----------------------------------------------------------------------------------------------------------------------------------
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: rexec start in 4 out 4 newsock 4 pipe 6 sock 7
Feb 14 13:24:27 vsxxxxxx sshd[9985]: debug1: Forked child 23971.
Feb 14 13:24:27 vsxxxxxx sshd[23971]: error opening /proc/self/oom_adj: No such file or directory
Feb 14 13:24:27 vsxxxxxx sshd[23971]: error opening /proc/self/oom_adj: No such file or directory
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: inetd sockets after dupping: 3, 3
Feb 14 13:24:27 vsxxxxxx sshd[23971]: Connection from xx.xx.xx.xxx port 58831
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: Client protocol version 2.0; client software version OpenSSH_5.1p1 Debian-6ubuntu2
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: match: OpenSSH_5.1p1 Debian-6ubuntu2 pat OpenSSH*
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: Enabling compatibility mode for protocol 2.0
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: PAM: initializing for "xxx"
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: PAM: setting PAM_RHOST to "xdsl-87-79-85-199.netcologne.de"
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: PAM: setting PAM_TTY to "ssh"
Feb 14 13:24:27 vsxxxxxx sshd[23971]: Failed none for xxx from xx.xx.xx.xxx port 58831 ssh2
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: Checking blacklist file /usr/share/ssh/blacklist.DSA-1024
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: Checking blacklist file /etc/ssh/blacklist.DSA-1024
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: temporarily_use_uid: 10004/2523 (e=0/0)
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: trying public key file /var/www/vhosts/atheisten.org/.ssh/authorized_keys
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: restore_uid: 0/0
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: temporarily_use_uid: 10004/2523 (e=0/0)
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: trying public key file /var/www/vhosts/atheisten.org/.ssh/authorized_keys
Feb 14 13:24:27 vsxxxxxx sshd[23971]: debug1: restore_uid: 0/0
Feb 14 13:24:27 vsxxxxxx sshd[23971]: Failed publickey for xxx from xx.xx.xx.xxx port 58831 ssh2
Feb 14 13:24:33 vsxxxxxx sshd[23971]: debug1: PAM: password authentication accepted for xxx
Feb 14 13:24:34 vsxxxxxx sshd[23971]: debug1: do_pam_account: called
Feb 14 13:24:36 vsxxxxxx sshd[23971]: Accepted password for xxx from xx.xx.xx.xxx port 58831 ssh2
Feb 14 13:24:36 vsxxxxxx sshd[23971]: debug1: monitor_child_preauth: xxx has been authenticated by privileged process
Feb 14 13:24:36 vsxxxxxx sshd[23971]: debug1: PAM: establishing credentials
Feb 14 13:24:36 vsxxxxxx sshd[23971]: pam_unix(sshd:session): session opened for user xxx by (uid=0)
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: SELinux support disabled
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: PAM: establishing credentials
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: permanently_set_uid: 10004/2523
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: Entering interactive session for SSH2.
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: server_init_dispatch_20
Feb 14 13:24:36 vsxxxxxx sshd[23971]: User child is on pid 25942
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: server_input_channel_open: ctype session rchan 0 win 1048576 max 16384
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: input_session_request
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: channel 0: new [server-session]
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: session_new: session 0
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: session_open: channel 0
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: session_open: session 0: link with channel 0
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: server_input_channel_open: confirm session
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: server_input_global_request: rtype
[email protected] want_reply 0
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: server_input_channel_req: channel 0 request pty-req reply 1
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: session_by_channel: session 0 channel 0
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: session_input_channel_req: session 0 req pty-req
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: Allocating pty.
Feb 14 13:24:36 vsxxxxxx sshd[23971]: debug1: session_new: session 0
Feb 14 13:24:36 vsxxxxxx sshd[23971]: debug1: SELinux support disabled
Feb 14 13:24:36 vsxxxxxx sshd[25942]: debug1: session_pty_req: session 0 alloc /dev/pts/2
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: server_input_channel_req: channel 0 request env reply 0
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_by_channel: session 0 channel 0
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_input_channel_req: session 0 req env
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: server_input_channel_req: channel 0 request shell reply 1
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_by_channel: session 0 channel 0
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_input_channel_req: session 0 req shell
Feb 14 13:24:37 vsxxxxxx sshd[26113]: debug1: Setting controlling tty using TIOCSCTTY.
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: Received SIGCHLD.
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_by_pid: pid 26113
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_exit_message: session 0 channel 0 pid 26113
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_exit_message: release channel 0
Feb 14 13:24:37 vsxxxxxx sshd[23971]: debug1: session_by_tty: session 0 tty /dev/pts/2
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_by_channel: session 0 channel 0
Feb 14 13:24:37 vsxxxxxx sshd[23971]: debug1: session_pty_cleanup: session 0 release /dev/pts/2
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_close_by_channel: channel 0 child 0
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: session_close: session 0 pid 0
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: channel 0: free: server-session, nchannels 1
Feb 14 13:24:37 vsxxxxxx sshd[25942]: Connection closed by xx.xx.xx.xxx
Feb 14 13:24:37 vsxxxxxx sshd[25942]: debug1: do_cleanup
Feb 14 13:24:37 vsxxxxxx sshd[25942]: Transferred: sent 2248, received 2256 bytes
Feb 14 13:24:37 vsxxxxxx sshd[25942]: Closing connection to xx.xx.xx.xxx port 58831
Feb 14 13:24:37 vsxxxxxx sshd[23971]: debug1: PAM: cleanup
Feb 14 13:24:37 vsxxxxxx sshd[23971]: debug1: PAM: deleting credentials
Feb 14 13:24:37 vsxxxxxx sshd[23971]: debug1: PAM: closing session
Feb 14 13:24:37 vsxxxxxx sshd[23971]: pam_unix(sshd:session): session closed for user xxx
----------------------------------------------------------------------------------------------------------------------------------