Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I am running an Ubuntu 64-bit and Windows 7 64-bit machine and I have set up an SSH between them and for whatever reason the passwords won't work; I receive the following error when trying to log on from either computer:
Code:
permission denied (public key, password)
I own both of the computers so I have full reign over them, so I'm assuming it should be an easy fix but I'm not sure about what to do. Please let me know if you have any suggestions! Thank you very much!
on both machines and I was able to access them but I have not been able to get the password correct.
sshd config:
Code:
# Package generated configuration file
# See the sshd_config(5) manpage for details
# What ports, IPs and protocols we listen for
#Port 22
Port 22
Port 19999
# Use these options to restrict which interfaces/protocols sshd will bind to
#ListenAddress ::
#ListenAddress 0.0.0.0
Protocol 2
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
#Privilege Separation is turned on for security
UsePrivilegeSeparation yes
# Lifetime and size of ephemeral version 1 server key
KeyRegenerationInterval 3600
ServerKeyBits 768
# Logging
SyslogFacility AUTH
LogLevel INFO
# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes
RSAAuthentication yes
PubkeyAuthentication yes
#AuthorizedKeysFile %h/.ssh/authorized_keys
# Don't read the user's ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# For this to work you will also need host keys in /etc/ssh_known_hosts
RhostsRSAAuthentication no
# similar for protocol version 2
HostbasedAuthentication no
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
# Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
# To enable empty passwords, change to yes (NOT RECOMMENDED)
PermitEmptyPasswords no
# Change to yes to enable challenge-response passwords (beware issues with
# some PAM modules and threads)
ChallengeResponseAuthentication no
# Change to no to disable tunnelled clear text passwords
#PasswordAuthentication yes
# Kerberos options
#KerberosAuthentication no
#KerberosGetAFSToken no
#KerberosOrLocalPasswd yes
#KerberosTicketCleanup yes
# GSSAPI options
#GSSAPIAuthentication no
#GSSAPICleanupCredentials yes
X11Forwarding yes
X11DisplayOffset 10
PrintMotd no
PrintLastLog yes
TCPKeepAlive yes
#UseLogin no
#MaxStartups 10:30:60
#Banner /etc/issue.net
# Allow client to pass locale environment variables
AcceptEnv LANG LC_*
Subsystem sftp /usr/lib/openssh/sftp-server
# Set this to 'yes' to enable PAM authentication, account processing,
# and session processing. If this is enabled, PAM authentication will
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# be allowed through the ChallengeResponseAuthentication and
# PasswordAuthentication. Depending on your PAM configuration,
# PAM authentication via ChallengeResponseAuthentication may bypass
# the setting of "PermitRootLogin without-password".
# If you just want the PAM account and session checks to run without
# PAM authentication, then enable this but set PasswordAuthentication
# and ChallengeResponseAuthentication to 'no'.
UsePAM yes
ssh config:
Code:
# This is the ssh client system-wide configuration file. See
# ssh_config(5) for more information. This file provides defaults for
# users, and the values can be changed in per-user configuration files
# or on the command line.
# Configuration data is parsed as follows:
# 1. command line options
# 2. user-specific file
# 3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.
# Site-wide defaults for some commonly used options. For a comprehensive
# list of available options, their meanings and defaults, please see the
# ssh_config(5) man page.
Host *
# ForwardAgent no
# ForwardX11 no
# ForwardX11Trusted yes
# RhostsRSAAuthentication no
# RSAAuthentication yes
# PasswordAuthentication yes
# HostbasedAuthentication no
# GSSAPIAuthentication no
# GSSAPIDelegateCredentials no
# GSSAPIKeyExchange no
# GSSAPITrustDNS no
# BatchMode no
# CheckHostIP yes
# AddressFamily any
# ConnectTimeout 0
# StrictHostKeyChecking ask
# IdentityFile ~/.ssh/identity
# IdentityFile ~/.ssh/id_rsa
# IdentityFile ~/.ssh/id_dsa
# Port 22
# Protocol 2,1
# Cipher 3des
# Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
# Cipher 3des
# Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
# MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160
# EscapeChar ~
# Tunnel no
# TunnelDevice any:any
# PermitLocalCommand no
# VisualHostKey no
SendEnv LANG LC_*
HashKnownHosts yes
GSSAPIAuthentication yes
GSSAPIDelegateCredentials no
logfile:
Code:
Oct 4 00:17:01 alan-desktop CRON[29843]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 00:17:01 alan-desktop CRON[29843]: pam_unix(cron:session): session closed for user root
Oct 4 01:17:01 alan-desktop CRON[29850]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 01:17:01 alan-desktop CRON[29850]: pam_unix(cron:session): session closed for user root
Oct 4 02:17:01 alan-desktop CRON[29857]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 02:17:01 alan-desktop CRON[29857]: pam_unix(cron:session): session closed for user root
Oct 4 03:17:01 alan-desktop CRON[29864]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 03:17:01 alan-desktop CRON[29864]: pam_unix(cron:session): session closed for user root
Oct 4 04:17:01 alan-desktop CRON[29871]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 04:17:01 alan-desktop CRON[29871]: pam_unix(cron:session): session closed for user root
Oct 4 05:17:01 alan-desktop CRON[29878]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 05:17:01 alan-desktop CRON[29878]: pam_unix(cron:session): session closed for user root
Oct 4 06:17:01 alan-desktop CRON[29885]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 06:17:01 alan-desktop CRON[29885]: pam_unix(cron:session): session closed for user root
Oct 4 06:25:01 alan-desktop CRON[29890]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 06:25:01 alan-desktop CRON[29890]: pam_unix(cron:session): session closed for user root
Oct 4 07:17:01 alan-desktop CRON[29896]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 07:17:01 alan-desktop CRON[29896]: pam_unix(cron:session): session closed for user root
Oct 4 07:30:01 alan-desktop CRON[29901]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 07:30:01 alan-desktop CRON[29901]: pam_unix(cron:session): session closed for user root
Oct 4 08:17:01 alan-desktop CRON[30039]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 07:30:01 alan-desktop CRON[29901]: pam_unix(cron:session): session closed for user root
Oct 4 08:17:01 alan-desktop CRON[30039]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 08:17:01 alan-desktop CRON[30039]: pam_unix(cron:session): session closed for user root
Oct 4 09:17:01 alan-desktop CRON[30046]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 09:17:01 alan-desktop CRON[30046]: pam_unix(cron:session): session closed for user root
Oct 4 10:17:01 alan-desktop CRON[30053]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 10:17:01 alan-desktop CRON[30053]: pam_unix(cron:session): session closed for user root
Oct 4 10:25:05 alan-desktop sshd[30061]: Accepted password for alan from 192.168.1.2 port 49225 ssh2
Oct 4 10:25:05 alan-desktop sshd[30061]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 10:33:11 alan-desktop sudo: alan : TTY=pts/0 ; PWD=/home/alan ; USER=root ; COMMAND=/usr/bin/apt-get isntall putty-tools
Oct 4 10:33:17 alan-desktop sudo: alan : TTY=pts/0 ; PWD=/home/alan ; USER=root ; COMMAND=/usr/bin/apt-get install putty-tools
Oct 4 10:34:16 alan-desktop sshd[30236]: Accepted password for alan from 192.168.1.4 port 55696 ssh2
Oct 4 10:34:16 alan-desktop sshd[30236]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 10:34:17 alan-desktop sshd[30303]: subsystem request for sftp
Oct 4 10:47:48 alan-desktop sshd[30236]: pam_unix(sshd:session): session closed for user alan
Oct 4 10:47:50 alan-desktop sshd[30061]: pam_unix(sshd:session): session closed for user alan
Oct 4 10:48:03 alan-desktop sshd[30315]: Accepted password for alan from 192.168.1.2 port 49522 ssh2
Oct 4 10:48:03 alan-desktop sshd[30315]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 10:58:31 alan-desktop sshd[30407]: Accepted password for alan from ::1 port 51607 ssh2
Oct 4 10:58:31 alan-desktop sshd[30407]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 10:59:42 alan-desktop sshd[30472]: Received disconnect from ::1: 11: disconnected by user
Oct 4 10:58:31 alan-desktop sshd[30407]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 10:59:42 alan-desktop sshd[30472]: Received disconnect from ::1: 11: disconnected by user
Oct 4 10:59:42 alan-desktop sshd[30407]: pam_unix(sshd:session): session closed for user alan
Oct 4 11:00:28 alan-desktop sshd[30504]: Accepted password for alan from ::1 port 46438 ssh2
Oct 4 11:00:28 alan-desktop sshd[30504]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 11:01:21 alan-desktop sshd[30568]: Received disconnect from ::1: 11: disconnected by user
Oct 4 11:01:21 alan-desktop sshd[30504]: pam_unix(sshd:session): session closed for user alan
Oct 4 11:01:44 alan-desktop sshd[30600]: Accepted password for alan from 192.168.1.4 port 59471 ssh2
Oct 4 11:01:44 alan-desktop sshd[30600]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 11:01:44 alan-desktop sshd[30667]: subsystem request for sftp
Oct 4 11:04:17 alan-desktop sshd[30600]: pam_unix(sshd:session): session closed for user alan
Oct 4 11:09:35 alan-desktop sshd[30315]: pam_unix(sshd:session): session closed for user alan
Oct 4 11:10:42 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 4 11:11:17 alan-desktop sudo: alan : TTY=pts/0 ; PWD=/home/alan ; USER=root ; COMMAND=/usr/bin/apt-get install ssh-server ssh-client
Oct 4 11:11:42 alan-desktop sudo: alan : TTY=pts/0 ; PWD=/home/alan ; USER=root ; COMMAND=/usr/bin/apt-get install openssh-server openssh-client
Oct 4 11:17:01 alan-desktop CRON[30728]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 11:17:01 alan-desktop CRON[30728]: pam_unix(cron:session): session closed for user root
Oct 4 12:17:01 alan-desktop CRON[30739]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 12:17:01 alan-desktop CRON[30739]: pam_unix(cron:session): session closed for user root
Oct 4 12:21:16 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 4 12:21:39 alan-desktop sshd[30751]: Accepted password for alan from 192.168.1.2 port 49499 ssh2
Oct 4 12:21:16 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 4 12:21:39 alan-desktop sshd[30751]: Accepted password for alan from 192.168.1.2 port 49499 ssh2
Oct 4 12:21:39 alan-desktop sshd[30751]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 12:33:19 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 4 12:35:49 alan-desktop sshd[30870]: Accepted password for alan from ::1 port 44243 ssh2
Oct 4 12:35:49 alan-desktop sshd[30870]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 12:58:35 alan-desktop sshd[30751]: pam_unix(sshd:session): session closed for user alan
Oct 4 13:00:04 alan-desktop sshd[31012]: Invalid user Alan from 192.168.1.2
Oct 4 13:00:04 alan-desktop sshd[31012]: Failed none for invalid user Alan from 192.168.1.2 port 49728 ssh2
Oct 4 13:00:08 alan-desktop sshd[31012]: pam_unix(sshd:auth): check pass; user unknown
Oct 4 13:00:08 alan-desktop sshd[31012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=alan-pc.local
Oct 4 13:00:10 alan-desktop sshd[31012]: Failed password for invalid user Alan from 192.168.1.2 port 49728 ssh2
Oct 4 13:00:18 alan-desktop sshd[31012]: pam_unix(sshd:auth): check pass; user unknown
Oct 4 13:00:20 alan-desktop sshd[31012]: Failed password for invalid user Alan from 192.168.1.2 port 49728 ssh2
Oct 4 13:00:27 alan-desktop sshd[31012]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=alan-pc.local
Oct 4 13:06:32 alan-desktop sshd[31020]: Invalid user Alan from 192.168.1.2
Oct 4 13:06:32 alan-desktop sshd[31020]: Failed none for invalid user Alan from 192.168.1.2 port 49746 ssh2
Oct 4 13:06:36 alan-desktop sshd[31020]: pam_unix(sshd:auth): check pass; user unknown
Oct 4 13:06:36 alan-desktop sshd[31020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=alan-pc.local
Oct 4 13:06:38 alan-desktop sshd[31020]: Failed password for invalid user Alan from 192.168.1.2 port 49746 ssh2
Oct 4 13:06:48 alan-desktop sshd[31023]: Invalid user Alan from 192.168.1.2
Oct 4 13:06:48 alan-desktop sshd[31023]: Failed none for invalid user Alan from 192.168.1.2 port 49747 ssh2
Oct 4 13:06:48 alan-desktop sshd[31023]: Invalid user Alan from 192.168.1.2
Oct 4 13:06:48 alan-desktop sshd[31023]: Failed none for invalid user Alan from 192.168.1.2 port 49747 ssh2
Oct 4 13:06:51 alan-desktop sshd[31023]: pam_unix(sshd:auth): check pass; user unknown
Oct 4 13:06:51 alan-desktop sshd[31023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=alan-pc.local
Oct 4 13:06:53 alan-desktop sshd[31023]: Failed password for invalid user Alan from 192.168.1.2 port 49747 ssh2
Oct 4 13:06:57 alan-desktop sshd[31023]: pam_unix(sshd:auth): check pass; user unknown
Oct 4 13:06:59 alan-desktop sshd[31023]: Failed password for invalid user Alan from 192.168.1.2 port 49747 ssh2
Oct 4 13:07:03 alan-desktop sshd[31023]: pam_unix(sshd:auth): check pass; user unknown
Oct 4 13:07:05 alan-desktop sshd[31023]: Failed password for invalid user Alan from 192.168.1.2 port 49747 ssh2
Oct 4 13:07:05 alan-desktop sshd[31023]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=alan-pc.local
Oct 4 13:17:01 alan-desktop CRON[31025]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 13:17:01 alan-desktop CRON[31025]: pam_unix(cron:session): session closed for user root
Oct 4 13:42:34 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 4 13:47:47 alan-desktop sudo: alan : TTY=pts/2 ; PWD=/home/alan ; USER=root ; COMMAND=/usr/bin/apt-get install gedit
Oct 4 13:49:24 alan-desktop sudo: alan : TTY=pts/2 ; PWD=/home/alan ; USER=root ; COMMAND=/bin/open gedit /etc/ssh/ssh_config
Oct 4 14:04:25 alan-desktop sshd[31186]: Accepted password for alan from 192.168.1.2 port 49856 ssh2
Oct 4 14:04:25 alan-desktop sshd[31186]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 4 14:13:28 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 4 14:17:01 alan-desktop CRON[31390]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 4 14:17:01 alan-desktop CRON[31390]: pam_unix(cron:session): session closed for user root
Thank you and let me know if you need anything else!
are you using the same key through cygwin as you are in putty??? If so, the format is different in putty than a standard ssh key
*edit
if the above is the case, you can export your putty key to use in cygwin by doing the following:
1. Download and open PuTTYgen
2. In PuTTYgen, select: Conversions » Load Private Key
3. Browse to your private PuTTY key and select Open.
You should be required to enter your private key passphrase.
4. Select: Conversions » Export OpenSSH Key
Select a place to put your keys such as your home directory; name it something like openssh-key.
5. To save the public key, follow the same instructions for creating the openssh-key.pub file as above.
I see in your logs that you have successfull connected as user "alan", I assume that this are your tries with putty.
And I see that you failed to connect as user "Alan", I assume that this were your tries with ssh from cygwin.
Can you connect as user "alan" from cygwin's ssh?
Is there a default place that PuTTy stores this file or some unique characteristic that I can search for - I can't seem to find it and I don't recall doing this in the setup procedure.
Quote:
Can you connect as user "alan" from cygwin's ssh?
Yes, I can connect via cygwin ssh but the password is rejected on this, too.
I see in your logs that you have successfull connected as user "alan", I assume that this are your tries with putty.
And I see that you failed to connect as user "Alan", I assume that this were your tries with ssh from cygwin.
Can you connect as user "alan" from cygwin's ssh?
I think what TobiSGD was trying to say is that in the logs all failed attempts came from user Alan.
Failed password for invalid user Alan from 192.168.1.2 port 49746 ssh2
Where as any attempt to connect as user alan gave
Accepted password for alan
make sure that in cygwin, you are connecting with user alan and not Alan as they are not the same....
How are you connecting through cygwin? shh 192.*.*.* ?
or ssh -l alan 192.*.*.* ?
the latter will log you in as alan. If your account name is Alan on your Windows PC, I think that cygwin will use that as the username. Make sure you are passing a user to ssh to login.
the L option just passes a username to ssh. So if you are on a *nix box under the name bob and you try to ssh into your *nix box at home under the name alan, and you use ssh 192.*.*.*, ssh will try to log bob into your home computer. with the L option (-l) ssh -l alan 192.*.*.*, it will pass the username alan to ssh to allow you to login in under that name.
