/lib/ld-linux.so.2 __gmon_start__ libdl.so.2 libnsl.so.1 libz.so.1 deflate _DYNAMIC inflate _init inflateInit_ deflateInit_ _fini _GLOBAL_OFFSET_TABLE_ inflateEnd deflateEnd libutil.so.1 logwtmp openpty login logout libpam.so.0 pam_getenvlist pam_end pam_chauthtok pam_authenticate pam_close_session pam_setcred pam_open_session pam_set_item pam_acct_mgmt pam_strerror pam_start libcrypto.so.0 EVP_DigestInit BN_rand RSA_generate_key EVP_DigestFinal BN_bin2bn BN_CTX_new BN_value_one BN_bn2bin RAND_add DSA_do_sign BN_sub PEM_write_DSAPrivateKey HMAC_Final EVP_md5 BIO_s_file DSA_generate_key RC4_set_key DH_generate_key DH_size BN_hex2bn BN_num_bits DSA_new BIO_free DH_new DH_compute_key EVP_sha1 BIO_ctrl DSA_free RSA_private_decrypt des_cbc_encrypt RSA_new BF_set_key BN_bn2dec EVP_ripemd160 DSA_do_verify BIO_new MD5_Init RAND_status BN_dec2bn RSA_public_encrypt BN_free BN_mod MD5_Final BN_is_bit_set EVP_DigestUpdate RAND_bytes CAST_set_key PEM_read_bio_DSAPrivateKey BN_CTX_free des_set_key BN_mask_bits des_ede3_cbc_encrypt des_ncbc_encrypt DH_free DSA_SIG_new RSA_free DSA_SIG_free BN_copy DSA_generate_parameters BF_cbc_encrypt HMAC_cleanup CAST_cbc_encrypt EVP_des_ede3_cbc BN_clear_free HMAC_Init BN_new MD5_Update BN_cmp HMAC_Update libc.so.6 longjmp strcpy waitpid ioctl chown printf stdout cfgetospeed connect ungetc sigemptyset strerror fdopen geteuid memmove snprintf getgrgid __ctype_b getenv __strtol_internal execve getprotobyname getpid fgets memcpy execl pclose perror dup2 getuid feof malloc cfgetispeed endpwent sleep optarg vsnprintf recvfrom rmdir socket select fflush lseek sigaddset strncasecmp freeaddrinfo abort chmod getnameinfo alarm popen __sigsetjmp pipe __lxstat accept cfsetispeed strrchr gai_strerror write environ fprintf kill ctime strcat bind inet_addr __deregister_frame_info chdir initgroups endgrent setsockopt cfsetospeed optind stdin wait umask innetgr __progname ferror setgid signal read openlog closelog strncmp strncpy unlink setenv strcasecmp htonl realloc strtok memcmp listen fork sscanf execv sigaction regcomp gettimeofday getopt memset ntohs tcgetattr regexec syslog seteuid nice strcmp shutdown getpwuid gethostbyname getpwnam fgetc gethostname sprintf fclose atexit strcspn getpeername regerror stderr mkstemp error getsockopt getaddrinfo socketpair __xstat htons __errno_location exit __fxstat setbuf getgrnam fopen atoi fileno vsyslog _IO_stdin_used _exit strspn daemon __libc_start_main strlen open vhangup regfree strchr fputs setsid fcntl setuid tcsetattr mkdir __ctype_tolower __register_frame_info close setlogin strpbrk sigsuspend free sigprocmask getsockname program_invocation_short_name __environ _environ _edata __bss_start _end GLIBC_2.0 GLIBC_2.1 PTRh4 PRhl 80t1@80t,@80t'@ 8*t1B8*t,B8*t'B D$$PU 8"t/B8"t*B8"t%B D$ P D$ Ph` D$,P 80t1@80t,@80t'@ [^_] UWVS D$DPh T$tRh j Uh L$XQj PWUh 9D$`} ;D$`~ D$`F9 T$X;5DK F;5DK \$X1 ;5DK F;5DK ;5DK F;5DK D$TP T$DRQ 9\$\} 9T$\} T$dRh L$`Q D$p9D$`} L$T1 Rh" L$pQ D$xP L$pQ D$PP T$`R L$xQ T$PR SVh@ L$pQ D$xP Vh_ UWVS1 D$0P PhF" T$ RV Ph@# PWhPK D$ Pj U [^_] UWVS \$. D$8P D$4Ph`. D$$Ph D$(P D$4P D$(P D$$P D$,P D$4Ph D$ P Ph / Ph`/ D$$Ph D$(PS D$$P D$8P D$ P [^_] UWVS PVUWh`0 [^_] ~%ht . PRh`2 ~(hU UWVS D$,P ShC4 Ph*4 <-u Ph`4 <@u Phg> ShR= PSh@; 8&t/F8&t*F8&t%F 8#t/C8#t*C8#t%C UWVS D$

Z PhWZ [^_] SVh 80t1@80t,@80t'@ PQh 80t1@80t,@80t'@ PSh t$(V Ph`[ D$ P Ph \ D$)P Rh`\ D$$Ph [^_] t$(V D$$PR D$$PR [^_] Wh+] UWVS UVSWh [^_] ,UWV D$8P D$

XuD >Xu; >/u= D$(% [^_] T$ j D$ Rj \$ j UWVS 80t1@80t,@80t'@ 3[^_] 8.u` :.u. 8=t" 8=u" 8.u @(#)$OpenBSD: sshd.c,v 1.132 2000/10/13 18:34:46 markus Exp $ none,zlib hmac-sha1,hmac-md5,hmac-ripemd160@openssh.com 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc@lysator.liu.se ssh-dss diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 /etc/ssh/sshd_config Received SIGHUP; restarting. RESTART FAILED: av0='%s', error: %s. Received signal %d; terminating. Timeout before authentication for %s. Generating new %d bit RSA key. RSA key generation complete. OpenSSH_2.3.0p1 SSH-%d.%d-%.100s Could not write ident string to %s. Did not receive ident string from %s. SSH-1.5-W1.0 SSH-%d.%d-%[^ Protocol mismatch. Bad protocol version identification '%.100s' from %s Client protocol version %d.%d; client software version %.100s Your ssh version is too old and is no longer supported. Please install a newer version. Local version string %.200s Protocol major versions differ. Protocol major versions differ for %s: %.200s vs. %.200s drop_connection: p %g, r %g f:p:b:k:h:g:V:u:diqQ46 Too high debugging level. too many ports. sshd version %s Usage: %s [options] Options: -f file Configuration file (default %s) -d Debugging mode (multiple -d means more debugging) -i Started from inetd -q Quiet (no logging) -p port Listen on the specified port (default: 22) -k seconds Regenerate server key every this many seconds (default: 3600) -g seconds Grace period for authentication (default: 300) -b bits Size of server RSA key (default: 768 bits) /etc/ssh/ssh_host_key -h file File from which to read host key (default: %s) -u len Maximum hostname length for utmp recording -4 Use IPv4 only -6 Use IPv6 only Extra argument %s. sshd version %.100s no RSA support in libssl and libcrypto. See ssl(8) Disabling protocol version 1 Could not load host key: %.200s: %.100s Could not load DSA host key: %.200s Disabling protocol version 2 sshd: no hostkeys available -- exiting. Bad server key size. Forcing server key to %d bits to make it differ from host key. daemon() failed: %.200s /dev/tty inetd sockets after dupping: %d, %d Generating %d bit RSA key. Too many listen sockets. Enlarge MAX_LISTEN_SOCKS getnameinfo failed socket: %.100s listen_sock O_NONBLOCK: %s Bind to port %s on %s. Bind to port %s on %s failed: %.200s. Server listening on %s port %s. listen: %.100s Cannot bind any address. select: %.100s accept: %.100s newsock del O_NONBLOCK: %s drop connection #%d Server will not fork when running in debugging mode. fork: %.100s Forked child %d. Connection from %.500s port %d Closing connection to %.100s Sent %d bit public key and %d bit host key. Warning: client selects unsupported cipher. IP Spoofing check bytes do not match. Encryption type: %.200s sshd.c Packet integrity error (%d != %d) at %s:%d Packet integrity error. (%d) do_connection: %s: private_key %d < host_key %d + SSH_KEY_BITS_RESERVED %d do_connection: %s: host_key %d < private_key %d + SSH_KEY_BITS_RESERVED %d do_connection: bad len from %s: session_key_int %d > sizeof(session_key) %d Received session key; encryption turned on. Unsupported key exchange %d send SSH2_MSG_NEWKEYS. done: send SSH2_MSG_NEWKEYS. Wait SSH2_MSG_NEWKEYS. GOT SSH2_MSG_NEWKEYS. done: KEX2. Wait SSH2_MSG_KEXDH_INIT. dh_client_pub == NULL bad client public DH value Wait SSH2_MSG_KEX_DH_GEX_REQUEST. Sending SSH2_MSG_KEX_DH_GEX_GROUP. Wait SSH2_MSG_KEX_DH_GEX_INIT. @(#)$OpenBSD: auth.c,v 1.11 2000/10/11 20:27:23 markus Exp $ /bin/sh @(#)$OpenBSD: auth1.c,v 1.6 2000/10/11 20:27:23 markus Exp $ password rhosts-rsa rhosts bad-auth-msg-%d Rhosts authentication disabled. auth1.c Packet integrity error (%d != %d) at %s:%d Packet integrity error. (%d) ruser %s Rhosts with RSA authentication disabled. RSA_new failed BN_new failed Warning: keysize mismatch for client_host_key: actual %d, announced %d RSA authentication disabled. Password authentication disabled. TIS authentication unsupported. Unknown message during authentication: type %d internal error: authenticated for pw == NULL Root login accepted for forced command. ROOT LOGIN REFUSED FROM %.200s ROOT illegal user Accepted Failed %s %s for %s%.100s from %.200s port %d%s Too many authentication failures for %.100s Cannot change user when server not running as root. Attempting authentication for %s%.100s. Login for user %s from %.100s, accepted without authentication. internal error, authentication successfull for user '%.100s' @(#)$OpenBSD: auth2.c,v 1.20 2000/10/14 12:16:56 markus Exp $ password keyboard-interactive publickey none auth: protocol error: type %d plen %d auth2.c Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. input_service_request: no authctxt ssh-userauth bad service request %s input_userauth_request: no authctxt too many failed userauth_requests userauth-request for user %s service %s method %s attempt #%d ssh-connection input_userauth_request: setting up authctxt for %s input_userauth_request: illegal user %s input_userauth_request: missmatch: (%s,%s)!=(%s,%s) input_userauth_request: try method %s input_userauth_request: unsupported method %s input_userauth_request: INTERNAL ERROR: authenticated invalid user %s service %s ROOT LOGIN REFUSED FROM %.200s Accepted Failed Postponed ROOT NOUSER %s %s for %.200s from %.200s port %d ssh2 password change not supported keyboard-interactive language %s devs %s userauth_pubkey: disabled because of invalid user ssh-dss bad pkalg %s test whether pkalg/pkblob are acceptable NULL Unrecognized authentication method name: %s .ssh/authorized_keys2 %.500s/%.100s %s authentication refused for %.100s: bad ownership or modes for '%s'. .ssh matching key found: file %s, line %ld @(#)$OpenBSD: auth-skey.c,v 1.9 2000/10/19 16:41:13 deraadt Exp $ @(#)$OpenBSD: auth2-skey.c,v 1.1 2000/10/11 20:14:38 markus Exp $ @(#)$OpenBSD: auth-rhosts.c,v 1.16 2000/10/03 18:03:03 markus Exp $ NO_PLUS Found empty line in %.100s. Found garbage in %.100s. %s %s %s Ignoring wild host/user names in %.100s. Matched negative entry in %.100s. .rhosts .shosts %.500s/%.100s /etc/hosts.equiv /etc/ssh/shosts.equiv Accepted for %.100s [%.100s] by /etc/hosts.equiv. Accepted for %.100s [%.100s] by %.100s. Rhosts authentication refused for %.100s: no home directory %.200s Rhosts authentication refused for %.100s: bad ownership or modes for home directory. Rhosts authentication refused for %.100s: bad modes for %.200s Bad file modes for %.200s Server has been configured to ignore %.100s. Accepted by %.100s. @(#)$OpenBSD: auth-options.c,v 1.5 2000/10/09 21:32:34 markus Exp $ no-port-forwarding Port forwarding disabled. no-agent-forwarding Agent forwarding disabled. no-X11-forwarding X11 forwarding disabled. no-pty Pty allocation disabled. command=" .ssh/authorized_keys %.100s, line %lu: missing end quote Forced command: %.900s environment=" Adding to environment: %.900s from=" Authentication tried for %.100s with correct key but not from a permitted host (host=%.200s, ip=%.200s). Your host '%.200s' is not permitted to use this key for login. Bugs in auth-options.c option processing. Bad options in %.100s file, line %lu: %.50s @(#)$OpenBSD: auth-krb4.c,v 1.19 2000/10/03 18:03:02 markus Exp $ @(#)$Id: auth-pam.c,v 1.18 2000/10/14 15:08:49 stevesk Exp $ Cannot close PAM session[%d]: %.200s Cannot delete credentials[%d]: %.200s Cannot release PAM authentication[%d]: %.200s PAM Password authentication accepted for user "%.100s" PAM Password authentication for "%.100s" failed[%d]: %s PAM setting rhost to "%.200s" PAM set rhost failed[%d]: %.200s PAM setting ruser to "%.200s" PAM set ruser failed[%d]: %.200s Warning: Your password has expired, please change it now PAM rejected by account configuration[%d]: %.200s PAM setting tty to "%.200s" PAM set tty failed[%d]: %.200s PAM session setup failed[%d]: %.200s PAM establishing creds PAM setcred failed[%d]: %.200s PAM pam_chauthtok failed[%d]: %.200s Starting up PAM with username "%.200s" sshd PAM initialisation failed[%d]: %.200s @(#)$OpenBSD: auth-passwd.c,v 1.18 2000/10/03 18:03:03 markus Exp $ @(#)$OpenBSD: auth-rsa.c,v 1.32 2000/10/14 12:19:45 markus Exp $ auth-rsa.c Packet integrity error (%d != %d) at %s:%d Packet integrity error. (%d) auth_rsa_challenge_dialog: bad challenge length %d .ssh/authorized_keys %.500s/%.100s Could not open %.900s for reading. If your home is on an NFS volume, it may need to be world-readable. RSA authentication refused for %.100s: bad ownership or modes for '%s'. .ssh %.100s, line %lu: bad key syntax Warning: %s, line %ld: keysize mismatch: actual %d vs. announced %d. Wrong response to RSA authentication challenge. RSA authentication accepted. @(#)$OpenBSD: auth-rh-rsa.c,v 1.17 2000/10/03 18:03:03 markus Exp $ Trying rhosts with RSA host authentication for client user %.100s Rhosts RSA authentication: canonical host %.900s /etc/ssh/ssh_known_hosts ~/.ssh/known_hosts Rhosts RSA authentication refused for %.100s: bad owner or modes for %.200s Rhosts with RSA host authentication denied: unknown or invalid host key Your host key cannot be verified: unknown or invalid host key. Client on %.800s failed to respond correctly to host authentication. Rhosts with RSA host authentication accepted for %.100s, %.100s on %.700s. Rhosts with RSA host authentication accepted. @(#)$OpenBSD: dh.c,v 1.2 2000/10/11 20:11:35 markus Exp $ Bad prime description in line %d /etc/ssh/primes WARNING: %s does not exist, using old prime WARNING: no primes in %s, using old prime @(#)$OpenBSD: pty.c,v 1.16 2000/09/07 21:13:37 markus Exp $ openpty: %.100s chown %.100s 0 0 failed: %.100s chmod %.100s 0666 failed: %.100s /dev/tty setsid: %.100s Failed to disconnect from controlling tty. Setting controlling tty using TIOCSCTTY. %.100s: %.100s open /dev/tty failed - could not set controlling tty: %.100s chown(%.100s, %d, %d) failed: %.100s chmod(%.100s, 0%o) failed: %.100s @(#)$OpenBSD: log-server.c,v 1.17 2000/09/12 20:53:10 markus Exp $ Unrecognized internal syslog level code %d Unrecognized internal syslog facility code %d error fatal debug1 debug2 debug3 internal error %s: %s %.500s @(#)$OpenBSD: login.c,v 1.15 2000/09/07 20:27:52 deraadt Exp $ @(#)$Id: loginrec.c,v 1.26 2000/09/30 10:34:44 djm Exp $ login_get_lastlog: Cannot find account for uid %i login_init_entry: Cannot find user "%s" Attempt to write login records by non-root user (aborting) /dev/ syslogin_perform_login: couldn't malloc() syslogin_perform_logout: logout() returned an error syslogin_write_entry: Invalid type field /var/log/lastlog lastlog_perform_login: Couldn't stat %s: %s %s/%s lastlog_openseek: %.100s is not a file or directory! lastlog_openseek: Couldn't open %s: %s lastlog_openseek: %s->lseek(): %s lastlog_write_filemode: Error writing to %s: %s lastlog_write_entry: Invalid type field lastlog_get_entry: Error reading from %s: %s @(#)$OpenBSD: servconf.c,v 1.53 2000/10/14 12:12:09 markus Exp $ /etc/ssh/ssh_host_key /etc/ssh/ssh_host_dsa_key /var/run/sshd.pid /usr/X11R6/bin/xauth maxstartups subsystem gatewayports protocol ciphers denygroups allowgroups denyusers allowusers allowtcpforwarding keepalive randomseed uselogin permitemptypasswords strictmodes xauthlocation x11displayoffset x11forwarding ignoreuserknownhosts ignorerhosts printmotd listenaddress checkmail kbdinteractiveauthentication passwordauthentication dsaauthentication rsaauthentication rhostsrsaauthentication rhostsauthentication loglevel