[Info-vax] SSH footprint
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Wed Oct 28 13:44:45 EDT 2009
In article <f75f4a79-d80b-49af-b148-57633ba7f76f at p23g2000vbl.googlegroups.com>, Jose Baars <peut at peut.org> writes:
>I seem to remember having installed a point fix for SSH
>from HP for this exact problem.
>If you have a support contract it's always a good idea to report
>it, it's what you pay for, and very often you get a fix.
HP TCP/IP Services for OpenVMS Alpha Version V5.6
on an AlphaServer XYZZY running OpenVMS V8.3
%%%%%%%%%%% OPCOM 28-OCT-2009 12:35:06.77 %%%%%%%%%%%
Message from user AUDIT$SERVER on XYZZY
Security alarm (SECURITY) on XYZZY, system id: 1369
Auditable event: Network login
Event time: 28-OCT-2009 12:35:06.76
PID: 000201B2
Process name: TCPIP$S_BG23326
Username: TCPIP$SSH
Process owner: [TCPIP$AUX,TCPIP$SSH]
Image name: XYZZYL$DKA0:[SYS0.SYSCOMMON.][SYSEXE]LOGINOUT.EXE
Remote node id: 1234567890 (12.345)
Remote node fullname: shuttlecock.badminton.net
Remote username: TCPIP$SSH
Posix UID: -2
Posix GID: -2 (%XFFFFFFFE)
%%%%%%%%%%% OPCOM 28-OCT-2009 12:35:07.71 %%%%%%%%%%%
Message from user AUDIT$SERVER on XYZZY
Security alarm (SECURITY) on XYZZY, system id: 1369
Auditable event: Detached process login
Event time: 28-OCT-2009 12:35:07.71
PID: 000201B3
Process name: _FTA120:
Username: SYSTEM
Process owner: [HEGEMONY,SYSTEM]
Terminal name: FTA120:
Image name: XYZZY$DKA0:[SYS0.SYSCOMMON.][SYSEXE]LOGINOUT.EXE
Posix UID: -2
Posix GID: -2 (%XFFFFFFFE)
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
http://www.quirkfactory.com/popart/asskey/eqn2.png
"Well my son, life is like a beanstalk, isn't it?"
More information about the Info-vax
mailing list