Hello, I have a server problem. Because the server restart is saved at around 6 am and in these hours the server is already turned off and I do not want to run I need to add some permissions or something? What can it be to blame?
tfs 1.3
began to display to me such a message in the console, "has been executed as root user, please consider running it as a normal user.", can this be the reason?
authlog
tfs 1.3
began to display to me such a message in the console, "has been executed as root user, please consider running it as a normal user.", can this be the reason?
authlog
Rich (BB code):
Jun 16 06:25:35 X CRON[2125]: pam_unix(cron:session): session closed for user root
Jun 16 06:34:04 X sshd[2537]: Address 117.5.134.92 maps to localhost, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 06:34:04 X sshd[2537]: Invalid user admin from 117.5.134.92
Jun 16 06:34:04 X sshd[2537]: input_userauth_request: invalid user admin [preauth]
Jun 16 06:34:04 X sshd[2537]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:34:04 X sshd[2537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.5.134.92
Jun 16 06:34:06X sshd[2537]: Failed password for invalid user admin from 117.5.134.92 port 55103 ssh2
Jun 16 06:34:06 X sshd[2537]: Disconnecting: Too many authentication failures for invalid user admin from 117.5.134.92 port 55103 ssh2 [preauth]
Jun 16 06:34:55 X sshd[2539]: Invalid user curlycait from 202.106.93.46
Jun 16 06:34:55 X sshd[2539]: input_userauth_request: invalid user curlycait [preauth]
Jun 16 06:34:55 X sshd[2539]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:34:55 X sshd[2539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
Jun 16 06:34:58 X sshd[2539]: Failed password for invalid user curlycait from 202.106.93.46 port 51073 ssh2
Jun 16 06:34:58 X sshd[2539]: Disconnecting: Too many authentication failures for invalid user curlycait from 202.106.93.46 port 51073 ssh2 [preauth]
Jun 16 06:39:01 X CRON[2542]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 06:39:01 X CRON[2542]: pam_unix(cron:session): session closed for user root
Jun 16 06:46:47 X sshd[2591]: Received disconnect from 68.183.95.97: 11: Bye Bye [preauth]
Jun 16 06:47:01 X CRON[2593]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 06:47:12 X CRON[2593]: pam_unix(cron:session): session closed for user root
Jun 16 06:54:19 X sshd[2600]: Invalid user adm from 104.196.16.112
Jun 16 06:54:19 X sshd[2600]: input_userauth_request: invalid user adm [preauth]
Jun 16 06:54:19 X sshd[2600]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:54:19 X sshd[2600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.16.196.104.bc.googleusercontent.com
Jun 16 06:54:21 X sshd[2600]: Failed password for invalid user adm from 104.196.16.112 port 55592 ssh2
Jun 16 06:54:21 X sshd[2600]: Disconnecting: Too many authentication failures for invalid user adm from 104.196.16.112 port 55592 ssh2 [preauth]
Jun 16 07:04:30 X sshd[2602]: reverse mapping checking getaddrinfo for 152717.cloudwaysapps.com [128.199.133.249] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 07:04:30 X sshd[2602]: Invalid user anish from 128.199.133.249
Jun 16 07:04:30 X sshd[2602]: input_userauth_request: invalid user anish [preauth]
Jun 16 07:04:30 X sshd[2602]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 07:04:30 X sshd[2602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249
Jun 16 07:04:32 X sshd[2602]: Failed password for invalid user anish from 128.199.133.249 port 53298 ssh2
Jun 16 07:04:32 X sshd[2602]: Disconnecting: Too many authentication failures for invalid user anish from 128.199.133.249 port 53298 ssh2 [preauth]
Jun 16 07:09:00 X sshd[2604]: reverse mapping checking getaddrinfo for 110.55.109.42.bti.net.ph [110.55.109.42] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 07:09:00 X sshd[2604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.55.109.42 user=root
Jun 16 07:09:01 X CRON[2606]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 07:09:01 X CRON[2606]: pam_unix(cron:session): session closed for user root
Jun 16 07:09:02 X sshd[2604]: Failed password for root from 110.55.109.42 port 55549 ssh2
Jun 16 07:09:02 X sshd[2604]: Disconnecting: Too many authentication failures for root from 110.55.109.42 port 55549 ssh2 [preauth]
Jun 16 07:10:21 X sshd[2657]: Accepted password for root from 46.134.182.16 port 2899 ssh2
Jun 16 07:10:21 X sshd[2657]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jun 16 07:11:09 X sshd[2670]: Accepted password for root from 46.134.182.16 port 5610 ssh2
Jun 16 07:11:09 X sshd[2670]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jun 16 07:17:01 X CRON[2673]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 07:17:01 X CRON[2673]: pam_unix(cron:session): session closed for user root
Last edited: