth]
debug2: first_kex_follows 0  [preauth]
debug2: reserved 0  [preauth]
debug1: kex: algorithm: curve25519-sha256 [preauth]
debug1: kex: host key algorithm: ssh-ed25519 [preauth]
debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC:
<implicit> compression: none [preauth]
debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC:
<implicit> compression: none [preauth]
debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth]
debug3: receive packet: type 30 [preauth]
debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth]
debug3: Fssh_mm_sshkey_sign: entering [preauth]
debug3: mm_request_send: entering, type 6 [preauth]
debug3: Fssh_mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth]
debug3: mm_request_receive_expect: entering, type 7 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 6
debug3: mm_answer_sign: entering
debug3: mm_answer_sign: ssh-ed25519 KEX signature len=3D83
debug3: mm_request_send: entering, type 7
debug2: monitor_read: 6 used once, disabling now
debug3: send packet: type 31 [preauth]
debug3: send packet: type 21 [preauth]
debug2: Fssh_ssh_set_newkeys: mode 1 [preauth]
debug1: rekey out after 134217728 blocks [preauth]
debug1: SSH2_MSG_NEWKEYS sent [preauth]
debug1: Sending SSH2_MSG_EXT_INFO [preauth]
debug3: send packet: type 7 [preauth]
debug1: expecting SSH2_MSG_NEWKEYS [preauth]
debug3: receive packet: type 21 [preauth]
debug1: SSH2_MSG_NEWKEYS received [preauth]
debug2: Fssh_ssh_set_newkeys: mode 0 [preauth]
debug1: rekey in after 134217728 blocks [preauth]
debug1: KEX done [preauth]
debug3: receive packet: type 5 [preauth]
debug3: send packet: type 6 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method none
[preauth]
debug1: attempt 0 failures 0 [preauth]
debug3: mm_getpwnamallow: entering [preauth]
debug3: mm_request_send: entering, type 8 [preauth]
debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth]
debug3: mm_request_receive_expect: entering, type 9 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 8
debug3: mm_answer_pwnamallow: entering
debug2: parse_server_config_depth: config reprocess config len 3505
debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
debug3: mm_request_send: entering, type 9
debug2: monitor_read: 8 used once, disabling now
debug2: input_userauth_request: setting up authctxt for root [preauth]
debug3: mm_start_pam entering [preauth]
debug3: mm_request_send: entering, type 100 [preauth]
debug3: mm_inform_authserv: entering [preauth]
debug3: mm_request_send: entering, type 4 [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 100
debug1: PAM: initializing for "root"
debug1: PAM: setting PAM_RHOST to "vhost06.hamilton.harte-lyne.ca"
debug2: monitor_read: 100 used once, disabling now
debug2: input_userauth_request: try method none [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 1.865ms, delaying 5.400ms (reque=
sted
7.265ms) [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 4
debug3: mm_answer_authserv: service=3Dssh-connection, style=3D
debug2: monitor_read: 4 used once, disabling now
debug3: userauth_finish: failure partial=3D0 next
methods=3D"publickey,keyboard-interactive" [preauth]
debug3: send packet: type 51 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method public=
key
[preauth]
debug1: attempt 1 failures 0 [preauth]
debug2: input_userauth_request: try method publickey [preauth]
debug2: userauth_pubkey: valid user root querying public key rsa-sha2-512
AAAAB3NzaC1yc2EAAAADAQABAAACAQC4QKE6CFf8a4zLX1SWVdONeYUorRRtCk8v+vJZ1VK/c6d=
DEQLqUlLEftva+Ci4nQcrS9WtrSykTPe/4xXsvj20ObaQ/wl0HfEYJVZgN1/fnWLDohbkOlcvHo=
nFbGQwFunKCXFn2C2/2cf+e9B1LRj91ScJpKZqJdgoWTYzKCuj3f1roHATOk8QCO5SD//1O+hnf=
Koto+BIROSmqQebVFm1qo8193VqezMHTtBF+5Hkp2PsvBx5bbWpGznMxSUmlrl9YxgIcjnu9HDm=
7W9NZxQEMsePhX1mO64cSbjl/D4rJqZOg3J0R9T6sPbaPHYgtCFCmF5l+6cDet4MFqxsdYXoikF=
JdnOpI+V6Pk355QCpPNzF/KnRq9Ia9CjRe5ThPwVPkPQU+8djQ+79UJk5TM1AzapbqmXIzLuhZO=
SYnrAnXMYDkl7Q5lXYC9pYu0AVn4NlDkJmlcnIVG5fmn5ervjJa7AnWeWmsNYlghmTLKmgbE8Fs=
5ZLV+2yG1JiMHYtIFdZNEVbniZnBUgNbJsjYdNqqIGAsz7CQTvz1dqO5wHAET7PZEQ+b9MD2T9i=
+iWzE5ONVfDUxM5gWTyb3y6H2AVhyIo7Jmaib9cyv8XOHoLhPegw9l0T2yQAzDcViJA6nWWlvBG=
OhX0M5Iuo4pEJ20Me3h1/eErJYsuMzdd7q5O3Iw=3D=3D
[preauth]
debug1: userauth_pubkey: publickey test pkalg rsa-sha2-512 pkblob RSA
SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE [preauth]
debug3: mm_key_allowed: entering [preauth]
debug3: mm_request_send: entering, type 22 [preauth]
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
debug3: mm_request_receive_expect: entering, type 23 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 22
debug3: mm_answer_keyallowed: entering
debug1: trying public key file /root/.ssh/authorized_keys
debug1: fd 4 clearing O_NONBLOCK
debug2: /root/.ssh/authorized_keys:1: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+Lc=
Xh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjYw=
a+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Usd=
4HKzA=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:1: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+L=
cXh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjY=
wa+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Us=
d4HKzA=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:2: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:2: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:4: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPHS=
h7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20JU=
OCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoCw=
cEnGw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:4: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPH=
Sh7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20J=
UOCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoC=
