From nobody Thu Apr 06 16:57:09 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PsnjL3NRZz44ZrB for ; Thu, 6 Apr 2023 16:57:10 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PsnjK74wBz46wH for ; Thu, 6 Apr 2023 16:57:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1680800230; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=/KI7eBa8h+8EAcoLRv4SsZsmwJTAtovSh3ZaASgvfms=; b=vHbEXnauqvf3FdYCm3gbSrslqJRVpQVAPJOUqHIzMWk8HK2ydp4hLHvY43eo/TLm40Z8/B 6OxBcB5Mrtj87bnkEmBVGL7gg5NIUaUnKyKDebc1cYZM/9J0r7BVBkW0GgW1QhEVdLU65s lFPEic7NTl/dwOoNo9JrBVLAxoGmDT8iQezEqKnuxak7/mmmSP/lFFgCaRWv1yY/oytbVo qZtDd1H0HbQMUF86RouZq3YVxVOnbEBtUMxf+77Y+Dd+PrfJ8J9do149UsBs4vD7gXMvyP OExtGHWAaMbbFubBwkfuUAelf30BobVzH7JFS4YqUv8ofBjlcZucexf+P9wOtQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1680800230; a=rsa-sha256; cv=none; b=scXd48v7VvsBHri4k24/2eF/VjRCzwX7loYuhHlNIFGVH4grSl6r695r3p6bli8yU4A6PL NFqt5IWYOS9aCHdKFk+zs+SDQJqmnSUWF0kTDF5fWH1RQb2ysYniCWx8R3Wj0MI73y+PSx WlhGxj+KuFpIZuW3t6ObeqJlOoBabC3SDoJDOf370XqwcUBsTjbWo5OKfEnfcJcVGu2M9o DKoMsEumK+dEctQsUssrP8sYNUImaTitkpNYLB1/96cBzPCLjHkm1C0QCavl6JWjSFmL+h XacE5Rubco/s3yeVczJxFV/hiqw/Jg1yVzs1wkABRr15QoJ2R0wweQUZfUbWnA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4PsnjK69Nvz1BQb for ; Thu, 6 Apr 2023 16:57:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 336Gv9VT084885 for ; Thu, 6 Apr 2023 16:57:09 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 336Gv9F6084884 for bugs@FreeBSD.org; Thu, 6 Apr 2023 16:57:09 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 270668] ssh logons via public key fail after target upgraded to FreeBSD-12.4-p2 Date: Thu, 06 Apr 2023 16:57:09 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bin X-Bugzilla-Version: 12.4-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: byrnejb@harte-lyne.ca X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270668 --- Comment #1 from James B. Byrne --- This is what /usr/sbin/sshd -ddd show when processing a connection from the remote client: # /usr/sbin/sshd -ddd debug2: load_server_config: filename /etc/ssh/sshd_config debug2: load_server_config: done config len =3D 3505 debug2: parse_server_config_depth: config /etc/ssh/sshd_config len 3505 debug3: /etc/ssh/sshd_config:45 setting AuthorizedKeysFile .ssh/authorized_= keys debug3: /etc/ssh/sshd_config:115 setting Subsystem sftp /usr/libexec/sftp-server debug3: /etc/ssh/sshd_config:125 setting PubkeyAcceptedAlgorithms +ssh-rsa debug1: sshd version OpenSSH_9.1, OpenSSL 1.1.1q-freebsd 5 Jul 2022 debug1: private host key #0: ssh-rsa SHA256:Vou63TmF8OcESVytHOhjBB9FQp4tftAJvifYnok8PSw debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:uhLYoQx7y7OwGyPsjpbQrb1a0tgunmIlr8MhTPK8GAA debug1: private host key #2: ssh-ed25519 SHA256:q2N77sbjHlZ35RzCZCCP1+V/yqiVzS56oFhH4UzX0zk debug1: rexec_argv[0]=3D'/usr/sbin/sshd' debug1: rexec_argv[1]=3D'-ddd' debug2: fd 3 setting O_NONBLOCK debug3: Fssh_sock_set_v6only: set socket 3 IPV6_V6ONLY debug1: Bind to port 22 on ::. Server listening on :: port 22. debug2: fd 4 setting O_NONBLOCK debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. debug1: fd 5 clearing O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd =3D 8 config len 3505 debug3: Fssh_ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 debug3: recv_rexec_state: entering fd =3D 5 debug3: ssh_msg_recv entering debug3: recv_rexec_state: done debug2: parse_server_config_depth: config rexec len 3505 debug3: rexec:45 setting AuthorizedKeysFile .ssh/authorized_keys debug3: rexec:115 setting Subsystem sftp /usr/libexec/sftp-server debug3: rexec:125 setting PubkeyAcceptedAlgorithms +ssh-rsa debug1: sshd version OpenSSH_9.1, OpenSSL 1.1.1q-freebsd 5 Jul 2022 debug1: private host key #0: ssh-rsa SHA256:Vou63TmF8OcESVytHOhjBB9FQp4tftAJvifYnok8PSw debug1: private host key #1: ecdsa-sha2-nistp256 SHA256:uhLYoQx7y7OwGyPsjpbQrb1a0tgunmIlr8MhTPK8GAA debug1: private host key #2: ssh-ed25519 SHA256:q2N77sbjHlZ35RzCZCCP1+V/yqiVzS56oFhH4UzX0zk debug1: inetd sockets after dupping: 3, 3 debug1: res_init() debug3: Trying to reverse map address 216.185.71.46. Connection from 216.185.71.46 port 61524 on 216.185.71.41 port 22 debug1: Local version string SSH-2.0-OpenSSH_9.1 FreeBSD-20221019 debug1: Remote protocol version 2.0, remote software version OpenSSH_8.8 FreeBSD-20211221 debug1: Fssh_compat_banner: match: OpenSSH_8.8 FreeBSD-20211221 pat OpenSSH* compat 0x04000000 debug2: fd 3 setting O_NONBLOCK debug3: ssh_sandbox_init: preparing capsicum sandbox debug2: Network child is on pid 24923 debug3: preauth child monitor started debug3: privsep user:group 22:22 [preauth] debug1: permanently_set_uid: 22/22 [preauth] debug1: list_hostkey_types: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] debug3: send packet: type 20 [preauth] debug1: SSH2_MSG_KEXINIT sent [preauth] debug3: receive packet: type 20 [preauth] debug1: SSH2_MSG_KEXINIT received [preauth] debug2: local server KEXINIT proposal [preauth] debug2: KEX algorithms: sntrup761x25519-sha512@openssh.com,curve25519-sha256,curve25519-sha256@libs= sh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hell= man-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-grou= p18-sha512,diffie-hellman-group14-sha256 [preauth] debug2: host key algorithms: rsa-sha2-512,rsa-sha2-256,ssh-rsa,ecdsa-sha2-nistp256,ssh-ed25519 [preauth] debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@o= penssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc [preauth] debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@o= penssh.com,aes256-gcm@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc [preauth] debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.= com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh= .com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.= com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh= .com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: compression ctos: none,zlib@openssh.com [preauth] debug2: compression stoc: none,zlib@openssh.com [preauth] debug2: languages ctos: [preauth] debug2: languages stoc: [preauth] debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug2: peer client KEXINIT proposal [preauth] debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2= -nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-he= llman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-s= ha256,ext-info-c [preauth] debug2: host key algorithms: ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,e= cdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openss= h.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@o= penssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.