Mar 13 20:49:09 localhost sshd[17254]: debug1: Forked child 17298.
Mar 13 20:49:09 localhost sshd[17298]: Set /proc/self/oom_score_adj to 0
Mar 13 20:49:09 localhost sshd[17298]: debug1: rexec start in 5 out 5 newsock 5 pipe 7 sock 8
Mar 13 20:49:09 localhost sshd[17298]: debug1: inetd sockets after dupping: 3, 3
Mar 13 20:49:09 localhost sshd[17298]: Connection from XX.XX.XX.XX port 42922
Mar 13 20:49:09 localhost sshd[17298]: debug1: Client protocol version 2.0; client software version OpenSSH_5.8p2_hpn13v11 FreeBSD-20110503
Mar 13 20:49:09 localhost sshd[17298]: debug1: match: OpenSSH_5.8p2_hpn13v11 FreeBSD-20110503 pat OpenSSH*
Mar 13 20:49:09 localhost sshd[17298]: debug1: Enabling compatibility mode for protocol 2.0
Mar 13 20:49:09 localhost sshd[17298]: debug1: Local version string SSH-2.0-OpenSSH_5.3
Mar 13 20:49:09 localhost sshd[17299]: debug1: permanently_set_uid: 74/74
Mar 13 20:49:09 localhost sshd[17299]: debug1: list_hostkey_types: ssh-rsa,ssh-dss
Mar 13 20:49:09 localhost sshd[17299]: debug1: SSH2_MSG_KEXINIT sent
Mar 13 20:49:09 localhost sshd[17299]: debug1: SSH2_MSG_KEXINIT received
Mar 13 20:49:09 localhost sshd[17299]: debug1: kex: client->server aes128-ctr hmac-md5 none
Mar 13 20:49:09 localhost sshd[17299]: debug1: kex: server->client aes128-ctr hmac-md5 none
Mar 13 20:49:09 localhost sshd[17299]: debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
Mar 13 20:49:09 localhost sshd[17299]: debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
Mar 13 20:49:09 localhost sshd[17299]: debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
Mar 13 20:49:09 localhost sshd[17299]: debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
Mar 13 20:49:09 localhost sshd[17299]: debug1: SSH2_MSG_NEWKEYS sent
Mar 13 20:49:09 localhost sshd[17299]: debug1: expecting SSH2_MSG_NEWKEYS
Mar 13 20:49:09 localhost sshd[17299]: debug1: SSH2_MSG_NEWKEYS received
Mar 13 20:49:09 localhost sshd[17299]: debug1: KEX done
Mar 13 20:49:10 localhost sshd[17299]: debug1: userauth-request for user root service ssh-connection method none
Mar 13 20:49:10 localhost sshd[17299]: debug1: attempt 0 failures 0
[B]Mar 13 20:49:10 localhost sshd[17298]: reverse mapping checking getaddrinfo for XX.XX.XX.XX [XX.XX.XX.XX] failed - POSSIBLE BREAK-IN ATTEMPT![/B]
Mar 13 20:49:10 localhost sshd[17298]: debug1: PAM: initializing for "root"
Mar 13 20:49:10 localhost sshd[17298]: debug1: PAM: setting PAM_RHOST to "XX.XX.XX.XX"
Mar 13 20:49:10 localhost sshd[17298]: debug1: PAM: setting PAM_TTY to "ssh"
Mar 13 20:49:12 localhost sshd[17299]: debug1: userauth-request for user root service ssh-connection method password
Mar 13 20:49:12 localhost sshd[17299]: debug1: attempt 1 failures 0
[B]Mar 13 20:49:12 localhost sshd[17298]: debug1: PAM: password authentication accepted for root[/B]
Mar 13 20:49:12 localhost sshd[17298]: debug1: do_pam_account: called
[B]Mar 13 20:49:12 localhost sshd[17298]: Accepted password for root from XX.XX.XX.XX port 42922 ssh2
Mar 13 20:49:12 localhost sshd[17298]: debug1: monitor_child_preauth: root has been authenticated by privileged process[/B]
Mar 13 20:49:12 localhost sshd[17298]: debug1: temporarily_use_uid: 0/0 (e=0/0)
Mar 13 20:49:12 localhost sshd[17298]: debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism
Mar 13 20:49:12 localhost sshd[17298]: debug1: restore_uid: 0/0
Mar 13 20:49:12 localhost sshd[17298]: debug1: SELinux support enabled
Mar 13 20:49:12 localhost sshd[17298]: debug1: PAM: establishing credentials
Mar 13 20:49:12 localhost sshd[17298]: pam_unix(sshd:session): session opened for user root by (uid=0)
Mar 13 20:49:12 localhost sshd[17298]: debug1: Entering interactive session for SSH2.
Mar 13 20:49:12 localhost sshd[17298]: debug1: server_init_dispatch_20
Mar 13 20:49:12 localhost sshd[17298]: debug1: server_input_channel_open: ctype session rchan 0 win 2097152 max 32768
Mar 13 20:49:12 localhost sshd[17298]: debug1: input_session_request
Mar 13 20:49:12 localhost sshd[17298]: debug1: channel 0: new [server-session]
Mar 13 20:49:12 localhost sshd[17298]: debug1: session_new: session 0
Mar 13 20:49:12 localhost sshd[17298]: debug1: session_open: channel 0
Mar 13 20:49:12 localhost sshd[17298]: debug1: session_open: session 0: link with channel 0
Mar 13 20:49:12 localhost sshd[17298]: debug1: server_input_channel_open: confirm session
Mar 13 20:49:12 localhost sshd[17298]: debug1: server_input_global_request: rtype no-more-sessions@openssh.com want_reply 0
Mar 13 20:49:12 localhost sshd[17298]: debug1: server_input_channel_req: channel 0 request exec reply 1
Mar 13 20:49:12 localhost sshd[17298]: debug1: session_by_channel: session 0 channel 0
Mar 13 20:49:12 localhost sshd[17298]: debug1: session_input_channel_req: session 0 req exec
Mar 13 20:49:12 localhost sshd[17303]: debug1: PAM: reinitializing credentials
Mar 13 20:49:12 localhost sshd[17303]: debug1: permanently_set_uid: 0/0
[B]Mar 13 20:49:12 localhost sshd[17298]: debug1: Received SIGCHLD.[/B]
Mar 13 20:49:12 localhost sshd[17298]: debug1: session_by_pid: pid 17303
Mar 13 20:49:12 localhost sshd[17298]: debug1: session_exit_message: session 0 channel 0 pid 17303
Mar 13 20:49:12 localhost sshd[17298]: debug1: session_exit_message: release channel 0
[B]Mar 13 20:49:12 localhost sshd[17298]: Received disconnect from XX.XX.XX.XX: 11: disconnected by user[/B]
Mar 13 20:49:12 localhost sshd[17298]: debug1: do_cleanup
Mar 13 20:49:12 localhost sshd[17298]: debug1: PAM: cleanup
Mar 13 20:49:12 localhost sshd[17298]: debug1: PAM: closing session
Mar 13 20:49:12 localhost sshd[17298]: pam_unix(sshd:session): session closed for user root
Mar 13 20:49:12 localhost sshd[17298]: debug1: PAM: deleting credentials