wcEnGw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:5: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:5: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:7: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO=
8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs=
dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m=
ntF+A=3D=3D
root@vhost06.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:7: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HX=
O8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RC=
sdxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4=
mntF+A=3D=3D
root@vhost06.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:8: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q
root@vhost06.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:8: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q
root@vhost06.hamilton.harte-lyne.ca
'
debug1: /root/.ssh/authorized_keys:9: matching key found: RSA
SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE
debug1: /root/.ssh/authorized_keys:9: key options: agent-forwarding
port-forwarding pty user-rc x11-forwarding
Accepted key RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE found at
/root/.ssh/authorized_keys:9
debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 9/10
lines
debug3: mm_answer_keyallowed: publickey authentication test: RSA key is all=
owed
debug3: mm_request_send: entering, type 23
debug3: send packet: type 60 [preauth]
debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 0.889ms, delaying 6.376ms (reque=
sted
7.265ms) [preauth]
Postponed publickey for root from 216.185.71.46 port 61524 ssh2 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method public=
key
[preauth]
debug1: attempt 2 failures 0 [preauth]
debug2: input_userauth_request: try method publickey [preauth]
debug2: userauth_pubkey: valid user root attempting public key rsa-sha2-512
AAAAB3NzaC1yc2EAAAADAQABAAACAQC4QKE6CFf8a4zLX1SWVdONeYUorRRtCk8v+vJZ1VK/c6d=
DEQLqUlLEftva+Ci4nQcrS9WtrSykTPe/4xXsvj20ObaQ/wl0HfEYJVZgN1/fnWLDohbkOlcvHo=
nFbGQwFunKCXFn2C2/2cf+e9B1LRj91ScJpKZqJdgoWTYzKCuj3f1roHATOk8QCO5SD//1O+hnf=
Koto+BIROSmqQebVFm1qo8193VqezMHTtBF+5Hkp2PsvBx5bbWpGznMxSUmlrl9YxgIcjnu9HDm=
7W9NZxQEMsePhX1mO64cSbjl/D4rJqZOg3J0R9T6sPbaPHYgtCFCmF5l+6cDet4MFqxsdYXoikF=
JdnOpI+V6Pk355QCpPNzF/KnRq9Ia9CjRe5ThPwVPkPQU+8djQ+79UJk5TM1AzapbqmXIzLuhZO=
SYnrAnXMYDkl7Q5lXYC9pYu0AVn4NlDkJmlcnIVG5fmn5ervjJa7AnWeWmsNYlghmTLKmgbE8Fs=
5ZLV+2yG1JiMHYtIFdZNEVbniZnBUgNbJsjYdNqqIGAsz7CQTvz1dqO5wHAET7PZEQ+b9MD2T9i=
+iWzE5ONVfDUxM5gWTyb3y6H2AVhyIo7Jmaib9cyv8XOHoLhPegw9l0T2yQAzDcViJA6nWWlvBG=
OhX0M5Iuo4pEJ20Me3h1/eErJYsuMzdd7q5O3Iw=3D=3D
[preauth]
debug3: userauth_pubkey: publickey have rsa-sha2-512 signature for RSA
SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE [preauth]
debug3: mm_key_allowed: entering [preauth]
debug3: mm_request_send: entering, type 22 [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 22
debug3: mm_answer_keyallowed: entering
debug1: trying public key file /root/.ssh/authorized_keys
debug1: fd 4 clearing O_NONBLOCK
debug2: /root/.ssh/authorized_keys:1: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+Lc=
Xh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjYw=
a+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Usd=
4HKzA=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:1: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+L=
cXh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjY=
wa+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Us=
d4HKzA=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:2: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:2: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:4: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPHS=
h7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20JU=
OCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoCw=
cEnGw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:4: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPH=
Sh7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20J=
UOCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoC=
wcEnGw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:5: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:5: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:7: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO=
8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs=
dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m=
ntF+A=3D=3D
root@vhost06.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:7: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HX=
O8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RC=
sdxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4=
mntF+A=3D=3D
root@vhost06.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:8: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q
root@vhost06.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:8: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q
root@vhost06.hamilton.harte-lyne.ca
'
debug1: /root/.ssh/authorized_keys:9: matching key found: RSA
SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE
debug1: /root/.ssh/authorized_keys:9: key options: agent-forwarding
port-forwarding pty user-rc x11-forwarding
Accepted key RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE found at
/root/.ssh/authorized_keys:9
debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 9/10
lines
debug3: mm_answer_keyallowed: publickey authentication: RSA key is allowed
debug3: mm_request_send: entering, type 23
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
debug3: mm_request_receive_expect: entering, type 23 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_sshkey_verify: entering [preauth]
debug3: mm_request_send: entering, type 24 [preauth]
debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth]
debug3: mm_request_receive_expect: entering, type 25 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 24