= com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2= -nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nist= p256@openssh.com,rsa-sha2-512,rsa-sha2-256,ssh-rsa [preauth] debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@o= penssh.com,aes256-gcm@openssh.com [preauth] debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@o= penssh.com,aes256-gcm@openssh.com [preauth] debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.= com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh= .com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.= com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh= .com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1 [preauth] debug2: compression ctos: none,zlib@openssh.com,zlib [preauth] debug2: compression stoc: none,zlib@openssh.com,zlib [preauth] debug2: languages ctos: [preauth] debug2: languages stoc: [preauth] debug2: first_kex_follows 0 [preauth] debug2: reserved 0 [preauth] debug1: kex: algorithm: curve25519-sha256 [preauth] debug1: kex: host key algorithm: ssh-ed25519 [preauth] debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: compression: none [preauth] debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: compression: none [preauth] debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] debug3: receive packet: type 30 [preauth] debug1: SSH2_MSG_KEX_ECDH_INIT received [preauth] debug3: Fssh_mm_sshkey_sign: entering [preauth] debug3: mm_request_send: entering, type 6 [preauth] debug3: Fssh_mm_sshkey_sign: waiting for MONITOR_ANS_SIGN [preauth] debug3: mm_request_receive_expect: entering, type 7 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 6 debug3: mm_answer_sign: entering debug3: mm_answer_sign: ssh-ed25519 KEX signature len=3D83 debug3: mm_request_send: entering, type 7 debug2: monitor_read: 6 used once, disabling now debug3: send packet: type 31 [preauth] debug3: send packet: type 21 [preauth] debug2: Fssh_ssh_set_newkeys: mode 1 [preauth] debug1: rekey out after 134217728 blocks [preauth] debug1: SSH2_MSG_NEWKEYS sent [preauth] debug1: Sending SSH2_MSG_EXT_INFO [preauth] debug3: send packet: type 7 [preauth] debug1: expecting SSH2_MSG_NEWKEYS [preauth] debug3: receive packet: type 21 [preauth] debug1: SSH2_MSG_NEWKEYS received [preauth] debug2: Fssh_ssh_set_newkeys: mode 0 [preauth] debug1: rekey in after 134217728 blocks [preauth] debug1: KEX done [preauth] debug3: receive packet: type 5 [preauth] debug3: send packet: type 6 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method none [preauth] debug1: attempt 0 failures 0 [preauth] debug3: mm_getpwnamallow: entering [preauth] debug3: mm_request_send: entering, type 8 [preauth] debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM [preauth] debug3: mm_request_receive_expect: entering, type 9 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 8 debug3: mm_answer_pwnamallow: entering debug2: parse_server_config_depth: config reprocess config len 3505 debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 debug3: mm_request_send: entering, type 9 debug2: monitor_read: 8 used once, disabling now debug2: input_userauth_request: setting up authctxt for root [preauth] debug3: mm_start_pam entering [preauth] debug3: mm_request_send: entering, type 100 [preauth] debug3: mm_inform_authserv: entering [preauth] debug3: mm_request_send: entering, type 4 [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 100 debug1: PAM: initializing for "root" debug1: PAM: setting PAM_RHOST to "vhost06.hamilton.harte-lyne.ca" debug2: monitor_read: 100 used once, disabling now debug2: input_userauth_request: try method none [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 1.865ms, delaying 5.400ms (reque= sted 7.265ms) [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 4 debug3: mm_answer_authserv: service=3Dssh-connection, style=3D debug2: monitor_read: 4 used once, disabling now debug3: userauth_finish: failure partial=3D0 next methods=3D"publickey,keyboard-interactive" [preauth] debug3: send packet: type 51 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method public= key [preauth] debug1: attempt 1 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] debug2: userauth_pubkey: valid user root querying public key rsa-sha2-512 AAAAB3NzaC1yc2EAAAADAQABAAACAQC4QKE6CFf8a4zLX1SWVdONeYUorRRtCk8v+vJZ1VK/c6d= DEQLqUlLEftva+Ci4nQcrS9WtrSykTPe/4xXsvj20ObaQ/wl0HfEYJVZgN1/fnWLDohbkOlcvHo= nFbGQwFunKCXFn2C2/2cf+e9B1LRj91ScJpKZqJdgoWTYzKCuj3f1roHATOk8QCO5SD//1O+hnf= Koto+BIROSmqQebVFm1qo8193VqezMHTtBF+5Hkp2PsvBx5bbWpGznMxSUmlrl9YxgIcjnu9HDm= 7W9NZxQEMsePhX1mO64cSbjl/D4rJqZOg3J0R9T6sPbaPHYgtCFCmF5l+6cDet4MFqxsdYXoikF= JdnOpI+V6Pk355QCpPNzF/KnRq9Ia9CjRe5ThPwVPkPQU+8djQ+79UJk5TM1AzapbqmXIzLuhZO= SYnrAnXMYDkl7Q5lXYC9pYu0AVn4NlDkJmlcnIVG5fmn5ervjJa7AnWeWmsNYlghmTLKmgbE8Fs= 5ZLV+2yG1JiMHYtIFdZNEVbniZnBUgNbJsjYdNqqIGAsz7CQTvz1dqO5wHAET7PZEQ+b9MD2T9i= +iWzE5ONVfDUxM5gWTyb3y6H2AVhyIo7Jmaib9cyv8XOHoLhPegw9l0T2yQAzDcViJA6nWWlvBG= OhX0M5Iuo4pEJ20Me3h1/eErJYsuMzdd7q5O3Iw=3D=3D [preauth] debug1: userauth_pubkey: publickey test pkalg rsa-sha2-512 pkblob RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE [preauth] debug3: mm_key_allowed: entering [preauth] debug3: mm_request_send: entering, type 22 [preauth] debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] debug3: mm_request_receive_expect: entering, type 23 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 22 debug3: mm_answer_keyallowed: entering debug1: trying public key file /root/.ssh/authorized_keys debug1: fd 4 clearing O_NONBLOCK debug2: /root/.ssh/authorized_keys:1: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+Lc= Xh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjYw= a+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Usd= 4HKzA=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+L= cXh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjY= wa+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Us= d4HKzA=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97 root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97 root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:4: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPHS= h7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20JU= OCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoCw= cEnGw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:4: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPH= Sh7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20J= UOCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoC= wcEnGw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:7: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO= 8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs= dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m= ntF+A=3D=3D root@vhost06.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HX= O8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RC= sdxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4= mntF+A=3D=3D root@vhost06.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:8: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q root@vhost06.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:8: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q root@vhost06.hamilton.harte-lyne.ca ' debug1: /root/.ssh/authorized_keys:9: matching key found: RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE debug1: /root/.ssh/authorized_keys:9: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding Accepted key RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE found at /root/.ssh/authorized_keys:9 debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 9/10 lines debug3: mm_answer_keyallowed: publickey authentication test: RSA key is all= owed debug3: mm_request_send: entering, type 23 debug3: send packet: type 60 [preauth] debug2: userauth_pubkey: authenticated 0 pkalg rsa-sha2-512 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 0.889ms, delaying 6.376ms (reque= sted 7.265ms) [preauth] Postponed publickey for root from 216.185.71.46 port 61524 ssh2 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method public= key [preauth] debug1: attempt 2 failures 0 [preauth] debug2: input_userauth_request: try method publickey [preauth] debug2: userauth_pubkey: valid user root attempting public key rsa-sha2-512 AAAAB3NzaC1yc2EAAAADAQABAAACAQC4QKE6CFf8a4zLX1SWVdONeYUorRRtCk8v+vJZ1VK/c6d= DEQLqUlLEftva+Ci4nQcrS9WtrSykTPe/4xXsvj20ObaQ/wl0HfEYJVZgN1/fnWLDohbkOlcvHo= nFbGQwFunKCXFn2C2/2cf+e9B1LRj91ScJpKZqJdgoWTYzKCuj3f1roHATOk8QCO5SD//1O+hnf= Koto+BIROSmqQebVFm1qo8193VqezMHTtBF+5Hkp2PsvBx5bbWpGznMxSUmlrl9YxgIcjnu9HDm= 7W9NZxQEMsePhX1mO64cSbjl/D4rJqZOg3J0R9T6sPbaPHYgtCFCmF5l+6cDet4MFqxsdYXoikF= JdnOpI+V6Pk355QCpPNzF/KnRq9Ia9CjRe5ThPwVPkPQU+8djQ+79UJk5TM1AzapbqmXIzLuhZO= SYnrAnXMYDkl7Q5lXYC9pYu0AVn4NlDkJmlcnIVG5fmn5ervjJa7AnWeWmsNYlghmTLKmgbE8Fs= 5ZLV+2yG1JiMHYtIFdZNEVbniZnBUgNbJsjYdNqqIGAsz7CQTvz1dqO5wHAET7PZEQ+b9MD2T9i= +iWzE5ONVfDUxM5gWTyb3y6H2AVhyIo7Jmaib9cyv8XOHoLhPegw9l0T2yQAzDcViJA6nWWlvBG= OhX0M5Iuo4pEJ20Me3h1/eErJYsuMzdd7q5O3Iw=3D=3D [preauth] debug3: userauth_pubkey: publickey have rsa-sha2-512 signature for RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE [preauth] debug3: mm_key_allowed: entering [preauth] debug3: mm_request_send: entering, type 22 [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 22 debug3: mm_answer_keyallowed: entering debug1: trying public key file /root/.ssh/authorized_keys debug1: fd 4 clearing O_NONBLOCK debug2: /root/.ssh/authorized_keys:1: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+Lc= Xh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjYw= a+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Usd= 4HKzA=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+L= cXh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjY= wa+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Us= d4HKzA=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97 root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97 root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:4: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPHS= h7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20JU= OCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoCw= cEnGw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:4: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPH= Sh7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20J= UOCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoC= wcEnGw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:7: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO= 8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs= dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m= ntF+A=3D=3D root@vhost06.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HX= O8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RC= sdxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4= mntF+A=3D=3D root@vhost06.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:8: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q root@vhost06.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:8: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q root@vhost06.hamilton.harte-lyne.ca ' debug1: /root/.ssh/authorized_keys:9: matching key found: RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE debug1: /root/.ssh/authorized_keys:9: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding Accepted key RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE found at /root/.ssh/authorized_keys:9 debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 9/10 lines debug3: mm_answer_keyallowed: publickey authentication: RSA key is allowed debug3: mm_request_send: entering, type 23 debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] debug3: mm_request_receive_expect: entering, type 23 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_sshkey_verify: entering [preauth] debug3: mm_request_send: entering, type 24 [preauth] debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth] debug3: mm_request_receive_expect: entering, type 25 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 24 debug3: mm_answer_keyverify: publickey RSA signature using rsa-sha2-512 verified debug1: auth_activate_options: setting new authentication options debug3: mm_request_send: entering, type 25 ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 Failed publickey for root from 216.185.71.46 port 61524 ssh2: RSA SHA256:14qSPzqINY1ejGYgNGlkSMtVVBtek36Q/CrsM07+pgE debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg rsa-sha2-512 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 0.957ms, delaying 6.308ms (reque= sted 7.265ms) [preauth] ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 [preauth] debug3: mm_audit_event entering [preauth] debug3: mm_request_send: entering, type 112 [preauth] debug3: userauth_finish: failure partial=3D0 next methods=3D"publickey,keyboard-interactive" [preauth] debug3: send packet: type 51 [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 112 debug3: mm_answer_audit_event entering debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method public= key [preauth] debug1: attempt 3 failures 1 [preauth] debug2: input_userauth_request: try method publickey [preauth] debug2: userauth_pubkey: valid user root querying public key ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO= 