Форум русскоязычного сообщества Ubuntu


Увидели сообщение с непонятной ссылкой, спам, непристойность или оскорбление?
Воспользуйтесь ссылкой «Сообщить модератору» рядом с сообщением!

Автор Тема: Слетел пароль root  (Прочитано 4616 раз)

0 Пользователей и 1 Гость просматривают эту тему.

Оффлайн Sollomon

  • Автор темы
  • Участник
  • *
  • Сообщений: 230
    • Просмотр профиля
Слетел пароль root
« : 01 Декабря 2009, 15:38:27 »
Есть сервачек на Ubuntu, настроил Sambу, чтобы народ мог по сети ложить файлы и там хранить.
Кто что там наделал не могу дупля отбить.
Короче когда пытаюсь путти подключиться рутом, вообще путти закрывается.
Под юзером заходит, будучи под юзером пробовал сделать данную команду.
sudo passwd rootнормально проходит, пароль прописываю, после этого пытаюсь зайти рутом, опять путти вылетает.
Кто что может подсказать? Заранее благодарю за советы.

Прогой WinSCP подключиться получается рутом.
« Последнее редактирование: 01 Декабря 2009, 15:45:56 от Sollomon »

Оффлайн coyote

  • Любитель
  • *
  • Сообщений: 59
    • Просмотр профиля
Re: Слетел пароль root
« Ответ #1 : 01 Декабря 2009, 16:42:48 »
в /etc/ssh/sshd_config параметр PermitRootLogin какое значение имеет и что в логе /var/log/auth.log?

Оффлайн Sollomon

  • Автор темы
  • Участник
  • *
  • Сообщений: 230
    • Просмотр профиля
Re: Слетел пароль root
« Ответ #2 : 01 Декабря 2009, 19:12:15 »
По первому значению вот такие параметры:

# Authentication:
LoginGraceTime 120
PermitRootLogin yes
StrictModes yes

Второе:

Dec  1 11:22:14 tr-file-server sshd[1899]: Server listening on 0.0.0.0 port 22.
Dec  1 11:22:14 tr-file-server sshd[1899]: Server listening on :: port 22.
Dec  1 11:22:59 tr-file-server login[2030]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
Dec  1 11:23:00 tr-file-server login[2107]: ROOT LOGIN  on 'tty1'
Dec  1 11:23:03 tr-file-server login[2030]: pam_unix(login:session): session closed for user root
Dec  1 11:23:11 tr-file-server login[2123]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
Dec  1 11:23:11 tr-file-server login[2141]: ROOT LOGIN  on 'tty1'
Dec  1 11:23:13 tr-file-server login[2123]: pam_unix(login:session): session closed for user root
Dec  1 11:23:28 tr-file-server login[2165]: pam_unix(login:auth): check pass; user unknown
Dec  1 11:23:28 tr-file-server login[2165]: pam_unix(login:auth): authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost=
Dec  1 11:23:30 tr-file-server login[2165]: FAILED LOGIN (1) on 'tty1' FOR `UNKNOWN', Authentication failure
Dec  1 11:23:44 tr-file-server login[2165]: pam_unix(login:auth): check pass; user unknown
Dec  1 11:23:44 tr-file-server login[2165]: pam_unix(login:auth): authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost=
Dec  1 11:23:47 tr-file-server login[2165]: FAILED LOGIN (2) on 'tty1' FOR `UNKNOWN', Authentication failure
Dec  1 11:23:57 tr-file-server login[2165]: pam_unix(login:auth): check pass; user unknown
Dec  1 11:24:00 tr-file-server login[2165]: FAILED LOGIN (3) on 'tty1' FOR `UNKNOWN', Authentication failure
Dec  1 11:24:21 tr-file-server login[2165]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
Dec  1 11:24:21 tr-file-server login[2176]: ROOT LOGIN  on 'tty1'
Dec  1 11:24:23 tr-file-server login[2165]: pam_unix(login:session): session closed for user root
Dec  1 11:24:23 tr-file-server login[2165]: PAM 1 more authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost=
Dec  1 11:26:49 tr-file-server sshd[2204]: Invalid user sollomon from 192.168.0.58
Dec  1 11:26:49 tr-file-server sshd[2204]: Failed none for invalid user sollomon from 192.168.0.58 port 1035 ssh2
Dec  1 11:26:52 tr-file-server sshd[2204]: pam_unix(sshd:auth): check pass; user unknown
Dec  1 11:26:52 tr-file-server sshd[2204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.0.58
Dec  1 11:26:54 tr-file-server sshd[2204]: Failed password for invalid user sollomon from 192.168.0.58 port 1035 ssh2
Dec  1 11:26:57 tr-file-server sshd[2204]: pam_unix(sshd:auth): check pass; user unknown
Dec  1 11:26:59 tr-file-server sshd[2204]: Failed password for invalid user sollomon from 192.168.0.58 port 1035 ssh2
Dec  1 11:27:03 tr-file-server sshd[2204]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.0.58
Dec  1 11:27:10 tr-file-server sshd[2208]: Invalid user \320\272\321\321\320\265 from 192.168.0.58
Dec  1 11:27:10 tr-file-server sshd[2208]: Failed none for invalid user \320\272\321\321\320\265 from 192.168.0.58 port 1036 ssh2
Dec  1 11:27:26 tr-file-server sshd[2211]: Accepted password for root from 192.168.0.58 port 1037 ssh2
Dec  1 11:27:26 tr-file-server sshd[2211]: pam_unix(sshd:session): session opened for user root by (uid=0)
Dec  1 11:27:28 tr-file-server sshd[2211]: pam_unix(sshd:session): session closed for user root
Dec  1 11:27:49 tr-file-server sshd[2239]: Accepted password for root from 192.168.0.58 port 1039 ssh2
Dec  1 11:27:49 tr-file-server sshd[2239]: pam_unix(sshd:session): session opened for user root by (uid=0)
Dec  1 11:27:51 tr-file-server sshd[2239]: pam_unix(sshd:session): session closed for user root
Dec  1 11:30:01 tr-file-server CRON[2276]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 11:30:18 tr-file-server CRON[2276]: pam_unix(cron:session): session closed for user root
Dec  1 11:33:29 tr-file-server sshd[1896]: Server listening on 0.0.0.0 port 22.
Dec  1 11:33:29 tr-file-server sshd[1896]: Server listening on :: port 22.
Dec  1 11:33:43 tr-file-server login[2027]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
Dec  1 11:33:43 tr-file-server login[2104]: ROOT LOGIN  on 'tty1'
Dec  1 11:33:47 tr-file-server login[2027]: pam_unix(login:session): session closed for user root
Dec  1 11:33:55 tr-file-server login[2117]: pam_unix(login:auth): check pass; user unknown
Dec  1 11:33:55 tr-file-server login[2117]: pam_unix(login:auth): authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost=
Dec  1 11:33:58 tr-file-server login[2117]: FAILED LOGIN (1) on 'tty1' FOR `UNKNOWN', Authentication failure
Dec  1 11:34:13 tr-file-server login[2117]: pam_unix(login:auth): check pass; user unknown
Dec  1 11:34:13 tr-file-server login[2117]: pam_unix(login:auth): authentication failure; logname=LOGIN uid=0 euid=0 tty=tty1 ruser= rhost=
Dec  1 11:34:16 tr-file-server login[2117]: FAILED LOGIN (2) on 'tty1' FOR `UNKNOWN', Authentication failure
Dec  1 11:34:26 tr-file-server login[2117]: pam_unix(login:session): session opened for user troyanda by LOGIN(uid=0)
Dec  1 11:34:48 tr-file-server sudo: troyanda : TTY=tty1 ; PWD=/home/troyanda ; USER=root ; COMMAND=/usr/bin/passwd root
Dec  1 11:34:53 tr-file-server passwd[2154]: pam_unix(passwd:chauthtok): password changed for root
Dec  1 11:34:53 tr-file-server passwd[2154]: pam_smbpass(passwd:chauthtok): Unable to get uid for user root
Dec  1 11:34:53 tr-file-server passwd[2154]: pam_smbpass(passwd:chauthtok): password for (root) changed by (root/0)
Dec  1 11:34:57 tr-file-server login[2117]: pam_unix(login:session): session closed for user troyanda
Dec  1 11:35:03 tr-file-server login[2158]: pam_unix(login:session): session opened for user root by LOGIN(uid=0)
Dec  1 11:35:03 tr-file-server login[2181]: ROOT LOGIN  on 'tty1'
Dec  1 11:35:05 tr-file-server login[2158]: pam_unix(login:session): session closed for user root
Dec  1 11:35:14 tr-file-server login[2195]: pam_unix(login:session): session opened for user troyanda by LOGIN(uid=0)
Dec  1 11:40:01 tr-file-server CRON[2262]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 11:40:18 tr-file-server CRON[2262]: pam_unix(cron:session): session closed for user root
Dec  1 11:44:08 tr-file-server sshd[2353]: Invalid user \320\265\320\272\321\320\275\321\321\320\262\321 from 192.168.0.58
Dec  1 11:44:08 tr-file-server sshd[2353]: Failed none for invalid user \320\265\320\272\321\320\275\321\321\320\262\321 from 192.168.0.58 port 1166 ssh2
Dec  1 11:44:09 tr-file-server sshd[2353]: pam_unix(sshd:auth): check pass; user unknown
Dec  1 11:44:09 tr-file-server sshd[2353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.0.58