debug3: mm_answer_keyverify: publickey RSA signature using rsa-sha2-512
verified
debug1: auth_activate_options: setting new authentication options
debug3: mm_request_send: entering, type 25
ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524
Failed publickey for root from 216.185.71.46 port 61524 ssh2: RSA
SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE
debug1: auth_activate_options: setting new authentication options [preauth]
debug2: userauth_pubkey: authenticated 1 pkalg rsa-sha2-512 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 0.957ms, delaying 6.308ms (reque=
sted
7.265ms) [preauth]
ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 [preauth]
debug3: mm_audit_event entering [preauth]
debug3: mm_request_send: entering, type 112 [preauth]
debug3: userauth_finish: failure partial=3D0 next
methods=3D"publickey,keyboard-interactive" [preauth]
debug3: send packet: type 51 [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 112
debug3: mm_answer_audit_event entering
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method public=
key
[preauth]
debug1: attempt 3 failures 1 [preauth]
debug2: input_userauth_request: try method publickey [preauth]
debug2: userauth_pubkey: valid user root querying public key
ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO=
8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs=
dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m=
ntF+A=3D=3D
[preauth]
debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp521 pkblob EC=
DSA
SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 [preauth]
debug3: mm_key_allowed: entering [preauth]
debug3: mm_request_send: entering, type 22 [preauth]
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
debug3: mm_request_receive_expect: entering, type 23 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 22
debug3: mm_answer_keyallowed: entering
debug1: trying public key file /root/.ssh/authorized_keys
debug1: fd 4 clearing O_NONBLOCK
debug2: /root/.ssh/authorized_keys:2: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:2: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:3: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5q=
8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkFe=
98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb5=
vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYtl=
gbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD/=
1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkln=
h4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/+=
Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAGf=
Dh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8B=
3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:3: advance:
'AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5=
q8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkF=
e98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb=
5vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYt=
lgbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD=
/1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkl=
nh4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/=
+Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAG=
fDh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8=
B3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:5: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:5: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:6: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jPE=
dLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1UyqdR=
U4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG5=
SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZgL=
TSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79lM=
/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDga=
7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4D=
dlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/FpjE=
bcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+k=
QNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:6: advance:
'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jP=
EdLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1Uyqd=
RU4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG=
5SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZg=
LTSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79l=
M/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDg=
a7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4=
DdlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/Fpj=
EbcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+=
kQNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug1: /root/.ssh/authorized_keys:7: matching key found: ECDSA
SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8
debug1: /root/.ssh/authorized_keys:7: key options: agent-forwarding
port-forwarding pty user-rc x11-forwarding
Accepted key ECDSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 found=
 at
/root/.ssh/authorized_keys:7
debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 7/10
lines
debug3: mm_answer_keyallowed: publickey authentication test: ECDSA key is
allowed
debug3: mm_request_send: entering, type 23
debug3: send packet: type 60 [preauth]
debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp521 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 19.304ms, delaying 9.757ms
(requested 7.265ms) [preauth]
Postponed publickey for root from 216.185.71.46 port 61524 ssh2 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method public=
key
[preauth]
debug1: attempt 4 failures 1 [preauth]
debug2: input_userauth_request: try method publickey [preauth]
debug2: userauth_pubkey: valid user root attempting public key
ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO=
8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs=
dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m=
ntF+A=3D=3D
[preauth]
debug3: userauth_pubkey: publickey have ecdsa-sha2-nistp521 signature for E=
CDSA
SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 [preauth]
debug3: mm_key_allowed: entering [preauth]
debug3: mm_request_send: entering, type 22 [preauth]
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
debug3: mm_request_receive_expect: entering, type 23 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 22
debug3: mm_answer_keyallowed: entering
debug1: trying public key file /root/.ssh/authorized_keys
debug1: fd 4 clearing O_NONBLOCK
debug2: /root/.ssh/authorized_keys:2: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:2: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:3: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5q=
8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkFe=
98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb5=
vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYtl=
gbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD/=
1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkln=
h4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/+=
Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAGf=
Dh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8B=
3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:3: advance:
'AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5=
q8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkF=
e98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb=
5vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYt=
lgbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD=
/1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkl=
nh4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/=
+Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAG=
fDh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8=
B3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:5: check options: 'ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:5: advance:
'AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:6: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jPE=
dLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1UyqdR=
U4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG5=
SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZgL=
TSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79lM=
/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDga=
7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4D=
dlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/FpjE=
bcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+k=
QNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:6: advance:
'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jP=
EdLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1Uyqd=
RU4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG=
5SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZg=
LTSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79l=
M/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDg=
a7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4=
DdlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/Fpj=
EbcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+=
kQNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug1: /root/.ssh/authorized_keys:7: matching key found: ECDSA
SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8
debug1: /root/.ssh/authorized_keys:7: key options: agent-forwarding
port-forwarding pty user-rc x11-forwarding
Accepted key ECDSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 found=
 at
/root/.ssh/authorized_keys:7
debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 7/10
lines
debug3: mm_answer_keyallowed: publickey authentication: ECDSA key is allowed
debug3: mm_request_send: entering, type 23
debug3: mm_sshkey_verify: entering [preauth]
debug3: mm_request_send: entering, type 24 [preauth]
debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth]
debug3: mm_request_receive_expect: entering, type 25 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 24
debug3: mm_answer_keyverify: publickey ECDSA signature using
ecdsa-sha2-nistp521 verified
debug1: auth_activate_options: setting new authentication options
debug3: mm_request_send: entering, type 25
ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524
Failed publickey for root from 216.185.71.46 port 61524 ssh2: ECDSA
SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8
debug1: auth_activate_options: setting new authentication options [preauth]
debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp521 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 26.420ms, delaying 2.641ms
(requested 7.265ms) [preauth]
ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 [preauth]
debug3: mm_audit_event entering [preauth]
debug3: mm_request_send: entering, type 112 [preauth]
debug3: userauth_finish: failure partial=3D0 next
methods=3D"publickey,keyboard-interactive" [preauth]
debug3: send packet: type 51 [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 112
debug3: mm_answer_audit_event entering
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method public=
key
[preauth]
debug1: attempt 5 failures 2 [preauth]
debug2: input_userauth_request: try method publickey [preauth]
debug2: userauth_pubkey: valid user root querying public key ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q [preau=
th]
debug1: userauth_pubkey: publickey test pkalg ssh-ed25519 pkblob ED25519
SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I [preauth]
debug3: mm_key_allowed: entering [preauth]
debug3: mm_request_send: entering, type 22 [preauth]
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
debug3: mm_request_receive_expect: entering, type 23 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 22
debug3: mm_answer_keyallowed: entering