8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs= dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m= ntF+A=3D=3D [preauth] debug1: userauth_pubkey: publickey test pkalg ecdsa-sha2-nistp521 pkblob EC= DSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 [preauth] debug3: mm_key_allowed: entering [preauth] debug3: mm_request_send: entering, type 22 [preauth] debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] debug3: mm_request_receive_expect: entering, type 23 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 22 debug3: mm_answer_keyallowed: entering debug1: trying public key file /root/.ssh/authorized_keys debug1: fd 4 clearing O_NONBLOCK debug2: /root/.ssh/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97 root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97 root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5q= 8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkFe= 98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb5= vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYtl= gbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD/= 1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkln= h4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/+= Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAGf= Dh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8B= 3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5= q8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkF= e98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb= 5vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYt= lgbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD= /1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkl= nh4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/= +Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAG= fDh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8= B3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jPE= dLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1UyqdR= U4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG5= SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZgL= TSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79lM= /PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDga= 7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4D= dlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/FpjE= bcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+k= QNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jP= EdLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1Uyqd= RU4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG= 5SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZg= LTSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79l= M/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDg= a7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4= DdlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/Fpj= EbcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+= kQNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug1: /root/.ssh/authorized_keys:7: matching key found: ECDSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 debug1: /root/.ssh/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding Accepted key ECDSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 found= at /root/.ssh/authorized_keys:7 debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 7/10 lines debug3: mm_answer_keyallowed: publickey authentication test: ECDSA key is allowed debug3: mm_request_send: entering, type 23 debug3: send packet: type 60 [preauth] debug2: userauth_pubkey: authenticated 0 pkalg ecdsa-sha2-nistp521 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 19.304ms, delaying 9.757ms (requested 7.265ms) [preauth] Postponed publickey for root from 216.185.71.46 port 61524 ssh2 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method public= key [preauth] debug1: attempt 4 failures 1 [preauth] debug2: input_userauth_request: try method publickey [preauth] debug2: userauth_pubkey: valid user root attempting public key ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO= 8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs= dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m= ntF+A=3D=3D [preauth] debug3: userauth_pubkey: publickey have ecdsa-sha2-nistp521 signature for E= CDSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 [preauth] debug3: mm_key_allowed: entering [preauth] debug3: mm_request_send: entering, type 22 [preauth] debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] debug3: mm_request_receive_expect: entering, type 23 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 22 debug3: mm_answer_keyallowed: entering debug1: trying public key file /root/.ssh/authorized_keys debug1: fd 4 clearing O_NONBLOCK debug2: /root/.ssh/authorized_keys:2: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97 root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:2: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIN5UqZl/tNlT11fvRsAXoIKjQX/uqGeeE7xpIP9utH97 root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5q= 8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkFe= 98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb5= vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYtl= gbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD/= 1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkln= h4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/+= Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAGf= Dh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8B= 3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5= q8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkF= e98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb= 5vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYt= lgbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD= /1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkl= nh4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/= +Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAG= fDh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8= B3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:5: check options: 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:5: advance: 'AAAAC3NzaC1lZDI1NTE5AAAAIHsNWZRDGuTAJLWaCNR898KAkdpm6b9YC/bm1MIBaBUP root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jPE= dLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1UyqdR= U4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG5= SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZgL= TSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79lM= /PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDga= 