On Sun, Jan 30, 2005 at 12:43:59AM -0800, Andrew Konstantinov wrote: > > Jan 29 14:53:38 mail sshd[699]: login_getclass: unknown class 'root' > Jan 29 14:53:38 mail last message repeated 3 times > Jan 29 14:53:38 mail sshd[699]: Accepted publickey for root from 192.168.0.1 > port 60094 ssh2 > Jan 29 14:53:38 mail sshd[698]: Accepted publickey for root from 192.168.0.1 > port 60094 ssh2 > Jan 29 15:32:15 mail sshd[836]: login_getclass: unknown class 'root' > Jan 29 15:32:15 mail last message repeated 3 times > Jan 29 15:32:15 mail sshd[836]: Accepted publickey for root from 192.168.0.1 > port 53837 ssh2 > Jan 29 15:32:15 mail sshd[835]: Accepted publickey for root from 192.168.0.1 > port 53837 ssh2 > Jan 29 16:40:16 mail sshd[1034]: login_getclass: unknown class 'root' > Jan 29 16:40:16 mail last message repeated 3 times > Jan 29 16:40:16 mail sshd[1034]: Accepted publickey for root from 192.168.0.1 > port 54714 ssh2 > Jan 29 16:40:16 mail sshd[1033]: Accepted publickey for root from 192.168.0.1 > port 54714 ssh2 > Jan 29 17:10:27 mail sshd[1125]: login_getclass: unknown class 'root' > Jan 29 17:10:27 mail last message repeated 3 times > Jan 29 17:10:27 mail sshd[1125]: Accepted publickey for root from 192.168.0.1 > port 54337 ssh2 > Jan 29 17:10:27 mail sshd[1124]: Accepted publickey for root from 192.168.0.1 > port 54337 ssh2
Silence... Does that mean that reading auth.log is out of fashion now or that nobody has seen anything similar in RELENG_5 systems? Could someone either confirm or disprove the existence of those two bugs before I file a PR? Thanks in advance, Andrew
pgpFBtauAt0GL.pgp
Description: PGP signature