syslogfacility permitrootlogin keyregenerationinterval logingracetime serverkeybits pidfile hostdsakey hostkey port %s: line %d: Bad configuration option: %s bad addr or host: %s (%s) %s line %d: ports must be specified before ListenAdress. %s line %d: too many ports. %s line %d: missing port number. %s line %d: missing integer value. %s line %d: missing inet addr. %s line %d: missing file name. %s line %d: "randomseed" option is obsolete. %s line %d: missing yes/without-password/no argument. without-password %s line %d: Bad yes/without-password/no argument: %s %s line %d: missing yes/no argument. %s line %d: Bad yes/no argument: %s %.200s line %d: unsupported log facility '%s' %.200s line %d: unsupported log level '%s' %s line %d: too many allow users. %s line %d: too many deny users. %s line %d: too many allow groups. %s line %d: too many deny groups. %s line %d: Missing argument. %s line %d: Bad SSH2 cipher spec '%s'. %s line %d: Bad protocol spec '%s'. %s line %d: too many subsystems defined. %s line %d: Missing subsystem name. %s line %d: Subsystem '%s' already defined. %s line %d: Missing subsystem command. %s line %d: Missing MaxStartups spec. %d:%d:%d %s line %d: Illegal MaxStartups spec. %s line %d: Missing handler for opcode %s (%d) %s line %d: garbage at end of line; "%.200s". %s: terminating, %d bad configuration options @(#)$OpenBSD: serverloop.c,v 1.34 2000/10/27 07:32:18 markus Exp $ Received SIGCHLD. Strange, got SIGCHLD and wait returned pid %d but child is %d tvp!=NULL kid %d mili %d select: %.100s Connection closed by remote host. Read error from remote host: %.100s Entering interactive session. Waiting for forwarded connections to terminate... End of interactive session; stdin %ld, stdout (read %ld, sent %ld), stderr %ld bytes. wait: %.100s Strange, wait returned pid %d, expected %d Command exited with status %d. Received exit confirmation. Command terminated on signal %d. wait returned status %04x. Entering interactive session for SSH2. !channel_still_open. serverloop.c Packet integrity error (%d != %d) at %s:%d Packet integrity error. (%d) EOF received for stdin. Window change received. Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. open direct-tcpip: from %s port %d to %s port %d direct-tcpip server_input_channel_open: ctype %s rchan %d win %d max %d session open session server-session session open failed, free channel %d confirm %s failure %s bla bla server_init_dispatch_20 server_init_dispatch_13 server_init_dispatch_15 @(#)$OpenBSD: session.c,v 1.42 2000/10/27 07:32:18 markus Exp $ xauthfile_cleanup_proc called pty_cleanup_proc: no session pty_cleanup_proc: %s session.c Packet integrity error (%d != %d) at %s:%d Packet integrity error. (%d) Received illegal compression level %d. Allocating a pty not permitted for this authentication. Protocol error: you already have a pty. Allocating pty. Failed to allocate pty. X11 forwarding disabled in server configuration file. No xauth program; cannot forward with spoofing. X11 forwarding not permitted for this authentication. Received request for X11 forwarding with auth spoofing. Protocol error: X11 display already set. /tmp/ssh-XXXXXXXX private X11 dir: mkdtemp %s failed: %s /cookies Authentication agent forwarding not permitted for this authentication. Received authentication agent forwarding request. Port forwarding not permitted for this authentication. Port forwarding not permitted. Received TCP/IP port forwarding request. Exec command '%.500s' Forced command '%.500s' Unknown packet type received after authentication: %d Could not create socket pairs: %.100s do_exec_no_pty: no session setsid failed: %.100s dup2 stdin dup2 stdout dup2 stderr fork failed: %.100s do_exec_pty: no session dup2 stdin failed: %.100s dup #1 failed: %.100s dup #2 failed: %.100s getpeername: %.100s %.200s/.hushlogin Last login: %s Last login: %s from %s /etc/motd %s=%s Bad line in %.100s: %.200s PAM environment: %s=%s setlogin failed: %s setgid initgroups Failed to set uids to %u. /bin/sh USER LOGNAME HOME /usr/local/bin:/bin:/usr/bin:/usr/X11R6/bin PATH /var/spool/mail %.200s/%.50s MAIL SHELL %.50s %d %d SSH_CLIENT SSH_TTY TERM DISPLAY SSH_ORIGINAL_COMMAND XAUTHORITY SSH_AUTH_SOCK %.200s/.ssh/environment Environment: %.200s Could not chdir to home directory %s: %s .ssh/rc Running /bin/sh %s /bin/sh .ssh/rc %s %s Could not run %s /etc/ssh/sshrc /bin/sh /etc/ssh/sshrc Running %.100s add %.100s %.100s %.100s Adding %.*s/unix%s %s %s %s -q - add %s %s %s add %.*s/unix%s %s %s No mail. You have mail. You have new mail. login /bin/login session_new: init session_new: session %d dump: used %d session %d %p channel %d pid %d session_open: channel %d no more sessions no user for session %i session_open: session %d: link with channel %d session_by_channel: session %d channel %d session_by_channel: unknown channel %d session_by_pid: pid %d session_by_pid: unknown pid %d Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. session_pty_req: session %d alloc failed session_pty_req: session %d alloc %s subsystem request for %s subsystem: exec() %s subsystem request for %s failed, subsystem not found X11 forwarding disabled in user configuration file. X11 fwd already started. session_input_channel_req: channel %d: no session session_input_channel_req: channel %d: bad channel session_input_channel_req: session %d channel %d request %s reply %d shell exec pty-req x11-req subsystem window-change session_set_fds: called for proto != 2.0 no channel for session %d session_pty_cleanup: session %i release %s close(s->ptymaster): %s session_close: no session session_close: session %d: no channel %d session_exit_message: session %d channel %d pid %d exit-status exit-signal wait returned status %04x. session_exit_message: release channel %d session_free: session %d pid %d session_close_by_pid: no session for pid %d session_close_by_channel: no session for channel %d session_close_by_channel: channel %d kill %d session_close_by_channel: Unsafe s->pid = %d session_close_by_channel: kill %d: %s notty no user for session %d %s@%s @(#)$OpenBSD: atomicio.c,v 1.7 2000/10/18 18:04:02 markus Exp $ @(#)$OpenBSD: authfile.c,v 1.20 2000/10/11 20:27:23 markus Exp $ save_private_key_rsa: bad cipher SSH PRIVATE KEY FILE FORMAT 1.1 Write to key file %.200s failed: %.100s passphrase too short: %d bytes open %s failed fdopen %s failed Read from key file %.200s failed: %.100s Bad key file %.200s. Unsupported cipher %d used in key file %.200s. Bad passphrase supplied for key file %.200s. BIO_new failed fdopen failed PEM_read_bio_DSAPrivateKey failed dsa w/o comment read DSA private key done @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: UNPROTECTED PRIVATE KEY FILE! @ Bad ownership or mode(0%3.3o) for '%s'. It is recommended that your private key files are NOT accessible by others. .pub @(#)$OpenBSD: bufaux.c,v 1.13 2000/09/07 20:27:50 deraadt Exp $ buffer_put_bignum: BN_bn2bin() failed: oi %d != bin_size %d buffer_get_bignum: input buffer too small negativ! Received packet with bad string length %d @(#)$OpenBSD: buffer.c,v 1.8 2000/09/07 20:27:50 deraadt Exp $ buffer_get: trying to get more bytes than in buffer buffer_consume: trying to get more bytes than in buffer buffer_consume_end: trying to get more bytes than in buffer %02x @(#)$OpenBSD: canohost.c,v 1.16 2000/10/21 17:04:22 markus Exp $ getpeername failed: %.100s get_remote_hostname: getnameinfo NI_NUMERICHOST failed reverse mapping checking getaddrinfo for %.700s failed - POSSIBLE BREAKIN ATTEMPT! Address %.100s maps to %.600s, but this does not map back to the address - POSSIBLE BREAKIN ATTEMPT! Could not reverse map address %.100s. %2.2x Connection from %.100s with IP options:%.800s UNKNOWN getsockname failed: %.100s get_sock_port: getnameinfo NI_NUMERICSERV failed @(#)$OpenBSD: channels.c,v 1.72 2000/10/27 07:48:22 markus Exp $ channel_lookup: %d: bad id channel_lookup: %d: bad id: channel free channel: expanding %d channel %d: new [%s] channel free: bad local channel %d channel_free: channel %d: status: %s channel_free: channel %d: dettaching channel user Closing channel %d after input drain. Initial X11 packet contains bad byte order byte: 0x%x X11 connection uses different authentication protocol. X11 auth data does not match fake data. X11 fake_data_len %d != saved_data_len %d X11 connection rejected because of wrong authentication. X11 rejected %d i%d/o%d X11 closed %d i%d/o%d X11 connection requested. accept: %.100s X11 connection from %.200s port %d ssh2 x11 bug compat mode Connection to port %d forwarding to %.100s port %d requested. listen port %d for %.100s port %d, connect from %.200s port %d direct-tcpip accept from auth socket: %.100s accepted auth socket channel %d: read<=0 rfd %d len %d Channel %d status set to input draining. filter stops channel %d channel %d: written %d to efd %d channel %d: read %d from efd %d channel %d: closing efd %d channel %d: window %d sent adjust %d channel: %d: no data after CLOSE cannot happen: istate == INPUT_WAIT_DRAIN for proto 1.3 Received data for nonexistent channel %d. channels.c Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. channel %d: rcvd big packet %d, maxpack %d channel %d: rcvd too much data %d, win %d Packet integrity error (%d != %d) at %s:%d Packet integrity error. (%d) Received extended_data for bad channel %d. channel %d: ext data for non open channel %d: bad ext data channel %d: rcvd too much extended_data %d, win %d channel %d: rcvd ext data %d channel %d: big input buffer %d channel %d: big output buffer %d Received ieof for nonexistent channel %d. Received close for nonexistent channel %d. Received oclose for nonexistent channel %d. Received close confirmation for out-of-range channel %d. Received close confirmation for non-closed channel %d (type %d). Received open confirmation for non-opening channel %d. callback start callback done channel %d: open confirm rwindow %d rmax %d Received open failure for non-opening channel %d. channel_open_failure: %d: reason %d: %s Received request for non-open channel %d. channel: %d rcvd request for %s cb_fn %p cb_event %d Received window adjust for non-open channel %d. channel %d: rcvd adjust %d cannot happen: SSH_CHANNEL_LARVAL cannot happen: OUT_DRAIN channel_still_open: bad channel type %d The following connections are open: #%d %.300s (t%d r%d i%d/%d o%d/%d fd %d/%d) channel_open_message: bad channel type %d Forward host name too long. getaddrinfo: fatal error channel_request_local_forwarding: getnameinfo failed socket: %.100s Local forwarding listening on %s port %s. bind: %.100s listen: %.100s port listener cannot listen port: %d channel_request_remote_forwarding: too many forwards 0.0.0.0 tcpip-forward Requested forwarding of port %d but user is not root. %.100s: unknown host (%s) channel_connect_to: getnameinfo failed connect %.100s port %s: %.100s connect %.100s port %d: failed. unknown (remote did not supply name) Received request to connect to %.100s:%d, but the request was denied. getaddrinfo: %.100s x11_create_display_inet: Socket family %d not supported bind port %d: %.100s Failed to allocate internet-domain X11 display socket. gethostname: %.100s %.400s:%d.%d X11 inet listener x11 listener /usr/spool/sockets/X11/%u /var/X/.X11-unix/X%u /tmp/.X11-unix/X%u connect %.100s: %.100s DISPLAY DISPLAY not set. unix: Could not parse display number from DISPLAY: %.100s Could not find ':' in DISPLAY: %.100s %.100s: unknown host. (%s) connect %.100s port %d: %.100s Received X11 open request. Warning: ssh server tried agent forwarding. Warning: ssh server tried X11 forwarding. deny_input_open: type %d plen %d Warning: this is probably a break in attempt by a malicious server. x11_request_forwarding: bad authentication data: %.100s %02x x11-req Protocol error: authentication forwarding requested twice. /tmp/ssh-XXXXXXXX Agent forwarding disabled: mkdtemp() failed: %.100s %s/agent.%d auth socket Forwarding authentication connection. authentication agent connection channel_open: %d: bad id send channel open %d channel request %d: %s channel_request: %d: bad id channel_register_callback: %d: bad id channel_register_cleanup: %d: bad id channel_cancel_cleanup: %d: bad id channel_register_filter: %d: bad id channel_activate for non-larval channel %d. @(#)$OpenBSD: cipher.c,v 1.37 2000/10/23 19:31:54 markus Exp $ Warning: use of DES is strongly discouraged due to cryptographic weaknesses no IV for %s. rijndael_cbc_encrypt: bad len %d rijndael_cbc_decrypt: bad len %d rijndael-cbc@lysator.liu.se rijndael256-cbc rijndael192-cbc rijndael128-cbc aes256-cbc aes192-cbc aes128-cbc arcfour cast128-cbc blowfish-cbc 3des-cbc blowfish 3des none bad cipher %s [%s] cipher ok: %s [%s] ciphers ok: [%s] cipher_init: key length %d is insufficient for %s. cipher_init: iv length %d is insufficient for %s. cipher_encrypt: bad plaintext length %d cipher_decrypt: bad ciphertext length %d @(#)$OpenBSD: compat.c,v 1.27 2000/10/31 09:31:58 markus Exp $ Enabling compatibility mode for protocol 2.0 Enabling compatibility mode for protocol 1.3 ^2\. ^1\.7 SecureFX ^3\.0 SecureCRT ^2\.4$ ^2\.[2-9]\. ^2\.[23]\.0 ^2\.0\. ^2\.1\.0 MindTerm ^OpenSSH[-_]2\.[012] regerror: %s match: %s pat %s no match: %s ignoring bad proto spec: '%s'. @(#)$OpenBSD: dispatch.c,v 1.5 2000/09/21 11:25:34 markus Exp $ Hm, dispatch protocol error: type %d plen %d protocol error: rcvd type %d @(#)$OpenBSD: dsa.c,v 1.11 2000/09/07 20:27:51 deraadt Exp $ ssh-dss dsa_key_from_blob: cannot handle type %s dsa_key_from_blob: remaining bytes in key blob %d dsa_sign: no DSA key dsa_sign: cannot sign bad sig size %d %d sig size %d %d datafellows dsa_verify: no DSA key autodetect SSH_BUG_SIGBLOB autoremove SSH_BUG_SIGBLOB len %d datafellows %d dsa_verify: cannot handle type %s remaining bytes in signature %d bad sigbloblen %d != SIGBLOB_LEN correct incorrect error dsa_verify: signature %s DSA_generate_parameters failed DSA_generate_keys failed @(#)$OpenBSD: hostfile.c,v 1.20 2000/09/07 20:27:51 deraadt Exp $ Warning: %s, line %d: keysize mismatch for host %s: actual %d vs. announced %d. Warning: replace %d with %d in %s, line %d. no key to look up add_host_to_hostfile: saving key in %s failed @(#)$OpenBSD: key.c,v 1.11 2000/09/07 20:27:51 deraadt Exp $ key_new: bad key type %d key_free: bad key type %d key_equal: bad key type %d key_fingerprint: bad key type %d %02x: write_bignum: BN_bn2dec() failed ssh-dss key_read: uudecode %s failed key_read: dsa_key_from_blob %s failed key_read: bad key type: %d key_write: failed for RSA key ssh-dss %s %s unknown @(#)$OpenBSD: kex.c,v 1.12 2000/10/11 20:27:23 markus Exp $ send KEXINIT done wait KEXINIT got kexinit: %s first kex follow: %d reserved: %d kex.c Packet integrity error (%d bytes remaining) at %s:%d Packet integrity error. invalid public DH value: negativ bits set: %d/%d invalid public DH value (%d/%d) DH_generate_key dh_new_group1: too many bad keys: giving up DH_new BN_hex2bn p BN_hex2bn g FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B139B22514A08798E3404DDEF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7EDEE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381FFFFFFFFFFFFFFFF %02x no matching cipher found: client %s server %s matching cipher is not supported: %s no matching mac found: client %s server %s hmac-md5 hmac-sha1 hmac-ripemd160@openssh.com unsupported mac %s no matching comp found: client %s server %s zlib none unsupported comp %s no kex alg diffie-hellman-group1-sha1 diffie-hellman-group-exchange-sha1 bad kex alg %s no hostkey alg ssh-dss bad hostkey alg %s client->server server->client kex: %s %s %s %s @(#)$OpenBSD: log.c,v 1.11 2000/09/30 16:27:43 markus Exp $ fatal_remove_cleanup: no such cleanup function: 0x%lx 0x%lx Calling cleanup 0x%lx(0x%lx) LOCAL7 LOCAL6 LOCAL5 LOCAL4 LOCAL3 LOCAL2 LOCAL1 LOCAL0 AUTH USER DAEMON DEBUG3 DEBUG2 DEBUG1 DEBUG VERBOSE INFO ERROR FATAL QUIET @(#)$OpenBSD: match.c,v 1.9 2000/09/07 20:27:52 deraadt Exp $ @(#)$OpenBSD: mpaux.c,v 1.14 2000/09/07 20:27:52 deraadt Exp $ @(#)$OpenBSD: nchan.c,v 1.19 2000/09/07 20:27:52 deraadt Exp $ channel %d: rcvd oclose channel %d: input wait_oclose -> closed channel %d: input open -> closed channel %d: input drain -> closed channel %d: protocol error: chan_rcvd_oclose for istate %d channel %d: read failed channel %d: input open -> drain channel %d: input: no drain shortcut channel %d: internal error: we do not read, but chan_read_failed for istate %d channel %d: ibuf empty channel %d: internal error: chan_ibuf_empty for non empty buffer channel %d: input drain -> wait_oclose channel %d: internal error: chan_ibuf_empty for istate %d channel %d: rcvd ieof channel %d: non-open channel %d: non-open: input open -> wait_oclose channel %d: istate %d != open channel %d: non-open: output open -> closed channel %d: ostate %d != open channel %d: output open -> drain channel %d: output wait_ieof -> closed channel %d: protocol error: chan_rcvd_ieof for ostate %d channel %d: write failed channel %d: output open -> wait_ieof channel %d: output wait_drain -> closed channel %d: internal error: chan_write_failed for ostate %d channel %d: obuf empty channel %d: internal error: chan_obuf_empty for non empty buffer channel %d: output drain -> closed channel %d: internal error: chan_obuf_empty for ostate %d channel %d: send ieof channel %d: internal error: cannot send ieof for istate %d channel %d: send oclose channel %d: internal error: cannot send oclose for ostate %d channel %d: full closed channel %d: rcvd close channel %d: protocol error: close rcvd twice channel %d: rcvd eof channel %d: output open -> closed internal error: chan_obuf_empty %d for non empty buffer channel %d: send eof channel %d: internal error: cannot send eof for istate %d channel %d: send close channel %d: internal error: cannot send close for istate/ostate %d/%d channel %d: internal error: already sent close channel %d: full closed2 channel %d: close_write channel %d: chan_shutdown_write: shutdown() failed for fd%d: %.100s channel %d: chan_shutdown_write: close() failed for fd%d: %.100s channel %d: close_read channel %d: chan_shutdown_read: shutdown() failed for fd%d [i%d o%d]: %.100s channel %d: chan_shutdown_read: close() failed for fd%d: %.100s @(#)$OpenBSD: packet.c,v 1.38 2000/10/12 14:21:12 markus Exp $ bad KEX none packet_set_connection: cannot load cipher 'none' fcntl O_NONBLOCK: %.100s Compression already enabled. crc32 compensation attack: network attack detected packet_set_encryption_key: unknown cipher number %d packet_set_encryption_key: keylen too small: %d outgoing seqnr wraps around packet_send2: no KEX packet.c Packet integrity error (%d != %d) at %s:%d Packet integrity error. (%d) Connection closed by %.200s Read from socket failed: %.100s Protocol error: expected packet type %d, got %d Bad packet length %d. packet_read_poll: len %d != buffer_len %d. Corrupted check bytes on input. padding error: need %d block %d mod %d Corrupted MAC on input. incoming seqnr wraps around Corrupted padlen %d on input. packet_read_poll2: no KEX Remote: %.900s Received disconnect: %d: %.900s Received disconnect: %.900s packet_disconnect called recursively. Disconnecting: %.100s Write failed: %.100s setsockopt SO_KEEPALIVE: %.100s setsockopt IPTOS_LOWDELAY: %.100s setsockopt TCP_NODELAY: %.100s setsockopt IPTOS_THROUGHPUT: %.100s packet_set_maxsize: called twice: old %d new %d packet_set_maxsize: bad size %d packet_set_maxsize: setting to %d @(#)$Id: entropy.c,v 1.21 2000/10/16 09:13:43 djm Exp $ /dev/urandom Couldn't open random pool "%s": %s Couldn't read from random pool "%s": %s Seeding random number generator Entropy collection failed and entropy exhausted @(#)$OpenBSD: readpass.c,v 1.12 2000/10/11 20:14:39 markus Exp $ @(#)$OpenBSD: rsa.c,v 1.16 2000/09/07 20:27:53 deraadt Exp $ Generating