Dec  1 11:44:11 tr-file-server sshd[2353]: Failed password for invalid user \320\265\320\272\321\320\275\321\321\320\262\321 from 192.168.0.58 port 1166 ssh2
Dec  1 11:44:14 tr-file-server last message repeated 4 times
Dec  1 11:44:14 tr-file-server sshd[2353]: pam_unix(sshd:auth): check pass; user unknown
Dec  1 11:44:17 tr-file-server sshd[2353]: Failed password for invalid user \320\265\320\272\321\320\275\321\321\320\262\321 from 192.168.0.58 port 1166 ssh2
Dec  1 11:44:17 tr-file-server sshd[2353]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.0.58
Dec  1 11:44:49 tr-file-server sshd[2357]: Invalid user \320\265\320\272\321\320\275\321\321\320\262\321 from 192.168.0.58
Dec  1 11:44:49 tr-file-server sshd[2357]: Failed none for invalid user \320\265\320\272\321\320\275\321\321\320\262\321 from 192.168.0.58 port 1167 ssh2
Dec  1 11:45:06 tr-file-server sshd[2360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.0.58  user=troyanda
Dec  1 11:45:08 tr-file-server sshd[2360]: Failed password for troyanda from 192.168.0.58 port 1170 ssh2
Dec  1 11:45:11 tr-file-server sshd[2360]: Accepted password for troyanda from 192.168.0.58 port 1170 ssh2
Dec  1 11:45:11 tr-file-server sshd[2360]: pam_unix(sshd:session): session opened for user troyanda by (uid=0)
Dec  1 11:45:52 tr-file-server sudo: troyanda : TTY=pts/1 ; PWD=/home/troyanda ; USER=root ; COMMAND=/usr/bin/passwd root
Dec  1 11:45:57 tr-file-server passwd[2387]: pam_unix(passwd:chauthtok): password changed for root
Dec  1 11:45:57 tr-file-server passwd[2387]: pam_smbpass(passwd:chauthtok): password for (root/0) changed by (root/0)
Dec  1 11:46:01 tr-file-server sshd[2360]: pam_unix(sshd:session): session closed for user troyanda
Dec  1 11:46:13 tr-file-server sshd[2395]: Accepted password for root from 192.168.0.58 port 1185 ssh2
Dec  1 11:46:13 tr-file-server sshd[2395]: pam_unix(sshd:session): session opened for user root by (uid=0)
Dec  1 11:46:15 tr-file-server sshd[2395]: pam_unix(sshd:session): session closed for user root
Dec  1 11:49:01 tr-file-server sudo: troyanda : TTY=tty1 ; PWD=/home/troyanda ; USER=root ; COMMAND=/sbin/shutdown -h now
Dec  1 11:50:37 tr-file-server sshd[1887]: Server listening on 0.0.0.0 port 22.
Dec  1 11:50:37 tr-file-server sshd[1887]: Server listening on :: port 22.
Dec  1 11:50:57 tr-file-server login[2018]: pam_unix(login:session): session opened for user troyanda by LOGIN(uid=0)
Dec  1 11:51:14 tr-file-server login[2018]: pam_unix(login:session): session closed for user troyanda
Dec  1 12:00:01 tr-file-server CRON[2176]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 12:00:01 tr-file-server CRON[2177]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 12:00:01 tr-file-server CRON[2176]: pam_unix(cron:session): session closed for user root
Dec  1 12:00:19 tr-file-server CRON[2177]: pam_unix(cron:session): session closed for user root
Dec  1 12:10:01 tr-file-server CRON[2305]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 12:10:04 tr-file-server CRON[2305]: pam_unix(cron:session): session closed for user root
Dec  1 12:17:01 tr-file-server CRON[2406]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 12:17:01 tr-file-server CRON[2406]: pam_unix(cron:session): session closed for user root
Dec  1 12:20:01 tr-file-server CRON[2430]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 12:20:04 tr-file-server CRON[2430]: pam_unix(cron:session): session closed for user root
Dec  1 12:30:01 tr-file-server CRON[2537]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 12:30:05 tr-file-server CRON[2537]: pam_unix(cron:session): session closed for user root
Dec  1 12:40:01 tr-file-server CRON[2642]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 12:40:04 tr-file-server CRON[2642]: pam_unix(cron:session): session closed for user root
Dec  1 12:50:01 tr-file-server CRON[2752]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 12:50:04 tr-file-server CRON[2752]: pam_unix(cron:session): session closed for user root
Dec  1 13:00:01 tr-file-server CRON[2854]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 13:00:01 tr-file-server CRON[2855]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 13:00:01 tr-file-server CRON[2854]: pam_unix(cron:session): session closed for user root
Dec  1 13:00:04 tr-file-server CRON[2855]: pam_unix(cron:session): session closed for user root
Dec  1 13:10:01 tr-file-server CRON[2989]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 13:10:04 tr-file-server CRON[2989]: pam_unix(cron:session): session closed for user root
Dec  1 13:17:01 tr-file-server CRON[3089]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 13:17:02 tr-file-server CRON[3089]: pam_unix(cron:session): session closed for user root
Dec  1 13:20:01 tr-file-server CRON[3112]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 13:20:04 tr-file-server CRON[3112]: pam_unix(cron:session): session closed for user root
Dec  1 13:30:01 tr-file-server CRON[3217]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 13:30:04 tr-file-server CRON[3217]: pam_unix(cron:session): session closed for user root
Dec  1 13:40:01 tr-file-server CRON[3326]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 13:40:04 tr-file-server CRON[3326]: pam_unix(cron:session): session closed for user root
Dec  1 13:50:01 tr-file-server CRON[3434]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 13:50:04 tr-file-server CRON[3434]: pam_unix(cron:session): session closed for user root
Dec  1 14:00:01 tr-file-server CRON[3540]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 14:00:01 tr-file-server CRON[3541]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 14:00:02 tr-file-server CRON[3540]: pam_unix(cron:session): session closed for user root
Dec  1 14:00:05 tr-file-server CRON[3541]: pam_unix(cron:session): session closed for user root
Dec  1 14:10:01 tr-file-server CRON[3675]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 14:10:04 tr-file-server CRON[3675]: pam_unix(cron:session): session closed for user root
Dec  1 14:17:01 tr-file-server CRON[3771]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 14:17:01 tr-file-server CRON[3771]: pam_unix(cron:session): session closed for user root
Dec  1 14:20:01 tr-file-server CRON[3798]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 14:20:04 tr-file-server CRON[3798]: pam_unix(cron:session): session closed for user root
Dec  1 14:30:01 tr-file-server CRON[3904]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 14:30:04 tr-file-server CRON[3904]: pam_unix(cron:session): session closed for user root
Dec  1 14:38:39 tr-file-server sshd[4009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.168.0.25  user=troyanda
Dec  1 14:38:42 tr-file-server sshd[4009]: Failed password for troyanda from 192.168.0.25 port 2349 ssh2
Dec  1 14:38:44 tr-file-server sshd[4009]: Accepted password for troyanda from 192.168.0.25 port 2349 ssh2
Dec  1 14:38:44 tr-file-server sshd[4009]: pam_unix(sshd:session): session opened for user troyanda by (uid=0)
Dec  1 14:40:01 tr-file-server CRON[4068]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 14:40:04 tr-file-server CRON[4068]: pam_unix(cron:session): session closed for user root
Dec  1 14:40:23 tr-file-server sshd[4144]: Accepted password for root from 192.168.0.25 port 2427 ssh2
Dec  1 14:40:23 tr-file-server sshd[4144]: pam_unix(sshd:session): session opened for user root by (uid=0)
Dec  1 14:40:24 tr-file-server sshd[4144]: subsystem request for sftp
Dec  1 14:46:04 tr-file-server sshd[4144]: pam_unix(sshd:session): session closed for user root
Dec  1 14:50:01 tr-file-server CRON[4191]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 14:50:04 tr-file-server CRON[4191]: pam_unix(cron:session): session closed for user root
Dec  1 15:00:01 tr-file-server CRON[4300]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 15:00:01 tr-file-server CRON[4301]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 15:00:01 tr-file-server CRON[4300]: pam_unix(cron:session): session closed for user root
Dec  1 15:00:04 tr-file-server CRON[4301]: pam_unix(cron:session): session closed for user root
Dec  1 15:10:01 tr-file-server CRON[4432]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 15:10:04 tr-file-server CRON[4432]: pam_unix(cron:session): session closed for user root
Dec  1 15:17:01 tr-file-server CRON[4530]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 15:17:01 tr-file-server CRON[4530]: pam_unix(cron:session): session closed for user root
Dec  1 15:20:01 tr-file-server CRON[4553]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 15:20:04 tr-file-server CRON[4553]: pam_unix(cron:session): session closed for user root
Dec  1 15:30:02 tr-file-server CRON[4662]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 15:30:05 tr-file-server CRON[4662]: pam_unix(cron:session): session closed for user root
Dec  1 15:40:01 tr-file-server CRON[4766]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 15:40:04 tr-file-server CRON[4766]: pam_unix(cron:session): session closed for user root
Dec  1 15:50:01 tr-file-server CRON[4871]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 15:50:04 tr-file-server CRON[4871]: pam_unix(cron:session): session closed for user root
Dec  1 16:00:01 tr-file-server CRON[4978]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 16:00:01 tr-file-server CRON[4979]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 16:00:02 tr-file-server CRON[4978]: pam_unix(cron:session): session closed for user root
Dec  1 16:00:04 tr-file-server CRON[4979]: pam_unix(cron:session): session closed for user root
Dec  1 16:10:02 tr-file-server CRON[5109]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 16:10:05 tr-file-server CRON[5109]: pam_unix(cron:session): session closed for user root
Dec  1 16:17:01 tr-file-server CRON[5208]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 16:17:01 tr-file-server CRON[5208]: pam_unix(cron:session): session closed for user root
Dec  1 16:20:01 tr-file-server CRON[5231]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 16:20:04 tr-file-server CRON[5231]: pam_unix(cron:session): session closed for user root
Dec  1 16:27:40 tr-file-server sshd[4009]: pam_unix(sshd:session): session closed for user troyanda
Dec  1 16:30:01 tr-file-server CRON[5347]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 16:30:04 tr-file-server CRON[5347]: pam_unix(cron:session): session closed for user root
Dec  1 16:40:01 tr-file-server CRON[5454]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 16:40:04 tr-file-server CRON[5454]: pam_unix(cron:session): session closed for user root
Dec  1 16:50:01 tr-file-server CRON[5560]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 16:50:04 tr-file-server CRON[5560]: pam_unix(cron:session): session closed for user root
Dec  1 17:00:01 tr-file-server CRON[5667]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 17:00:01 tr-file-server CRON[5668]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 17:00:02 tr-file-server CRON[5667]: pam_unix(cron:session): session closed for user root
Dec  1 17:00:05 tr-file-server CRON[5668]: pam_unix(cron:session): session closed for user root
Dec  1 17:10:01 tr-file-server CRON[5802]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 17:10:04 tr-file-server CRON[5802]: pam_unix(cron:session): session closed for user root
Dec  1 17:17:01 tr-file-server CRON[5898]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 17:17:01 tr-file-server CRON[5898]: pam_unix(cron:session): session closed for user root
Dec  1 17:20:01 tr-file-server CRON[5924]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 17:20:04 tr-file-server CRON[5924]: pam_unix(cron:session): session closed for user root
Dec  1 17:30:01 tr-file-server CRON[6031]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 17:30:04 tr-file-server CRON[6031]: pam_unix(cron:session): session closed for user root
Dec  1 17:40:01 tr-file-server CRON[6139]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 17:40:04 tr-file-server CRON[6139]: pam_unix(cron:session): session closed for user root
Dec  1 17:50:01 tr-file-server CRON[6243]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 17:50:05 tr-file-server CRON[6243]: pam_unix(cron:session): session closed for user root
Dec  1 18:00:01 tr-file-server CRON[6347]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 18:00:01 tr-file-server CRON[6348]: pam_unix(cron:session): session opened for user root by (uid=0)
Dec  1 18:00:01 tr-file-server CRON[6347]: pam_unix(cron:session): session closed for user root
Dec  1 18:00:04 tr-file-server CRON[6348]: pam_unix(cron:session): session closed for user root
Dec  1 18:08:13 tr-file-server sshd[6477]: Accepted password for root from 192.168.0.25 port 4980 ssh2
Dec  1 18:08:13 tr-file-server sshd[6477]: pam_unix(sshd:session): session opened for user root by (uid=0)
Dec  1 18:08:13 tr-file-server sshd[6477]: subsystem request for sftp

Оффлайн coyote

  • Любитель
  • *
  • Сообщений: 59
    • Просмотр профиля
Re: Слетел пароль root
« Ответ #3 : 01 Декабря 2009, 23:30:15 »
ну да, видно что он логинится нормльно и сразу отваливается...
а шелл какой для рута в /etc/passwd ? и может в домашней директории в .bashrc или .profile что-нибудь лишнее?
и еще, можно на сервере выполнить что-нибудь типа ssh root@localhost id ?!

Оффлайн Frank

  • Старожил
  • *
  • Сообщений: 1799
  • Профессиональный любитель
    • Просмотр профиля
    • Народный форум Николаева
Re: Слетел пароль root
« Ответ #4 : 01 Декабря 2009, 23:34:44 »
Unable to get uid for user root
по-моему, кто-то наломал дров с /etc/passwd и/или /etc/shadow
grep root /etc/passwd в студию

Оффлайн Sollomon

  • Автор темы
  • Участник
  • *
  • Сообщений: 230
    • Просмотр профиля
Re: Слетел пароль root
« Ответ #5 : 02 Декабря 2009, 10:48:21 »
Дров то наломали, меня не было на работе и кто-то полазил, никто не признается, что сделали.
Лазили обычные юзеры, могли что угодно упороть.

troyanda@tr-file-server:~$ grep root /etc/passwd
root:x:0:0:root:/root:/bin/bash

Вывожу команду из под юзера, ибо понятно рутом не могу подключиться.
Я если чесно в замешательстве вообще что может быть, из под юзера команды с дополнением sudo выполняются нормально.
Цитировать
А, еще добавлю, забыл, рутом пробовал заходить, как из под путти, так и прямо на серваке пробовал, эфекта ноль.
« Последнее редактирование: 02 Декабря 2009, 10:51:25 от Sollomon »

Оффлайн Frank

  • Старожил
  • *
  • Сообщений: 1799
  • Профессиональный любитель
    • Просмотр профиля
    • Народный форум Николаева
Re: Слетел пароль root
« Ответ #6 : 02 Декабря 2009, 11:12:25 »
включаем подробное логирование, перезапускаем sshd, пробуем подключиться, смотрим разбор полётов в логе auth

Оффлайн Sollomon

  • Автор темы
  • Участник
  • *
  • Сообщений: 230
    • Просмотр профиля
Re: Слетел пароль root
« Ответ #7 : 02 Декабря 2009, 12:03:52 »
включаем подробное логирование, перезапускаем sshd, пробуем подключиться, смотрим разбор полётов в логе auth

Подскажите пожалуйста, как включить подробное логирование.

Оффлайн Frank

  • Старожил
  • *
  • Сообщений: 1799
  • Профессиональный любитель
    • Просмотр профиля
    • Народный форум Николаева
Re: Слетел пароль root
« Ответ #8 : 02 Декабря 2009, 12:37:58 »
man sshd_config не ленимся читать, опция LogLevel

Оффлайн Sollomon

  • Автор темы
  • Участник
  • *
  • Сообщений: 230
    • Просмотр профиля
Re: Слетел пароль root
« Ответ #9 : 02 Декабря 2009, 13:32:15 »
LogLevel sshd( 8 )

Получаем:

Dec  2 12:30:50 tr-file-server sudo: troyanda : TTY=pts/2 ; PWD=/home/troyanda ; USER=root ; COMMAND=/usr/bin/tail -f /var/log/auth.log
Dec  2 12:30:56 tr-file-server sshd[19458]: Connection from 192.168.0.25 port 1965
Dec  2 12:31:01 tr-file-server sshd[19458]: Failed none for root from 192.168.0.25 port 1965 ssh2
Dec  2 12:31:03 tr-file-server sshd[19458]: Accepted password for root from 192.168.0.25 port 1965 ssh2
Dec  2 12:31:03 tr-file-server sshd[19458]: pam_unix(sshd:session): session opened for user root by (uid=0)
Dec  2 12:31:05 tr-file-server sshd[19458]: Connection closed by 192.168.0.25
Dec  2 12:31:05 tr-file-server sshd[19458]: pam_unix(sshd:session): session closed for user root
Dec  2 12:31:05 tr-file-server sshd[19458]: Transferred: sent 3624, received 1688 bytes
Dec  2 12:31:05 tr-file-server sshd[19458]: Closing connection to 192.168.0.25 port 1965

А, вот когда пытаюсь подключится юзером:
Dec  2 12:32:59 tr-file-server sshd[19492]: Connection from 192.168.0.25 port 2036
Dec  2 12:33:12 tr-file-server sshd[19492]: Failed none for troyanda from 192.168.0.25 port 2036 ssh2
Dec  2 12:33:16 tr-file-server sshd[19492]: Accepted password for troyanda from 192.168.0.25 port 2036 ssh2
Dec  2 12:33:16 tr-file-server sshd[19492]: pam_unix(sshd:session): session opened for user troyanda by (uid=0)
Dec  2 12:33:16 tr-file-server sshd[19492]: User child is on pid 19501

LogLevel DEBUG
Dec  2 12:38:48 tr-file-server sudo: troyanda : TTY=pts/2 ; PWD=/home/troyanda ; USER=root ; COMMAND=/usr/bin/tail -f /var/log/auth.log
Dec  2 12:38:58 tr-file-server sshd[19560]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
Dec  2 12:38:58 tr-file-server sshd[19556]: debug1: Forked child 19560.
Dec  2 12:38:58 tr-file-server sshd[19560]: debug1: inetd sockets after dupping: 3, 3
Dec  2 12:38:58 tr-file-server sshd[19560]: Connection from 192.168.0.25 port 2326
Dec  2 12:38:58 tr-file-server sshd[19560]: debug1: Client protocol version 2.0; client software version PuTTY_Release_0.60
Dec  2 12:38:58 tr-file-server sshd[19560]: debug1: no match: PuTTY_Release_0.60
Dec  2 12:38:58 tr-file-server sshd[19560]: debug1: Enabling compatibility mode for protocol 2.0
Dec  2 12:38:58 tr-file-server sshd[19560]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5ubuntu1
Dec  2 12:39:04 tr-file-server sshd[19560]: debug1: PAM: initializing for "root"
Dec  2 12:39:04 tr-file-server sshd[19560]: debug1: PAM: setting PAM_RHOST to "192.168.0.25"
Dec  2 12:39:04 tr-file-server sshd[19560]: debug1: PAM: setting PAM_TTY to "ssh"
Dec  2 12:39:04 tr-file-server sshd[19560]: Failed none for root from 192.168.0.25 port 2326 ssh2
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: PAM: password authentication accepted for root
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: do_pam_account: called
Dec  2 12:39:09 tr-file-server sshd[19560]: Accepted password for root from 192.168.0.25 port 2326 ssh2
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: monitor_child_preauth: root has been authenticated by privileged process
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: PAM: establishing credentials
Dec  2 12:39:09 tr-file-server sshd[19560]: pam_unix(sshd:session): session opened for user root by (uid=0)
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: Entering interactive session for SSH2.
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: server_init_dispatch_20
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: server_input_channel_open: ctype session rchan 256 win 16384 max 16384
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: input_session_request
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: channel 0: new [server-session]
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: session_new: session 0
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: session_open: channel 0
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: session_open: session 0: link with channel 0
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: server_input_channel_open: confirm session
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: session_by_channel: session 0 channel 0
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: session_input_channel_req: session 0 req pty-req
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: Allocating pty.
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: session_pty_req: session 0 alloc /dev/pts/4
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: SELinux support disabled
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: server_input_channel_req: channel 0 request shell reply 1
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: session_by_channel: session 0 channel 0
Dec  2 12:39:09 tr-file-server sshd[19560]: debug1: session_input_channel_req: session 0 req shell
Dec  2 12:39:09 tr-file-server sshd[19569]: debug1: Setting controlling tty using TIOCSCTTY.
Dec  2 12:39:09 tr-file-server sshd[19569]: debug1: PAM: reinitializing credentials
Dec  2 12:39:09 tr-file-server sshd[19569]: debug1: permanently_set_uid: 0/0
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: Received SIGCHLD.
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: session_by_pid: pid 19569
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: session_exit_message: session 0 channel 0 pid 19569
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: session_exit_message: release channel 0
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: session_pty_cleanup: session 0 release /dev/pts/4
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: session_by_channel: session 0 channel 0
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: session_close_by_channel: channel 0 child 0
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: session_close: session 0 pid 0
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: channel 0: free: server-session, nchannels 1
Dec  2 12:39:11 tr-file-server sshd[19560]: Connection closed by 192.168.0.25
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: do_cleanup
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: PAM: cleanup
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: PAM: deleting credentials
Dec  2 12:39:11 tr-file-server sshd[19560]: debug1: PAM: closing session
Dec  2 12:39:11 tr-file-server sshd[19560]: pam_unix(sshd:session): session closed for user root
Dec  2 12:39:11 tr-file-server sshd[19560]: Transferred: sent 3624, received 1688 bytes
Dec  2 12:39:11 tr-file-server sshd[19560]: Closing connection to 192.168.0.25 port 2326
« Последнее редактирование: 02 Декабря 2009, 13:41:16 от Sollomon »

Оффлайн Frank

  • Старожил
  • *
  • Сообщений: 1799
  • Профессиональный любитель
    • Просмотр профиля
    • Народный форум Николаева
Re: Слетел пароль root
« Ответ #10 : 02 Декабря 2009, 14:20:07 »
повысь логлевел до дебаг3

Оффлайн Sollomon

  • Автор темы
  • Участник
  • *
  • Сообщений: 230
    • Просмотр профиля
Re: Слетел пароль root
« Ответ #11 : 03 Декабря 2009, 18:39:12 »
DEBUG3

Dec  3 17:45:25 tr-file-server sudo: troyanda : TTY=pts/0 ; PWD=/home/troyanda ; USER=root ; COMMAND=/usr/bin/tail -f /var/log/auth.log
Dec  3 17:45:36 tr-file-server sshd[1883]: debug3: fd 5 is not O_NONBLOCK
Dec  3 17:45:36 tr-file-server sshd[2037]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
Dec  3 17:45:36 tr-file-server sshd[1883]: debug1: Forked child 2037.
Dec  3 17:45:36 tr-file-server sshd[1883]: debug3: send_rexec_state: entering fd = 8 config len 641
Dec  3 17:45:36 tr-file-server sshd[1883]: debug3: ssh_msg_send: type 0
Dec  3 17:45:36 tr-file-server sshd[1883]: debug3: send_rexec_state: done
Dec  3 17:45:36 tr-file-server sshd[2037]: debug1: inetd sockets after dupping: 3, 3
Dec  3 17:45:36 tr-file-server sshd[2037]: Connection from 192.168.0.25 port 4709
Dec  3 17:45:36 tr-file-server sshd[2037]: debug1: Client protocol version 2.0; client software version PuTTY_Release_0.60
Dec  3 17:45:36 tr-file-server sshd[2037]: debug1: no match: PuTTY_Release_0.60
Dec  3 17:45:36 tr-file-server sshd[2037]: debug1: Enabling compatibility mode for protocol 2.0
Dec  3 17:45:36 tr-file-server sshd[2037]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5ubuntu1
Dec  3 17:45:36 tr-file-server sshd[2037]: debug2: fd 3 setting O_NONBLOCK
Dec  3 17:45:36 tr-file-server sshd[2037]: debug2: Network child is on pid 2038
Dec  3 17:45:36 tr-file-server sshd[2037]: debug3: preauth child monitor started
Dec  3 17:45:36 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:36 tr-file-server sshd[2037]: debug3: monitor_read: checking request 0
Dec  3 17:45:36 tr-file-server sshd[2037]: debug3: mm_answer_moduli: got parameters: 1024 4096 8192
Dec  3 17:45:36 tr-file-server sshd[2037]: debug3: mm_request_send entering: type 1
Dec  3 17:45:36 tr-file-server sshd[2037]: debug2: monitor_read: 0 used once, disabling now
Dec  3 17:45:36 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:37 tr-file-server sshd[2037]: debug3: monitor_read: checking request 5
Dec  3 17:45:37 tr-file-server sshd[2037]: debug3: mm_answer_sign
Dec  3 17:45:37 tr-file-server sshd[2037]: debug3: mm_answer_sign: signature 0xb8851d20(271)
Dec  3 17:45:37 tr-file-server sshd[2037]: debug3: mm_request_send entering: type 6
Dec  3 17:45:37 tr-file-server sshd[2037]: debug2: monitor_read: 5 used once, disabling now
Dec  3 17:45:37 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:41 tr-file-server sshd[2037]: debug3: monitor_read: checking request 7
Dec  3 17:45:41 tr-file-server sshd[2037]: debug3: mm_answer_pwnamallow
Dec  3 17:45:41 tr-file-server sshd[2037]: debug3: Trying to reverse map address 192.168.0.25.
Dec  3 17:45:41 tr-file-server sshd[2037]: debug2: parse_server_config: config reprocess config len 641
Dec  3 17:45:41 tr-file-server sshd[2037]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1
Dec  3 17:45:41 tr-file-server sshd[2037]: debug3: mm_request_send entering: type 8
Dec  3 17:45:41 tr-file-server sshd[2037]: debug2: monitor_read: 7 used once, disabling now
Dec  3 17:45:41 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: monitor_read: checking request 48
Dec  3 17:45:42 tr-file-server sshd[2037]: debug1: PAM: initializing for "root"
Dec  3 17:45:42 tr-file-server sshd[2037]: debug1: PAM: setting PAM_RHOST to "192.168.0.25"
Dec  3 17:45:42 tr-file-server sshd[2037]: debug1: PAM: setting PAM_TTY to "ssh"
Dec  3 17:45:42 tr-file-server sshd[2037]: debug2: monitor_read: 48 used once, disabling now
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: monitor_read: checking request 3
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: mm_answer_authserv: service=ssh-connection, style=, role=
Dec  3 17:45:42 tr-file-server sshd[2037]: debug2: monitor_read: 3 used once, disabling now
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: monitor_read: checking request 11
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: mm_answer_authpassword: sending result 0
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: mm_request_send entering: type 12
Dec  3 17:45:42 tr-file-server sshd[2037]: Failed none for root from 192.168.0.25 port 4709 ssh2
Dec  3 17:45:42 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: monitor_read: checking request 11
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: PAM: sshpam_passwd_conv called with 1 messages
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: PAM: password authentication accepted for root
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_answer_authpassword: sending result 1
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_request_send entering: type 12
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_request_receive_expect entering: type 49
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: do_pam_account: called
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: PAM: do_pam_account pam_acct_mgmt = 0 (Success)
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_request_send entering: type 50
Dec  3 17:45:47 tr-file-server sshd[2037]: Accepted password for root from 192.168.0.25 port 4709 ssh2
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: monitor_child_preauth: root has been authenticated by privileged process
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_get_keystate: Waiting for new keys
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_request_receive_expect entering: type 25
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_request_receive entering
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_newkeys_from_blob: 0xb88e2918(139)
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: mac_setup: found hmac-sha1
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_get_keystate: Waiting for second key
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_newkeys_from_blob: 0xb88e2918(139)
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: mac_setup: found hmac-sha1
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_get_keystate: Getting compression state
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_get_keystate: Getting Network I/O buffers
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_share_sync: Share sync
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: mm_share_sync: Share sync end
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: PAM: establishing credentials
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: PAM: opening session
Dec  3 17:45:47 tr-file-server sshd[2037]: pam_unix(sshd:session): session opened for user root by (uid=0)
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: PAM: sshpam_store_conv called with 1 messages
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: set_newkeys: mode 0
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: cipher_init: set keylen (16 -> 32)
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: set_newkeys: mode 1
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: cipher_init: set keylen (16 -> 32)
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: Entering interactive session for SSH2.
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: fd 5 setting O_NONBLOCK
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: fd 11 setting O_NONBLOCK
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: server_init_dispatch_20
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: Received SSH2_MSG_IGNORE
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: server_input_channel_open: ctype session rchan 256 win 16384 max 16384
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: input_session_request
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: channel 0: new [server-session]
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: session_new: allocate (allocated 0 max 10)
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: session_unused: session id 0 unused
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: session_new: session 0
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: session_open: channel 0
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: session_open: session 0: link with channel 0
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: server_input_channel_open: confirm session
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: session_by_channel: session 0 channel 0
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: session_input_channel_req: session 0 req pty-req
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: Allocating pty.
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: session_pty_req: session 0 alloc /dev/pts/1
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: tty_parse_modes: SSH2 n_bytes 16
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: tty_parse_modes: ispeed 38400
Dec  3 17:45:47 tr-file-server sshd[2037]: debug3: tty_parse_modes: ospeed 38400
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: SELinux support disabled
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: server_input_channel_req: channel 0 request shell reply 1
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: session_by_channel: session 0 channel 0
Dec  3 17:45:47 tr-file-server sshd[2037]: debug1: session_input_channel_req: session 0 req shell
Dec  3 17:45:47 tr-file-server sshd[2041]: debug1: Setting controlling tty using TIOCSCTTY.
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: fd 3 setting TCP_NODELAY
Dec  3 17:45:47 tr-file-server sshd[2041]: debug1: PAM: reinitializing credentials
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: channel 0: rfd 14 isatty
Dec  3 17:45:47 tr-file-server sshd[2041]: debug1: permanently_set_uid: 0/0
Dec  3 17:45:47 tr-file-server sshd[2037]: debug2: fd 14 setting O_NONBLOCK
Dec  3 17:45:47 tr-file-server sshd[2041]: debug3: Copy environment: PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
Dec  3 17:45:47 tr-file-server sshd[2041]: debug3: Copy environment: LANG=ru_UA.UTF-8
Dec  3 17:45:48 tr-file-server sshd[2041]: debug3: channel 0: close_fds r -1 w -1 e -1 c -1
Dec  3 17:45:48 tr-file-server sshd[2037]: debug3: fd 12 is O_NONBLOCK
Dec  3 17:45:48 tr-file-server sshd[2019]: debug2: channel 0: rcvd adjust 10158
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: read<=0 rfd 14 len -1
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: read failed
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: close_read
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: input open -> drain
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: ibuf empty
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: send eof
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: input drain -> closed
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: Received SIGCHLD.
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: session_by_pid: pid 2041
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: session_exit_message: session 0 channel 0 pid 2041
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: request exit-status confirm 0
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: session_exit_message: release channel 0
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: write failed
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: close_write
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: send eow
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: output open -> closed
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: session_pty_cleanup: session 0 release /dev/pts/1
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: send close
Dec  3 17:45:51 tr-file-server sshd[2037]: debug3: channel 0: will not send data after close
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: notify_done: reading
Dec  3 17:45:51 tr-file-server sshd[2037]: debug3: channel 0: will not send data after close
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: rcvd close
Dec  3 17:45:51 tr-file-server sshd[2037]: debug3: channel 0: will not send data after close
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: is dead
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: gc: notify user
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: session_by_channel: session 0 channel 0
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: session_close_by_channel: channel 0 child 0
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: session_close: session 0 pid 0
Dec  3 17:45:51 tr-file-server sshd[2037]: debug3: session_unused: session id 0 unused
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: gc: user detached
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: is dead
Dec  3 17:45:51 tr-file-server sshd[2037]: debug2: channel 0: garbage collecting
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: channel 0: free: server-session, nchannels 1
Dec  3 17:45:51 tr-file-server sshd[2037]: debug3: channel 0: status: The following connections are open:\r\n  #0 server-session (t4 r256 i3/0 o3/0 fd -1/-1 cfd -1)\r\n
Dec  3 17:45:51 tr-file-server sshd[2037]: debug3: channel 0: close_fds r -1 w -1 e -1 c -1
Dec  3 17:45:51 tr-file-server sshd[2037]: Connection closed by 192.168.0.25
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: do_cleanup
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: PAM: cleanup
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: PAM: deleting credentials
Dec  3 17:45:51 tr-file-server sshd[2037]: debug1: PAM: closing session
Dec  3 17:45:51 tr-file-server sshd[2037]: pam_unix(sshd:session): session closed for user root
Dec  3 17:45:51 tr-file-server sshd[2037]: debug3: PAM: sshpam_thread_cleanup entering
Dec  3 17:45:51 tr-file-server sshd[2037]: Transferred: sent 3272, received 1688 bytes
Dec  3 17:45:51 tr-file-server sshd[2037]: Closing connection to 192.168.0.25 port 4709
« Последнее редактирование: 03 Декабря 2009, 18:46:36 от Sollomon »

Оффлайн baklan

  • Активист
  • *
  • Сообщений: 387
    • Просмотр профиля
    • backline
Re: Слетел пароль root
« Ответ #12 : 03 Декабря 2009, 19:04:46 »
Я не супер профи в Ubuntu, но разве есть возможность логиниться сразу под root ? Просто интересно.

Оффлайн Sollomon

  • Автор темы
  • Участник
  • *
  • Сообщений: 230
    • Просмотр профиля
Re: Слетел пароль root
« Ответ #13 : 03 Декабря 2009, 19:09:36 »
Я не супер профи в Ubuntu, но разве есть возможность логиниться сразу под root ? Просто интересно.

))) Ну, если не супер профи, тогда зачем писать? Проблема серьезная.
А, чтобы можно было логиниться рутом нужно включить рута командой sudo passwd root

Оффлайн baklan

  • Активист
  • *
  • Сообщений: 387
    • Просмотр профиля
    • backline
Re: Слетел пароль root
« Ответ #14 : 03 Декабря 2009, 19:16:13 »
))) Ну, если не супер профи, тогда зачем писать? Проблема серьезная.
А, чтобы можно было логиниться рутом нужно включить рута командой sudo passwd root
Как зачем, хочу стать супер профи :)
Серьезно, не вижу смысла сразу логиниться рутом, если можно зайти простым пользователем и затем получить права рута через sudo.
Или я неправиильно понял?
Ну и непонятно как "обычные пользователи" полазили, что-то понаделали, что теперь у рута пароль сброшен... видимо пользователи не совсем обычные :) или с лайв-СД загружались.

 

Страница сгенерирована за 0.073 секунд. Запросов: 23.