7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4D= dlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/FpjE= bcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+k= QNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jP= EdLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1Uyqd= RU4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG= 5SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZg= LTSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79l= M/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDg= a7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4= DdlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/Fpj= EbcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+= kQNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug1: /root/.ssh/authorized_keys:7: matching key found: ECDSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 debug1: /root/.ssh/authorized_keys:7: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding Accepted key ECDSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 found= at /root/.ssh/authorized_keys:7 debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 7/10 lines debug3: mm_answer_keyallowed: publickey authentication: ECDSA key is allowed debug3: mm_request_send: entering, type 23 debug3: mm_sshkey_verify: entering [preauth] debug3: mm_request_send: entering, type 24 [preauth] debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth] debug3: mm_request_receive_expect: entering, type 25 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 24 debug3: mm_answer_keyverify: publickey ECDSA signature using ecdsa-sha2-nistp521 verified debug1: auth_activate_options: setting new authentication options debug3: mm_request_send: entering, type 25 ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 Failed publickey for root from 216.185.71.46 port 61524 ssh2: ECDSA SHA256:9+DpY9vFXemvVeyR5JYVR+HKc2u9t+5I7J0YM0Jw5W8 debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ecdsa-sha2-nistp521 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 26.420ms, delaying 2.641ms (requested 7.265ms) [preauth] ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 [preauth] debug3: mm_audit_event entering [preauth] debug3: mm_request_send: entering, type 112 [preauth] debug3: userauth_finish: failure partial=3D0 next methods=3D"publickey,keyboard-interactive" [preauth] debug3: send packet: type 51 [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 112 debug3: mm_answer_audit_event entering debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method public= key [preauth] debug1: attempt 5 failures 2 [preauth] debug2: input_userauth_request: try method publickey [preauth] debug2: userauth_pubkey: valid user root querying public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q [preau= th] debug1: userauth_pubkey: publickey test pkalg ssh-ed25519 pkblob ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I [preauth] debug3: mm_key_allowed: entering [preauth] debug3: mm_request_send: entering, type 22 [preauth] debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] debug3: mm_request_receive_expect: entering, type 23 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 22 debug3: mm_answer_keyallowed: entering debug1: trying public key file /root/.ssh/authorized_keys debug1: fd 4 clearing O_NONBLOCK debug2: /root/.ssh/authorized_keys:1: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+Lc= Xh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjYw= a+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Usd= 4HKzA=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+L= cXh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjY= wa+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Us= d4HKzA=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5q= 8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkFe= 98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb5= vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYtl= gbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD/= 1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkln= h4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/+= Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAGf= Dh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8B= 3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5= q8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkF= e98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb= 5vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYt= lgbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD= /1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkl= nh4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/= +Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAG= fDh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8= B3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:4: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPHS= h7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20JU= OCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoCw= cEnGw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:4: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPH= Sh7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20J= UOCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoC= wcEnGw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jPE= dLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1UyqdR= U4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG5= SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZgL= TSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79lM= /PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDga= 7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4D= dlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/FpjE= bcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+k= QNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jP= EdLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1Uyqd= RU4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG= 5SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZg= LTSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79l= M/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDg= a7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4= DdlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/Fpj= EbcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+= kQNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:7: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO= 8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs= dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m= ntF+A=3D=3D root@vhost06.