Bugzilla – Attachment 1265 Details for
Bug 1308
pam handling change breaks pam_abl module
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
syslog output from sshd and pam_abl
debug-log.txt (text/plain), 3.56 KB, created by
Andy Feldt
on 2007-04-21 05:29:20 AEST
(
hide
)
Description:
syslog output from sshd and pam_abl
Filename:
MIME Type:
Creator:
Andy Feldt
Created:
2007-04-21 05:29:20 AEST
Size:
3.56 KB
patch
obsolete
>Apr 18 13:28:10 phyast sshd[11336]: [ID 800047 auth.info] Invalid user oogah from 129.15.30.51 >Apr 18 13:28:10 phyast sshd[11336]: [ID 800047 auth.info] Failed none for invalid user oogah from 129.15.30.51 port 35103 ssh2 >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_db=/var/lib/abl/hosts.db >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_purge=3d >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_rule=*:10/1h,20/2d >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_db=/var/lib/abl/users.db >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_purge=3d >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_rule=!root:10/1h,30/1d >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 147637 auth.debug] Checking host frodo.nhn.ou.edu >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 728694 auth.debug] Checking user oogah >Apr 18 13:28:12 phyast sshd[11336]: [ID 219349 auth.debug] pam_unix_auth: user oogah not found >Apr 18 13:28:12 phyast sshd[11336]: [ID 800047 auth.info] Failed password for invalid user oogah from 129.15.30.51 port 35103 ssh2 >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_db=/var/lib/abl/hosts.db >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_purge=3d >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_rule=*:10/1h,20/2d >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_db=/var/lib/abl/users.db >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_purge=3d >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_rule=!root:10/1h,30/1d >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 600377 auth.debug] In cleanup, err is 00000000 >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 147637 auth.debug] Checking host frodo.nhn.ou.edu >Apr 18 13:28:12 phyast pam_abl[11336]: [ID 728694 auth.debug] Checking user oogah >Apr 18 13:28:12 phyast sshd[11336]: [ID 219349 auth.debug] pam_unix_auth: user oogah not found >Apr 18 13:28:12 phyast sshd[11336]: [ID 800047 auth.info] Failed password for invalid user oogah from 129.15.30.51 port 35103 ssh2 >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_db=/var/lib/abl/hosts.db >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_purge=3d >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: host_rule=*:10/1h,20/2d >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_db=/var/lib/abl/users.db >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_purge=3d >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 801593 auth.debug] /etc/security/pam_abl.conf: user_rule=!root:10/1h,30/1d >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 600377 auth.debug] In cleanup, err is 00000000 >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 147637 auth.debug] Checking host frodo.nhn.ou.edu >Apr 18 13:28:13 phyast pam_abl[11336]: [ID 728694 auth.debug] Checking user oogah >Apr 18 13:28:13 phyast sshd[11336]: [ID 219349 auth.debug] pam_unix_auth: user oogah not found >Apr 18 13:28:13 phyast sshd[11336]: [ID 800047 auth.info] Failed password for invalid user oogah from 129.15.30.51 port 35103 ssh2
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1308
: 1265 |
1312
|
1314