debug1: trying public key file /root/.ssh/authorized_keys
debug1: fd 4 clearing O_NONBLOCK
debug2: /root/.ssh/authorized_keys:1: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+Lc=
Xh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjYw=
a+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Usd=
4HKzA=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:1: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+L=
cXh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjY=
wa+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Us=
d4HKzA=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:3: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5q=
8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkFe=
98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb5=
vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYtl=
gbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD/=
1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkln=
h4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/+=
Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAGf=
Dh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8B=
3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:3: advance:
'AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5=
q8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkF=
e98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb=
5vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYt=
lgbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD=
/1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkl=
nh4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/=
+Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAG=
fDh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8=
B3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:4: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPHS=
h7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20JU=
OCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoCw=
cEnGw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:4: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPH=
Sh7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20J=
UOCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoC=
wcEnGw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:6: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jPE=
dLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1UyqdR=
U4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG5=
SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZgL=
TSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79lM=
/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDga=
7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4D=
dlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/FpjE=
bcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+k=
QNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:6: advance:
'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jP=
EdLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1Uyqd=
RU4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG=
5SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZg=
LTSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79l=
M/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDg=
a7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4=
DdlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/Fpj=
EbcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+=
kQNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:7: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO=
8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs=
dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m=
ntF+A=3D=3D
root@vhost06.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:7: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HX=
O8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RC=
sdxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4=
mntF+A=3D=3D
root@vhost06.hamilton.harte-lyne.ca
'
debug1: /root/.ssh/authorized_keys:8: matching key found: ED25519
SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I
debug1: /root/.ssh/authorized_keys:8: key options: agent-forwarding
port-forwarding pty user-rc x11-forwarding
Accepted key ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I fou=
nd
at /root/.ssh/authorized_keys:8
debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 8/10
lines
debug3: mm_answer_keyallowed: publickey authentication test: ED25519 key is
allowed
debug3: mm_request_send: entering, type 23
debug3: send packet: type 60 [preauth]
debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 0.379ms, delaying 6.887ms (reque=
sted
7.265ms) [preauth]
Postponed publickey for root from 216.185.71.46 port 61524 ssh2 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method public=
key
[preauth]
debug1: attempt 6 failures 2 [preauth]
debug2: input_userauth_request: try method publickey [preauth]
debug2: userauth_pubkey: valid user root attempting public key ssh-ed25519
AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q [preau=
th]
debug3: userauth_pubkey: publickey have ssh-ed25519 signature for ED25519
SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I [preauth]
debug3: mm_key_allowed: entering [preauth]
debug3: mm_request_send: entering, type 22 [preauth]
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth]
debug3: mm_request_receive_expect: entering, type 23 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 22
debug3: mm_answer_keyallowed: entering
debug1: trying public key file /root/.ssh/authorized_keys
debug1: fd 4 clearing O_NONBLOCK
debug2: /root/.ssh/authorized_keys:1: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+Lc=
Xh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjYw=
a+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Usd=
4HKzA=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:1: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+L=
cXh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjY=
wa+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Us=
d4HKzA=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:3: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5q=
8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkFe=
98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb5=
vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYtl=
gbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD/=
1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkln=
h4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/+=
Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAGf=
Dh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8B=
3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:3: advance:
'AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5=
q8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkF=
e98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb=
5vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYt=
lgbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD=
/1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkl=
nh4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/=
+Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAG=
fDh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8=
B3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D
root@vhost01.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:4: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPHS=
h7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20JU=
OCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoCw=
cEnGw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:4: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPH=
Sh7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20J=
UOCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoC=
wcEnGw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:6: check options: 'ssh-rsa
AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jPE=
dLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1UyqdR=
U4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG5=
SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZgL=
TSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79lM=
/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDga=
7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4D=
dlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/FpjE=
bcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+k=
QNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:6: advance:
'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jP=
EdLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1Uyqd=
RU4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG=
5SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZg=
LTSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79l=
M/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDg=
a7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4=
DdlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/Fpj=
EbcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+=
kQNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D
root@vhost05.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:7: check options: 'ecdsa-sha2-nistp521
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO=
8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs=
dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m=
ntF+A=3D=3D
root@vhost06.hamilton.harte-lyne.ca
'
debug2: /root/.ssh/authorized_keys:7: advance:
'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HX=
O8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RC=
sdxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4=
mntF+A=3D=3D
root@vhost06.hamilton.harte-lyne.ca
'
debug1: /root/.ssh/authorized_keys:8: matching key found: ED25519
SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I
debug1: /root/.ssh/authorized_keys:8: key options: agent-forwarding
port-forwarding pty user-rc x11-forwarding
Accepted key ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I fou=
nd
at /root/.ssh/authorized_keys:8
debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 8/10
lines
debug3: mm_answer_keyallowed: publickey authentication: ED25519 key is allo=
wed
debug3: mm_request_send: entering, type 23
debug3: mm_sshkey_verify: entering [preauth]
debug3: mm_request_send: entering, type 24 [preauth]
debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth]
debug3: mm_request_receive_expect: entering, type 25 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 24
debug3: mm_answer_keyverify: publickey ED25519 signature using ssh-ed25519
verified
debug1: auth_activate_options: setting new authentication options
debug3: mm_request_send: entering, type 25
ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524
Failed publickey for root from 216.185.71.46 port 61524 ssh2: ED25519
SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I
debug1: auth_activate_options: setting new authentication options [preauth]
debug2: userauth_pubkey: authenticated 1 pkalg ssh-ed25519 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 2.955ms, delaying 4.310ms (reque=
sted
7.265ms) [preauth]
ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 [preauth]
debug3: mm_audit_event entering [preauth]
debug3: mm_request_send: entering, type 112 [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 112
debug3: mm_answer_audit_event entering
debug3: userauth_finish: failure partial=3D0 next
methods=3D"publickey,keyboard-interactive" [preauth]
debug3: send packet: type 51 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method
keyboard-interactive [preauth]
debug1: attempt 7 failures 3 [preauth]
debug2: input_userauth_request: try method keyboard-interactive [preauth]