RSA keys: rsa_generate_key: key generation failed. Key generation complete. rsa_public_encrypt() exponent too small or not odd rsa_public_encrypt() failed rsa_private_decrypt() failed @(#)$OpenBSD: tildexpand.c,v 1.8 2000/09/07 20:27:55 deraadt Exp $ User name after tilde too long. Unknown user %100s. Home directory too long (%d > %d %s/%s @(#)$OpenBSD: ttymodes.c,v 1.8 2000/09/07 20:27:55 deraadt Exp $ tcgetattr: %.100s cfsetispeed failed for %d cfsetospeed failed for %d Ignoring unsupported tty mode opcode %d (0x%x) parse_tty_modes: unknown opcode %d ttymodes.c Packet integrity error (%d != %d) at %s:%d Packet integrity error. (%d) Setting tty modes failed: %.100s @(#)$OpenBSD: uidswap.c,v 1.9 2000/09/07 20:27:55 deraadt Exp $ seteuid %u: %.100s setuid %u: %.100s @(#)$OpenBSD: util.c,v 1.6 2000/10/27 07:32:19 markus Exp $ fcntl(%d, F_GETFL, 0): %s fd %d IS O_NONBLOCK fd %d setting O_NONBLOCK fcntl(%d, F_SETFL, O_NONBLOCK): %s @(#)$OpenBSD: uuencode.c,v 1.7 2000/09/07 20:27:55 deraadt Exp $ @(#)$OpenBSD: xmalloc.c,v 1.8 2000/09/07 20:27:55 deraadt Exp $ xmalloc: out of memory (allocating %d bytes) xrealloc: NULL pointer given as argument xrealloc: out of memory (new_size %d bytes) xfree: NULL pointer given as argument @(#)$OpenBSD: authfd.c,v 1.29 2000/10/09 21:51:00 markus Exp $ SSH_AUTH_SOCK Error writing to authentication socket. Error reading response length from authentication socket. Authentication response too long: %d Error reading response from authentication socket. Bad authentication reply message type: %d Too many identities in authentication reply: %d Warning: identity keysize mismatch: actual %d, announced %u Compatibility with ssh protocol version 1.0 no longer supported. Agent admitted failure to authenticate using the key. Bad authentication response: %d Agent admitted failure to sign using the key. ssh-dss SSH_AGENT_FAILURE Bad response from authentication agent: %d @(#)$OpenBSD: cli.c,v 1.2 2000/10/16 09:38:44 djm Exp $ /dev/tty You have no controlling tty. Cannot read passphrase. Cannot read passphrase. @(#)$OpenBSD: compress.c,v 1.9 2000/09/07 20:27:50 deraadt Exp $ Enabling compression at level %d. Bad compression level %d. 1.1.3 compress outgoing: raw data %lu, compressed %lu, factor %.2f compress incoming: raw data %lu, compressed %lu, factor %.2f buffer_compress: deflate returned %d buffer_uncompress: inflate returned %d @(#)$OpenBSD: crc32.c,v 1.7 2000/09/07 20:27:51 deraadt Exp $ detect_attack: bad length %d Installing crc compensation attack detector. @(#)$OpenBSD: hmac.c,v 1.4 2000/09/07 20:27:51 deraadt Exp $ hmac: no key ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ /etc/hosts.allow /etc/hosts.deny missing newline or line too long missing ":" separator cannot open %s: %m matched: %s line %d EXCEPT netgroup support is disabled KNOWN LOCAL 01234567890./ ::ffff: banners deny allow severity nice setenv rfc931 twist spawn keepalive linger umask group user missing option name bad option name: "%s" option "%s" requires value option "%s" requires no value option "%s" must be at end option: %s %s %s/%s %s: %m unknown group: "%s" setgid(%s): %m unknown user: "%s" setuid(%s): %m %o%c bad umask value: "%s" %d%c bad linger value: "%s" setsockopt SO_LINGER %d: %m setsockopt SO_KEEPALIVE: %m bad nice value: "%s" nice(%d): %m twist option in resident process twist %s to %s twist_option: dup: %m /bin/sh twist_option: /bin/sh: %m bad rfc931 timeout: "%s" memory allocation failure local7 local6 local5 local4 local3 local2 local1 local0 cron uucp news auth daemon mail kern debug info notice warning crit alert emerg bad syslog facility or severity: "%s" rule ends in ":" cannot fork: %m /dev/null open /dev/null: %m dup: %m /bin/sh execl /bin/sh: %m socket: %m fdopen: %m %u,%u %u , %u : USERID :%*[^:]:%255s %s@%s refused connect from %s (%s) unrecognized %%%c percent_x: expansion too long: %.30s... can't get client address: %m getsockname: %m AF_INET AF_INET6 can't verify hostname: getaddrinfo(%s, %s) failed localhost host name/name mismatch: %s != %.*s host name/address mismatch: %s != %.*s request_fill: invalid key: %d %s: %s, line %d: %s %s: %s warning error n;^ Qkkbal i]Wb 9a&g MGiI wn>Jj #.zf +o*7 @(#) hosts_access.c 1.21 97/02/12 02:13:22 @(#) options.c 1.17 96/02/11 17:01:31 @(#) shell_cmd.c 1.5 94/12/28 17:42:44 @(#) rfc931.c 1.10 95/01/02 16:11:34 @(#) eval.c 1.3 95/01/30 19:51:45 unknown paranoid @(#) refuse.c 1.5 94/12/28 17:42:39 @(#) percent_x.c 1.4 94/12/28 17:42:37 1234567890!@%-_=+:,./abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ @(#) clean_exit.c 1.4 94/12/28 17:42:19 @(#) socket.c 1.15 97/03/21 19:27:24 @(#) update.c 1.1 94/12/28 17:42:56 @(#) misc.c 1.2 96/02/11 17:01:29 @(#) diag.c 1.1 94/12/28 17:42:20 .symtab .strtab .shstrtab .interp .note.ABI-tag .hash .dynsym .dynstr .gnu.version .gnu.version_r .rel.got .rel.bss .rel.plt .init .plt .text .fini .rodata .data .eh_frame .ctors .dtors .got .dynamic .sbss .bss