Make sure you are using a lower case l and not upper case. the upper case L is used to bind to an address... I think this is what is giving you the error.
as far as a public key, yes it is safer to turn off passwords and only use public keys to authenticate... But we can get to that after we get you logged in
Thank you very much!! Well I am now able to connect to my Ubuntu machine via cyqwin ssh! However, it doesn't seem to be the case when trying to access the Windows machine via Ubuntu ssh
I receive the error:
Code:
Permission denied (publickey, password)
though I think it successfully passed the Windows username since the 'A' is capitalized! So it's a start!
I'm not real sure where cygwin stores it's error logs, but start with your error logs and try to find what is giving you the errors. If you can post the errors, we can try to help
Here's my log file for my Ubuntu machine - I hope it helps!
Code:
Oct 5 00:17:01 alan-desktop CRON[31914]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 00:17:01 alan-desktop CRON[31914]: pam_unix(cron:session): session closed for user root
Oct 5 01:17:02 alan-desktop CRON[31922]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 01:17:02 alan-desktop CRON[31922]: pam_unix(cron:session): session closed for user root
Oct 5 02:17:01 alan-desktop CRON[31930]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 02:17:01 alan-desktop CRON[31930]: pam_unix(cron:session): session closed for user root
Oct 5 03:17:01 alan-desktop CRON[31937]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 03:17:01 alan-desktop CRON[31937]: pam_unix(cron:session): session closed for user root
Oct 5 04:17:01 alan-desktop CRON[31945]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 04:17:01 alan-desktop CRON[31945]: pam_unix(cron:session): session closed for user root
Oct 5 05:17:01 alan-desktop CRON[31953]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 05:17:01 alan-desktop CRON[31953]: pam_unix(cron:session): session closed for user root
Oct 5 06:17:01 alan-desktop CRON[31961]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 06:17:01 alan-desktop CRON[31961]: pam_unix(cron:session): session closed for user root
Oct 5 06:25:01 alan-desktop CRON[31966]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 06:25:01 alan-desktop CRON[31966]: pam_unix(cron:session): session closed for user root
Oct 5 07:17:01 alan-desktop CRON[31973]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 07:17:01 alan-desktop CRON[31973]: pam_unix(cron:session): session closed for user root
Oct 5 07:30:01 alan-desktop CRON[31977]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 07:30:01 alan-desktop CRON[31977]: pam_unix(cron:session): session closed for user root
Oct 5 08:17:01 alan-desktop CRON[32149]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 08:17:01 alan-desktop CRON[32149]: pam_unix(cron:session): session closed for user root
Oct 5 09:17:01 alan-desktop CRON[32157]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 09:17:01 alan-desktop CRON[32157]: pam_unix(cron:session): session closed for user root
Oct 5 10:17:01 alan-desktop CRON[32165]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 10:17:01 alan-desktop CRON[32165]: pam_unix(cron:session): session closed for user root
Oct 5 10:54:10 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 5 11:01:18 alan-desktop sudo: alan : TTY=pts/0 ; PWD=/home/alan ; USER=root ; COMMAND=/usr/bin/vim /etc/ssh/sshd_config
Oct 5 11:04:33 alan-desktop sudo: alan : TTY=pts/0 ; PWD=/home/alan ; USER=root ; COMMAND=/sbin/iptables -A INPUT -p tcp --dport 22 -j ACCEPT
Oct 5 11:04:44 alan-desktop sudo: alan : TTY=pts/0 ; PWD=/home/alan ; USER=root ; COMMAND=/sbin/iptables -A OUTPUT -p tcp --dport 22 -j ACCEPT
Oct 5 11:07:19 alan-desktop sudo: alan : TTY=pts/0 ; PWD=/home/alan ; USER=root ; COMMAND=/etc/init.d/ssh restart
Oct 5 11:07:19 alan-desktop sshd[28968]: Received signal 15; terminating.
Oct 5 11:07:19 alan-desktop sshd[32526]: Server listening on 0.0.0.0 port 22.