debug1: keyboard-interactive devs  [preauth]
debug1: auth2_challenge: user=3Droot devs=3D [preauth]
debug1: kbdint_alloc: devices 'pam' [preauth]
debug2: auth2_challenge_start: devices pam [preauth]
debug2: kbdint_next_device: devices <empty> [preauth]
debug1: auth2_challenge_start: trying authentication method 'pam' [preauth]
debug3: mm_sshpam_init_ctx [preauth]
debug3: mm_request_send: entering, type 104 [preauth]
debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth]
debug3: mm_request_receive_expect: entering, type 105 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 104
debug3: mm_answer_pam_init_ctx
debug3: PAM: sshpam_init_ctx entering
debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0
debug3: mm_request_send: entering, type 105
debug2: monitor_read: 104 used once, disabling now
debug3: mm_sshpam_query [preauth]
debug3: mm_request_send: entering, type 106 [preauth]
debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth]
debug3: mm_request_receive_expect: entering, type 107 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 106
debug3: mm_answer_pam_query
debug3: PAM: sshpam_query entering
debug3: ssh_msg_recv entering
debug3: PAM: sshpam_thread_conv entering, 1 messages
debug3: Fssh_ssh_msg_send: type 1
debug3: ssh_msg_recv entering
debug3: mm_request_send: entering, type 107
debug3: mm_sshpam_query: pam_query returned 0 [preauth]
debug3: send packet: type 60 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 1.078ms, delaying 6.187ms (reque=
sted
7.265ms) [preauth]
Postponed keyboard-interactive for root from 216.185.71.46 port 61524 ssh2
[preauth]

debug3: receive packet: type 61 [preauth]
debug3: mm_sshpam_respond [preauth]
debug3: mm_request_send: entering, type 108 [preauth]
debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth]
debug3: mm_request_receive_expect: entering, type 109 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 108
debug3: mm_answer_pam_respond
debug2: PAM: sshpam_respond entering, 1 responses
debug3: Fssh_ssh_msg_send: type 6
debug3: mm_request_send: entering, type 109
debug2: monitor_read: 108 used once, disabling now
debug3: mm_sshpam_respond: pam_respond returned 1 [preauth]
debug3: mm_sshpam_query [preauth]
debug3: mm_request_send: entering, type 106 [preauth]
debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth]
debug3: mm_request_receive_expect: entering, type 107 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 106
debug3: mm_answer_pam_query
debug3: PAM: sshpam_query entering
debug3: ssh_msg_recv entering
debug3: Fssh_ssh_msg_send: type 9
debug3: PAM: Authentication error
PAM: Authentication error for root from vhost06.hamilton.harte-lyne.ca
debug3: mm_request_send: entering, type 107
debug3: mm_sshpam_query: pam_query returned -1 [preauth]
debug2: auth2_challenge_start: devices <empty> [preauth]
debug3: mm_sshpam_free_ctx [preauth]
debug3: mm_request_send: entering, type 110 [preauth]
debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth]
debug3: mm_request_receive_expect: entering, type 111 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 110
debug3: mm_answer_pam_free_ctx
debug3: PAM: sshpam_free_ctx entering
debug3: PAM: sshpam_thread_cleanup entering
debug3: mm_request_send: entering, type 111
debug2: monitor_read: 110 used once, disabling now
Failed keyboard-interactive/pam for root from 216.185.71.46 port 61524 ssh2
debug3: userauth_finish: failure partial=3D0 next
methods=3D"publickey,keyboard-interactive" [preauth]
debug3: send packet: type 51 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method
keyboard-interactive [preauth]
debug1: attempt 8 failures 4 [preauth]
debug2: input_userauth_request: try method keyboard-interactive [preauth]
debug1: keyboard-interactive devs  [preauth]
debug1: auth2_challenge: user=3Droot devs=3D [preauth]
debug1: kbdint_alloc: devices 'pam' [preauth]
debug2: auth2_challenge_start: devices pam [preauth]
debug2: kbdint_next_device: devices <empty> [preauth]
debug1: auth2_challenge_start: trying authentication method 'pam' [preauth]
debug3: mm_sshpam_init_ctx [preauth]
debug3: mm_request_send: entering, type 104 [preauth]
debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth]
debug3: mm_request_receive_expect: entering, type 105 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 104
debug3: mm_answer_pam_init_ctx
debug3: PAM: sshpam_init_ctx entering
debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0
debug3: mm_request_send: entering, type 105
debug2: monitor_read: 104 used once, disabling now
debug3: mm_sshpam_query [preauth]
debug3: mm_request_send: entering, type 106 [preauth]
debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth]
debug3: mm_request_receive_expect: entering, type 107 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 106
debug3: mm_answer_pam_query
debug3: PAM: sshpam_query entering
debug3: ssh_msg_recv entering
debug3: PAM: sshpam_thread_conv entering, 1 messages
debug3: Fssh_ssh_msg_send: type 1
debug3: ssh_msg_recv entering
debug3: mm_request_send: entering, type 107
debug3: mm_sshpam_query: pam_query returned 0 [preauth]
debug3: send packet: type 60 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 1.064ms, delaying 6.202ms (reque=
sted
7.265ms) [preauth]
Postponed keyboard-interactive for root from 216.185.71.46 port 61524 ssh2
[preauth]
debug3: receive packet: type 61 [preauth]
debug3: mm_sshpam_respond [preauth]
debug3: mm_request_send: entering, type 108 [preauth]
debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth]
debug3: mm_request_receive_expect: entering, type 109 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 108
debug3: mm_answer_pam_respond
debug2: PAM: sshpam_respond entering, 1 responses
debug3: Fssh_ssh_msg_send: type 6
debug3: mm_request_send: entering, type 109
debug2: monitor_read: 108 used once, disabling now
