On Sun, Jan 30, 2005 at 12:43:59AM -0800, Andrew Konstantinov wrote:
> 
> Jan 29 14:53:38 mail sshd[699]: login_getclass: unknown class 'root'
> Jan 29 14:53:38 mail last message repeated 3 times
> Jan 29 14:53:38 mail sshd[699]: Accepted publickey for root from 192.168.0.1 
> port 60094 ssh2
> Jan 29 14:53:38 mail sshd[698]: Accepted publickey for root from 192.168.0.1 
> port 60094 ssh2
> Jan 29 15:32:15 mail sshd[836]: login_getclass: unknown class 'root'
> Jan 29 15:32:15 mail last message repeated 3 times
> Jan 29 15:32:15 mail sshd[836]: Accepted publickey for root from 192.168.0.1 
> port 53837 ssh2
> Jan 29 15:32:15 mail sshd[835]: Accepted publickey for root from 192.168.0.1 
> port 53837 ssh2
> Jan 29 16:40:16 mail sshd[1034]: login_getclass: unknown class 'root'
> Jan 29 16:40:16 mail last message repeated 3 times
> Jan 29 16:40:16 mail sshd[1034]: Accepted publickey for root from 192.168.0.1 
> port 54714 ssh2
> Jan 29 16:40:16 mail sshd[1033]: Accepted publickey for root from 192.168.0.1 
> port 54714 ssh2
> Jan 29 17:10:27 mail sshd[1125]: login_getclass: unknown class 'root'
> Jan 29 17:10:27 mail last message repeated 3 times
> Jan 29 17:10:27 mail sshd[1125]: Accepted publickey for root from 192.168.0.1 
> port 54337 ssh2
> Jan 29 17:10:27 mail sshd[1124]: Accepted publickey for root from 192.168.0.1 
> port 54337 ssh2

Silence... Does that mean that reading auth.log is out of fashion now or that
nobody has seen anything similar in RELENG_5 systems? Could someone either
confirm or disprove the existence of those two bugs before I file a PR?

Thanks in advance,
       Andrew

Attachment: pgpFBtauAt0GL.pgp
Description: PGP signature

Reply via email to