Oct 5 11:07:19 alan-desktop sshd[32526]: Server listening on :: port 22.
Oct 5 11:14:26 alan-desktop sshd[32531]: Accepted password for alan from 192.168.1.2 port 49545 ssh2
Oct 5 11:14:26 alan-desktop sshd[32531]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 5 11:14:46 alan-desktop sshd[32531]: pam_unix(sshd:session): session closed for user alan
Oct 5 11:17:01 alan-desktop CRON[32629]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 11:17:01 alan-desktop CRON[32629]: pam_unix(cron:session): session closed for user root
Oct 5 11:18:19 alan-desktop sshd[32634]: Invalid user Alan from 192.168.1.2
Oct 5 11:18:19 alan-desktop sshd[32634]: Failed none for invalid user Alan from 192.168.1.2 port 49562 ssh2
Oct 5 11:18:22 alan-desktop sshd[32634]: pam_unix(sshd:auth): check pass; user unknown
Oct 5 11:18:22 alan-desktop sshd[32634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=alan-pc.local
Oct 5 11:18:24 alan-desktop sshd[32634]: Failed password for invalid user Alan from 192.168.1.2 port 49562 ssh2
Oct 5 11:28:37 alan-desktop unix_chkpwd[32641]: password check failed for user (alan)
Oct 5 11:28:37 alan-desktop gnome-screensaver-dialog: pam_unix(gnome-screensaver:auth): authentication failure; logname= uid=1000 euid=1000 tty=:0.0 ruser= rhost= user=alan
Oct 5 11:28:45 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 5 11:36:22 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 5 11:49:20 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 5 11:36:22 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 5 11:49:20 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 5 11:52:48 alan-desktop sshd[32666]: Accepted password for alan from 192.168.1.2 port 49800 ssh2
Oct 5 11:52:48 alan-desktop sshd[32666]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 5 11:57:24 alan-desktop sshd[32758]: Accepted password for alan from 192.168.1.2 port 49815 ssh2
Oct 5 11:57:24 alan-desktop sshd[32758]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 5 11:58:07 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 5 11:58:13 alan-desktop sshd[387]: Invalid user Alan from 192.168.1.4
Oct 5 11:58:13 alan-desktop sshd[387]: Failed none for invalid user Alan from 192.168.1.4 port 37523 ssh2
Oct 5 11:58:16 alan-desktop sshd[387]: pam_unix(sshd:auth): check pass; user unknown
Oct 5 11:58:16 alan-desktop sshd[387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=alan-desktop.local
Oct 5 11:58:18 alan-desktop sshd[387]: Failed password for invalid user Alan from 192.168.1.4 port 37523 ssh2
Oct 5 11:59:29 alan-desktop sshd[387]: pam_unix(sshd:auth): check pass; user unknown
Oct 5 11:59:31 alan-desktop sshd[387]: Failed password for invalid user Alan from 192.168.1.4 port 37523 ssh2
Oct 5 11:59:37 alan-desktop sshd[387]: pam_unix(sshd:auth): check pass; user unknown
Oct 5 11:59:39 alan-desktop sshd[387]: Failed password for invalid user Alan from 192.168.1.4 port 37523 ssh2
Oct 5 11:59:39 alan-desktop sshd[387]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=alan-desktop.local
Oct 5 12:17:01 alan-desktop CRON[394]: pam_unix(cron:session): session opened for user root by (uid=0)
Oct 5 12:17:01 alan-desktop CRON[394]: pam_unix(cron:session): session closed for user root
Oct 5 12:19:56 alan-desktop sshd[358]: Received disconnect from 192.168.1.2: 11: disconnected by user
Oct 5 12:19:56 alan-desktop sshd[32758]: pam_unix(sshd:session): session closed for user alan
Oct 5 12:54:40 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
Oct 5 12:58:55 alan-desktop sshd[414]: Accepted password for alan from 192.168.1.2 port 50063 ssh2
Oct 5 12:58:55 alan-desktop sshd[414]: pam_unix(sshd:session): session opened for user alan by (uid=0)
Oct 5 13:10:27 alan-desktop gnome-screensaver-dialog: gkr-pam: unlocked login keyring
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.