debug3: mm_sshpam_respond: pam_respond returned 1 [preauth]
debug3: mm_sshpam_query [preauth]
debug3: mm_request_send: entering, type 106 [preauth]
debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth]
debug3: mm_request_receive_expect: entering, type 107 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 106
debug3: mm_answer_pam_query
debug3: PAM: sshpam_query entering
debug3: ssh_msg_recv entering
debug3: Fssh_ssh_msg_send: type 9
debug3: PAM: Authentication error
PAM: Authentication error for root from vhost06.hamilton.harte-lyne.ca
debug3: mm_request_send: entering, type 107
debug3: mm_sshpam_query: pam_query returned -1 [preauth]
debug2: auth2_challenge_start: devices <empty> [preauth]
debug3: mm_sshpam_free_ctx [preauth]
debug3: mm_request_send: entering, type 110 [preauth]
debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth]
debug3: mm_request_receive_expect: entering, type 111 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 110
debug3: mm_answer_pam_free_ctx
debug3: PAM: sshpam_free_ctx entering
debug3: PAM: sshpam_thread_cleanup entering
debug3: mm_request_send: entering, type 111
debug2: monitor_read: 110 used once, disabling now
Failed keyboard-interactive/pam for root from 216.185.71.46 port 61524 ssh2
debug3: userauth_finish: failure partial=3D0 next
methods=3D"publickey,keyboard-interactive" [preauth]
debug3: send packet: type 51 [preauth]
debug3: receive packet: type 50 [preauth]
debug1: userauth-request for user root service ssh-connection method
keyboard-interactive [preauth]
debug1: attempt 9 failures 5 [preauth]
debug2: input_userauth_request: try method keyboard-interactive [preauth]
debug1: keyboard-interactive devs  [preauth]
debug1: auth2_challenge: user=3Droot devs=3D [preauth]
debug1: kbdint_alloc: devices 'pam' [preauth]
debug2: auth2_challenge_start: devices pam [preauth]
debug2: kbdint_next_device: devices <empty> [preauth]
debug1: auth2_challenge_start: trying authentication method 'pam' [preauth]
debug3: mm_sshpam_init_ctx [preauth]
debug3: mm_request_send: entering, type 104 [preauth]
debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth]
debug3: mm_request_receive_expect: entering, type 105 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 104
debug3: mm_answer_pam_init_ctx
debug3: PAM: sshpam_init_ctx entering
debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0
debug3: mm_request_send: entering, type 105
debug2: monitor_read: 104 used once, disabling now
debug3: mm_sshpam_query [preauth]
debug3: mm_request_send: entering, type 106 [preauth]
debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth]
debug3: mm_request_receive_expect: entering, type 107 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 106
debug3: mm_answer_pam_query
debug3: PAM: sshpam_query entering
debug3: ssh_msg_recv entering
debug3: PAM: sshpam_thread_conv entering, 1 messages
debug3: Fssh_ssh_msg_send: type 1
debug3: ssh_msg_recv entering
debug3: mm_request_send: entering, type 107
debug3: mm_sshpam_query: pam_query returned 0 [preauth]
debug3: send packet: type 60 [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 1.022ms, delaying 6.243ms (reque=
sted
7.265ms) [preauth]
Postponed keyboard-interactive for root from 216.185.71.46 port 61524 ssh2
[preauth]
debug3: receive packet: type 61 [preauth]
debug3: mm_sshpam_respond [preauth]
debug3: mm_request_send: entering, type 108 [preauth]
debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth]
debug3: mm_request_receive_expect: entering, type 109 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 108
debug3: mm_answer_pam_respond
debug2: PAM: sshpam_respond entering, 1 responses
debug3: Fssh_ssh_msg_send: type 6
debug3: mm_request_send: entering, type 109
debug2: monitor_read: 108 used once, disabling now
debug3: mm_sshpam_respond: pam_respond returned 1 [preauth]
debug3: mm_sshpam_query [preauth]
debug3: mm_request_send: entering, type 106 [preauth]
debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth]
debug3: mm_request_receive_expect: entering, type 107 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 106
debug3: mm_answer_pam_query
debug3: PAM: sshpam_query entering
debug3: ssh_msg_recv entering
debug3: Fssh_ssh_msg_send: type 9
debug3: PAM: Authentication error
PAM: Authentication error for root from vhost06.hamilton.harte-lyne.ca
debug3: mm_request_send: entering, type 107
debug3: mm_sshpam_query: pam_query returned -1 [preauth]
debug2: auth2_challenge_start: devices <empty> [preauth]
debug3: mm_sshpam_free_ctx [preauth]
debug3: mm_request_send: entering, type 110 [preauth]
debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth]
debug3: mm_request_receive_expect: entering, type 111 [preauth]
debug3: mm_request_receive: entering [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 110
debug3: mm_answer_pam_free_ctx
debug3: PAM: sshpam_free_ctx entering
debug3: PAM: sshpam_thread_cleanup entering
debug3: mm_request_send: entering, type 111
debug2: monitor_read: 110 used once, disabling now
Failed keyboard-interactive/pam for root from 216.185.71.46 port 61524 ssh2
debug3: mm_audit_event entering [preauth]
debug3: mm_request_send: entering, type 112 [preauth]
maximum authentication attempts exceeded for root from 216.185.71.46 port 6=
1524
ssh2 [preauth]
Disconnecting authenticating user root 216.185.71.46 port 61524: Too many
authentication failures [preauth]
debug3: send packet: type 1 [preauth]
debug3: mm_request_receive: entering
debug3: monitor_read: checking request 112
debug3: mm_answer_audit_event entering
debug1: do_cleanup [preauth]
debug3: PAM: sshpam_thread_cleanup entering [preauth]
debug3: mm_request_receive: entering
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering
debug1: Killing privsep child 24923

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-270668-227-iHgCTOBZ4B>