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HX= O8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RC= sdxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4= mntF+A=3D=3D root@vhost06.hamilton.harte-lyne.ca ' debug1: /root/.ssh/authorized_keys:8: matching key found: ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I debug1: /root/.ssh/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding Accepted key ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I fou= nd at /root/.ssh/authorized_keys:8 debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 8/10 lines debug3: mm_answer_keyallowed: publickey authentication test: ED25519 key is allowed debug3: mm_request_send: entering, type 23 debug3: send packet: type 60 [preauth] debug2: userauth_pubkey: authenticated 0 pkalg ssh-ed25519 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 0.379ms, delaying 6.887ms (reque= sted 7.265ms) [preauth] Postponed publickey for root from 216.185.71.46 port 61524 ssh2 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method public= key [preauth] debug1: attempt 6 failures 2 [preauth] debug2: input_userauth_request: try method publickey [preauth] debug2: userauth_pubkey: valid user root attempting public key ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDGSn1NXk7Cd8v7sNH5IqF2XJkHykW5VJbgfd0O/fp/Q [preau= th] debug3: userauth_pubkey: publickey have ssh-ed25519 signature for ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I [preauth] debug3: mm_key_allowed: entering [preauth] debug3: mm_request_send: entering, type 22 [preauth] debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED [preauth] debug3: mm_request_receive_expect: entering, type 23 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 22 debug3: mm_answer_keyallowed: entering debug1: trying public key file /root/.ssh/authorized_keys debug1: fd 4 clearing O_NONBLOCK debug2: /root/.ssh/authorized_keys:1: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+Lc= Xh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjYw= a+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Usd= 4HKzA=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:1: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFiAx87EJcnUzSM3470+L= cXh+8SrFgugygvrtRqM5Kk0iyTx/LpEDRpfpZZMr5ynXx5dNYSjAvWxzfJKmEhW/pDuQCCDbkjY= wa+w30ae3tKtAEnn0DpgpaYbgiHsn0PJ7D2V8SyeZ4StigpLLlvzdi+rcBPxmvd5aQjsZPui7Us= d4HKzA=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:3: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5q= 8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkFe= 98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb5= vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYtl= gbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD/= 1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkln= h4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/+= Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAGf= Dh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8B= 3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:3: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAACAQDDRJCwwrshOYPi/Tezddh9u2huNpf+mJsBSyE3Mdkib5= q8mlXF2IIrQk5jNQNVDs5lH+O3hhvr7ZG5z2YJT16mk7fj2b4gUqnfQKQoDoYtgOhIhHBkOQRkF= e98oHW2dcZdagaaRJ5CfpNSjszOEj+wZxLefw695sz57UDAy9/fEi3KFSJAzfQD+n64QYvRyeWb= 5vIasklvdcZhduZKOiuxrztu8b1ezY2UAm9QF/vaAlM5yw0F/qaCKflwJTph8xt3S9i9h+dvHYt= lgbjQCNKFVwhqG/jUoclAH1FXNgPHa5FF3YtXpOFO8AEEjtEYH2J7OeSIFabWxENQmwxnjdn9yD= /1r2BhHsS2HwZXnDNMlFv31bUCAOX5mrP+OLg6UytNtw2Y0C91/P7VHNsG2oeO0ApopMJNKeHkl= nh4HTEyLZNqm0BeJaROsxpCzh1dfbfdbtPgiI4GpdeBvrAt1ZxIVvoB+Wd69wZQpX/yGA8wufC/= +Kuir8WcWRKc5epTNo9vXFccGdl87zHgOqC1yGycWsQWV6JOupO0LXRi3d8V6o/OgCwCX57wfAG= fDh2iYvmG3Yg/Fq7FM42NVjEeip3YTjCvXM9D1nOsjqGCwz0LdgAnSrRdXZTyII7//U/gAYQtS8= B3QRCv7Ab1p9dsxA/9vKDt50cVVmt3ISAvFcXcPQ=3D=3D root@vhost01.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:4: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPHS= h7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20JU= OCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoCw= cEnGw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:4: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAPz5SFKWYei6QGB85LPH= Sh7pt96mO9NFZ0MCfSia41K4BI/lMnYc8h5DPrL4lKR1kMtciKkt/BY44DZk8WWfICAwDmQS20J= UOCbm5zm4lFMLm/7gxAQIsFE5S9PxoN1AfjBWxepE0FyBL253GjDaUQQSLNBrjqOxrzhNpeVFoC= wcEnGw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:6: check options: 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jPE= dLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1UyqdR= U4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG5= SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZgL= TSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79lM= /PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDga= 7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4D= dlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/FpjE= bcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+k= QNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:6: advance: 'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsZ5tfg21sszf9F0kMELbqHRwOMDbLYd1zMBi/WmT1jP= EdLDWoWOJNdQPtE2YfApdMN7CzZqfxmUQdCJbhhm8tc+FxdgHfZbNTBJ57kOuTyAnDTBrn1Uyqd= RU4TPX429y/80bQq9yU0vyxAt/t2XHnwZfJKWVILzU9AlXmj8tandssCWfiwUXU2x3rrcApBDKG= 5SK5NETTXgCo6Wb3P80CFW7wasg3UyUa4C3P9sRwn3XjSfaa23bgjBPS6CyTdcYgj2qzIXb8HZg= LTSACMjTFbKOaRXRPNgz9mK6np1PSSP+HQ0EzpDEFwV8fti/ZyZACy5hWAX21GGZ7C2wiv9M79l= M/PzZuGMRQQywgRs8nWkscMCQbOxfFTMvJ/oioDhZnWP/7fGaQwXCKQBXc8/wTFggrB8w0zEvDg= a7RhJ8DoSChoPk26bUcwXvNlFpNgG1G9wiSr2LPp0E1+df6cXIJ+6jK8ULiizzFVmlNY0AZ14n4= DdlJNhcsPXk2PhHRNluqaX2hHhnzYNMEa7Jt+z5nwA2YU4qjMfj7UMZFwWumT1NzGZ92yza/Fpj= EbcLuSvgIKhcpHS6SYZpp3CMgUiDvpMDEN5fkHuXpP9wXr2oE6Svu05UEpE01fEmYjiBe+TsBz+= kQNq1Wh9g5bgCEqttzQt643zneSv/22V3X0nZSqw=3D=3D root@vhost05.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:7: check options: 'ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HXO= 8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RCs= dxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4m= ntF+A=3D=3D root@vhost06.hamilton.harte-lyne.ca ' debug2: /root/.ssh/authorized_keys:7: advance: 'AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAEitTl3Jyi7wB9gSvF1HX= O8t64eSdocZPjDpCmnKBKa5gCuAKARw6TjyySGldEvDoAJQ6fI3bhN4S+0+LT7Ar+lvgGNWz2RC= sdxjOuel/YANIvS66u60UOJS1rctK3bKIAIv8cnyMxgsHXkkyfrqrEuF0Cc4Hhu02fEUrqQgGh4= mntF+A=3D=3D root@vhost06.hamilton.harte-lyne.ca ' debug1: /root/.ssh/authorized_keys:8: matching key found: ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I debug1: /root/.ssh/authorized_keys:8: key options: agent-forwarding port-forwarding pty user-rc x11-forwarding Accepted key ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I fou= nd at /root/.ssh/authorized_keys:8 debug2: auth_check_authkeys_file: /root/.ssh/authorized_keys: processed 8/10 lines debug3: mm_answer_keyallowed: publickey authentication: ED25519 key is allo= wed debug3: mm_request_send: entering, type 23 debug3: mm_sshkey_verify: entering [preauth] debug3: mm_request_send: entering, type 24 [preauth] debug3: mm_sshkey_verify: waiting for MONITOR_ANS_KEYVERIFY [preauth] debug3: mm_request_receive_expect: entering, type 25 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 24 debug3: mm_answer_keyverify: publickey ED25519 signature using ssh-ed25519 verified debug1: auth_activate_options: setting new authentication options debug3: mm_request_send: entering, type 25 ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 Failed publickey for root from 216.185.71.46 port 61524 ssh2: ED25519 SHA256:rg5CuR8qHh6U/SR1cUh/qWqof5TVXM4Ew1f1Fi/R20I debug1: auth_activate_options: setting new authentication options [preauth] debug2: userauth_pubkey: authenticated 1 pkalg ssh-ed25519 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 2.955ms, delaying 4.310ms (reque= sted 7.265ms) [preauth] ROOT LOGIN REFUSED FROM 216.185.71.46 port 61524 [preauth] debug3: mm_audit_event entering [preauth] debug3: mm_request_send: entering, type 112 [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 112 debug3: mm_answer_audit_event entering debug3: userauth_finish: failure partial=3D0 next methods=3D"publickey,keyboard-interactive" [preauth] debug3: send packet: type 51 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method keyboard-interactive [preauth] debug1: attempt 7 failures 3 [preauth] debug2: input_userauth_request: try method keyboard-interactive [preauth] debug1: keyboard-interactive devs [preauth] debug1: auth2_challenge: user=3Droot devs=3D [preauth] debug1: kbdint_alloc: devices 'pam' [preauth] debug2: auth2_challenge_start: devices pam [preauth] debug2: kbdint_next_device: devices [preauth] debug1: auth2_challenge_start: trying authentication method 'pam' [preauth] debug3: mm_sshpam_init_ctx [preauth] debug3: mm_request_send: entering, type 104 [preauth] debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth] debug3: mm_request_receive_expect: entering, type 105 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 104 debug3: mm_answer_pam_init_ctx debug3: PAM: sshpam_init_ctx entering debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0 debug3: mm_request_send: entering, type 105 debug2: monitor_read: 104 used once, disabling now debug3: mm_sshpam_query [preauth] debug3: mm_request_send: entering, type 106 [preauth] debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] debug3: mm_request_receive_expect: entering, type 107 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 106 debug3: mm_answer_pam_query debug3: PAM: sshpam_query entering debug3: ssh_msg_recv entering debug3: PAM: sshpam_thread_conv entering, 1 messages debug3: Fssh_ssh_msg_send: type 1 debug3: ssh_msg_recv entering debug3: mm_request_send: entering, type 107 debug3: mm_sshpam_query: pam_query returned 0 [preauth] debug3: send packet: type 60 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 1.078ms, delaying 6.187ms (reque= sted 7.265ms) [preauth] Postponed keyboard-interactive for root from 216.185.71.46 port 61524 ssh2 [preauth] debug3: receive packet: type 61 [preauth] debug3: mm_sshpam_respond [preauth] debug3: mm_request_send: entering, type 108 [preauth] debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth] debug3: mm_request_receive_expect: entering, type 109 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 108 debug3: mm_answer_pam_respond debug2: PAM: sshpam_respond entering, 1 responses debug3: Fssh_ssh_msg_send: type 6 debug3: mm_request_send: entering, type 109 debug2: monitor_read: 108 used once, disabling now debug3: mm_sshpam_respond: pam_respond returned 1 [preauth] debug3: mm_sshpam_query [preauth] debug3: mm_request_send: entering, type 106 [preauth] debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] debug3: mm_request_receive_expect: entering, type 107 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 106 debug3: mm_answer_pam_query debug3: PAM: sshpam_query entering debug3: ssh_msg_recv entering debug3: Fssh_ssh_msg_send: type 9 debug3: PAM: Authentication error PAM: Authentication error for root from vhost06.hamilton.harte-lyne.ca debug3: mm_request_send: entering, type 107 debug3: mm_sshpam_query: pam_query returned -1 [preauth] debug2: auth2_challenge_start: devices [preauth] debug3: mm_sshpam_free_ctx [preauth] debug3: mm_request_send: entering, type 110 [preauth] debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth] debug3: mm_request_receive_expect: entering, type 111 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 110 debug3: mm_answer_pam_free_ctx debug3: PAM: sshpam_free_ctx entering debug3: PAM: sshpam_thread_cleanup entering debug3: mm_request_send: entering, type 111 debug2: monitor_read: 110 used once, disabling now Failed keyboard-interactive/pam for root from 216.185.71.46 port 61524 ssh2 debug3: userauth_finish: failure partial=3D0 next methods=3D"publickey,keyboard-interactive" [preauth] debug3: send packet: type 51 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method keyboard-interactive [preauth] debug1: attempt 8 failures 4 [preauth] debug2: input_userauth_request: try method keyboard-interactive [preauth] debug1: keyboard-interactive devs [preauth] debug1: auth2_challenge: user=3Droot devs=3D [preauth] debug1: kbdint_alloc: devices 'pam' [preauth] debug2: auth2_challenge_start: devices pam [preauth] debug2: kbdint_next_device: devices [preauth] debug1: auth2_challenge_start: trying authentication method 'pam' [preauth] debug3: mm_sshpam_init_ctx [preauth] debug3: mm_request_send: entering, type 104 [preauth] debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth] debug3: mm_request_receive_expect: entering, type 105 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 104 debug3: mm_answer_pam_init_ctx debug3: PAM: sshpam_init_ctx entering debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0 debug3: mm_request_send: entering, type 105 debug2: monitor_read: 104 used once, disabling now debug3: mm_sshpam_query [preauth] debug3: mm_request_send: entering, type 106 [preauth] debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] debug3: mm_request_receive_expect: entering, type 107 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 106 debug3: mm_answer_pam_query debug3: PAM: sshpam_query entering debug3: ssh_msg_recv entering debug3: PAM: sshpam_thread_conv entering, 1 messages debug3: Fssh_ssh_msg_send: type 1 debug3: ssh_msg_recv entering debug3: mm_request_send: entering, type 107 debug3: mm_sshpam_query: pam_query returned 0 [preauth] debug3: send packet: type 60 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 1.064ms, delaying 6.202ms (reque= sted 7.265ms) [preauth] Postponed keyboard-interactive for root from 216.185.71.46 port 61524 ssh2 [preauth] debug3: receive packet: type 61 [preauth] debug3: mm_sshpam_respond [preauth] debug3: mm_request_send: entering, type 108 [preauth] debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth] debug3: mm_request_receive_expect: entering, type 109 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 108 debug3: mm_answer_pam_respond debug2: PAM: sshpam_respond entering, 1 responses debug3: Fssh_ssh_msg_send: type 6 debug3: mm_request_send: entering, type 109 debug2: monitor_read: 108 used once, disabling now debug3: mm_sshpam_respond: pam_respond returned 1 [preauth] debug3: mm_sshpam_query [preauth] debug3: mm_request_send: entering, type 106 [preauth] debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] debug3: mm_request_receive_expect: entering, type 107 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 106 debug3: mm_answer_pam_query debug3: PAM: sshpam_query entering debug3: ssh_msg_recv entering debug3: Fssh_ssh_msg_send: type 9 debug3: PAM: Authentication error PAM: Authentication error for root from vhost06.hamilton.harte-lyne.ca debug3: mm_request_send: entering, type 107 debug3: mm_sshpam_query: pam_query returned -1 [preauth] debug2: auth2_challenge_start: devices [preauth] debug3: mm_sshpam_free_ctx [preauth] debug3: mm_request_send: entering, type 110 [preauth] debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth] debug3: mm_request_receive_expect: entering, type 111 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 110 debug3: mm_answer_pam_free_ctx debug3: PAM: sshpam_free_ctx entering debug3: PAM: sshpam_thread_cleanup entering debug3: mm_request_send: entering, type 111 debug2: monitor_read: 110 used once, disabling now Failed keyboard-interactive/pam for root from 216.185.71.46 port 61524 ssh2 debug3: userauth_finish: failure partial=3D0 next methods=3D"publickey,keyboard-interactive" [preauth] debug3: send packet: type 51 [preauth] debug3: receive packet: type 50 [preauth] debug1: userauth-request for user root service ssh-connection method keyboard-interactive [preauth] debug1: attempt 9 failures 5 [preauth] debug2: input_userauth_request: try method keyboard-interactive [preauth] debug1: keyboard-interactive devs [preauth] debug1: auth2_challenge: user=3Droot devs=3D [preauth] debug1: kbdint_alloc: devices 'pam' [preauth] debug2: auth2_challenge_start: devices pam [preauth] debug2: kbdint_next_device: devices [preauth] debug1: auth2_challenge_start: trying authentication method 'pam' [preauth] debug3: mm_sshpam_init_ctx [preauth] debug3: mm_request_send: entering, type 104 [preauth] debug3: mm_sshpam_init_ctx: waiting for MONITOR_ANS_PAM_INIT_CTX [preauth] debug3: mm_request_receive_expect: entering, type 105 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 104 debug3: mm_answer_pam_init_ctx debug3: PAM: sshpam_init_ctx entering debug2: sshpam_init_ctx: auth information in SSH_AUTH_INFO_0 debug3: mm_request_send: entering, type 105 debug2: monitor_read: 104 used once, disabling now debug3: mm_sshpam_query [preauth] debug3: mm_request_send: entering, type 106 [preauth] debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] debug3: mm_request_receive_expect: entering, type 107 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 106 debug3: mm_answer_pam_query debug3: PAM: sshpam_query entering debug3: ssh_msg_recv entering debug3: PAM: sshpam_thread_conv entering, 1 messages debug3: Fssh_ssh_msg_send: type 1 debug3: ssh_msg_recv entering debug3: mm_request_send: entering, type 107 debug3: mm_sshpam_query: pam_query returned 0 [preauth] debug3: send packet: type 60 [preauth] debug3: user_specific_delay: user specific delay 0.000ms [preauth] debug3: ensure_minimum_time_since: elapsed 1.022ms, delaying 6.243ms (reque= sted 7.265ms) [preauth] Postponed keyboard-interactive for root from 216.185.71.46 port 61524 ssh2 [preauth] debug3: receive packet: type 61 [preauth] debug3: mm_sshpam_respond [preauth] debug3: mm_request_send: entering, type 108 [preauth] debug3: mm_sshpam_respond: waiting for MONITOR_ANS_PAM_RESPOND [preauth] debug3: mm_request_receive_expect: entering, type 109 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 108 debug3: mm_answer_pam_respond debug2: PAM: sshpam_respond entering, 1 responses debug3: Fssh_ssh_msg_send: type 6 debug3: mm_request_send: entering, type 109 debug2: monitor_read: 108 used once, disabling now debug3: mm_sshpam_respond: pam_respond returned 1 [preauth] debug3: mm_sshpam_query [preauth] debug3: mm_request_send: entering, type 106 [preauth] debug3: mm_sshpam_query: waiting for MONITOR_ANS_PAM_QUERY [preauth] debug3: mm_request_receive_expect: entering, type 107 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 106 debug3: mm_answer_pam_query debug3: PAM: sshpam_query entering debug3: ssh_msg_recv entering debug3: Fssh_ssh_msg_send: type 9 debug3: PAM: Authentication error PAM: Authentication error for root from vhost06.hamilton.harte-lyne.ca debug3: mm_request_send: entering, type 107 debug3: mm_sshpam_query: pam_query returned -1 [preauth] debug2: auth2_challenge_start: devices [preauth] debug3: mm_sshpam_free_ctx [preauth] debug3: mm_request_send: entering, type 110 [preauth] debug3: mm_sshpam_free_ctx: waiting for MONITOR_ANS_PAM_FREE_CTX [preauth] debug3: mm_request_receive_expect: entering, type 111 [preauth] debug3: mm_request_receive: entering [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 110 debug3: mm_answer_pam_free_ctx debug3: PAM: sshpam_free_ctx entering debug3: PAM: sshpam_thread_cleanup entering debug3: mm_request_send: entering, type 111 debug2: monitor_read: 110 used once, disabling now Failed keyboard-interactive/pam for root from 216.185.71.46 port 61524 ssh2 debug3: mm_audit_event entering [preauth] debug3: mm_request_send: entering, type 112 [preauth] maximum authentication attempts exceeded for root from 216.185.71.46 port 6= 1524 ssh2 [preauth] Disconnecting authenticating user root 216.185.71.46 port 61524: Too many authentication failures [preauth] debug3: send packet: type 1 [preauth] debug3: mm_request_receive: entering debug3: monitor_read: checking request 112 debug3: mm_answer_audit_event entering debug1: do_cleanup [preauth] debug3: PAM: sshpam_thread_cleanup entering [preauth] debug3: mm_request_receive: entering debug1: do_cleanup debug1: PAM: cleanup debug3: PAM: sshpam_thread_cleanup entering debug1: Killing privsep child 24923 --=20 You are receiving this mail because: You are the assignee for the bug.=