• There is NO official Otland's Discord server and NO official Otland's server list. The Otland's Staff does not manage any Discord server or server list. Moderators or administrator of any Discord server or server lists have NO connection to the Otland's Staff. Do not get scammed!

The server does not start after reboot

Dorianek

Member
Joined
Nov 29, 2018
Messages
247
Reaction score
10
Location
Poland
Hello, I have a server problem. Because the server restart is saved at around 6 am and in these hours the server is already turned off and I do not want to run I need to add some permissions or something? What can it be to blame?
tfs 1.3

began to display to me such a message in the console, "has been executed as root user, please consider running it as a normal user.", can this be the reason?

authlog
Rich (BB code):
Jun 16 06:25:35 X CRON[2125]: pam_unix(cron:session): session closed for user root
Jun 16 06:34:04 X sshd[2537]: Address 117.5.134.92 maps to localhost, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 06:34:04 X sshd[2537]: Invalid user admin from 117.5.134.92
Jun 16 06:34:04 X sshd[2537]: input_userauth_request: invalid user admin [preauth]
Jun 16 06:34:04 X sshd[2537]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:34:04 X sshd[2537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.5.134.92
Jun 16 06:34:06X sshd[2537]: Failed password for invalid user admin from 117.5.134.92 port 55103 ssh2
Jun 16 06:34:06 X sshd[2537]: Disconnecting: Too many authentication failures for invalid user admin from 117.5.134.92 port 55103 ssh2 [preauth]
Jun 16 06:34:55 X sshd[2539]: Invalid user curlycait from 202.106.93.46
Jun 16 06:34:55 X sshd[2539]: input_userauth_request: invalid user curlycait [preauth]
Jun 16 06:34:55 X sshd[2539]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:34:55 X sshd[2539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
Jun 16 06:34:58 X sshd[2539]: Failed password for invalid user curlycait from 202.106.93.46 port 51073 ssh2
Jun 16 06:34:58 X sshd[2539]: Disconnecting: Too many authentication failures for invalid user curlycait from 202.106.93.46 port 51073 ssh2 [preauth]
Jun 16 06:39:01 X CRON[2542]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 06:39:01 X CRON[2542]: pam_unix(cron:session): session closed for user root
Jun 16 06:46:47 X sshd[2591]: Received disconnect from 68.183.95.97: 11: Bye Bye [preauth]
Jun 16 06:47:01 X CRON[2593]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 06:47:12 X CRON[2593]: pam_unix(cron:session): session closed for user root
Jun 16 06:54:19 X sshd[2600]: Invalid user adm from 104.196.16.112
Jun 16 06:54:19 X sshd[2600]: input_userauth_request: invalid user adm [preauth]
Jun 16 06:54:19 X sshd[2600]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:54:19 X sshd[2600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.16.196.104.bc.googleusercontent.com
Jun 16 06:54:21 X sshd[2600]: Failed password for invalid user adm from 104.196.16.112 port 55592 ssh2
Jun 16 06:54:21 X sshd[2600]: Disconnecting: Too many authentication failures for invalid user adm from 104.196.16.112 port 55592 ssh2 [preauth]
Jun 16 07:04:30 X sshd[2602]: reverse mapping checking getaddrinfo for 152717.cloudwaysapps.com [128.199.133.249] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 07:04:30 X sshd[2602]: Invalid user anish from 128.199.133.249
Jun 16 07:04:30 X sshd[2602]: input_userauth_request: invalid user anish [preauth]
Jun 16 07:04:30 X sshd[2602]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 07:04:30 X sshd[2602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249
Jun 16 07:04:32 X sshd[2602]: Failed password for invalid user anish from 128.199.133.249 port 53298 ssh2
Jun 16 07:04:32 X sshd[2602]: Disconnecting: Too many authentication failures for invalid user anish from 128.199.133.249 port 53298 ssh2 [preauth]
Jun 16 07:09:00 X sshd[2604]: reverse mapping checking getaddrinfo for 110.55.109.42.bti.net.ph [110.55.109.42] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 07:09:00 X sshd[2604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.55.109.42  user=root
Jun 16 07:09:01 X CRON[2606]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 07:09:01 X CRON[2606]: pam_unix(cron:session): session closed for user root
Jun 16 07:09:02 X sshd[2604]: Failed password for root from 110.55.109.42 port 55549 ssh2
Jun 16 07:09:02 X sshd[2604]: Disconnecting: Too many authentication failures for root from 110.55.109.42 port 55549 ssh2 [preauth]
Jun 16 07:10:21 X sshd[2657]: Accepted password for root from 46.134.182.16 port 2899 ssh2
Jun 16 07:10:21 X sshd[2657]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jun 16 07:11:09 X sshd[2670]: Accepted password for root from 46.134.182.16 port 5610 ssh2
Jun 16 07:11:09 X sshd[2670]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jun 16 07:17:01 X CRON[2673]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 07:17:01 X CRON[2673]: pam_unix(cron:session): session closed for user root
 
Last edited:
Hello, I have a server problem. Because the server restart is saved at around 6 am and in these hours the server is already turned off and I do not want to run I need to add some permissions or something? What can it be to blame?
tfs 1.3

began to display to me such a message in the console, "has been executed as root user, please consider running it as a normal user.", can this be the reason?

authlog
Rich (BB code):
Jun 16 06:25:35 X CRON[2125]: pam_unix(cron:session): session closed for user root
Jun 16 06:34:04 X sshd[2537]: Address 117.5.134.92 maps to localhost, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 06:34:04 X sshd[2537]: Invalid user admin from 117.5.134.92
Jun 16 06:34:04 X sshd[2537]: input_userauth_request: invalid user admin [preauth]
Jun 16 06:34:04 X sshd[2537]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:34:04 X sshd[2537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.5.134.92
Jun 16 06:34:06X sshd[2537]: Failed password for invalid user admin from 117.5.134.92 port 55103 ssh2
Jun 16 06:34:06 X sshd[2537]: Disconnecting: Too many authentication failures for invalid user admin from 117.5.134.92 port 55103 ssh2 [preauth]
Jun 16 06:34:55 X sshd[2539]: Invalid user curlycait from 202.106.93.46
Jun 16 06:34:55 X sshd[2539]: input_userauth_request: invalid user curlycait [preauth]
Jun 16 06:34:55 X sshd[2539]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:34:55 X sshd[2539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
Jun 16 06:34:58 X sshd[2539]: Failed password for invalid user curlycait from 202.106.93.46 port 51073 ssh2
Jun 16 06:34:58 X sshd[2539]: Disconnecting: Too many authentication failures for invalid user curlycait from 202.106.93.46 port 51073 ssh2 [preauth]
Jun 16 06:39:01 X CRON[2542]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 06:39:01 X CRON[2542]: pam_unix(cron:session): session closed for user root
Jun 16 06:46:47 X sshd[2591]: Received disconnect from 68.183.95.97: 11: Bye Bye [preauth]
Jun 16 06:47:01 X CRON[2593]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 06:47:12 X CRON[2593]: pam_unix(cron:session): session closed for user root
Jun 16 06:54:19 X sshd[2600]: Invalid user adm from 104.196.16.112
Jun 16 06:54:19 X sshd[2600]: input_userauth_request: invalid user adm [preauth]
Jun 16 06:54:19 X sshd[2600]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 06:54:19 X sshd[2600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.16.196.104.bc.googleusercontent.com
Jun 16 06:54:21 X sshd[2600]: Failed password for invalid user adm from 104.196.16.112 port 55592 ssh2
Jun 16 06:54:21 X sshd[2600]: Disconnecting: Too many authentication failures for invalid user adm from 104.196.16.112 port 55592 ssh2 [preauth]
Jun 16 07:04:30 X sshd[2602]: reverse mapping checking getaddrinfo for 152717.cloudwaysapps.com [128.199.133.249] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 07:04:30 X sshd[2602]: Invalid user anish from 128.199.133.249
Jun 16 07:04:30 X sshd[2602]: input_userauth_request: invalid user anish [preauth]
Jun 16 07:04:30 X sshd[2602]: pam_unix(sshd:auth): check pass; user unknown
Jun 16 07:04:30 X sshd[2602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249
Jun 16 07:04:32 X sshd[2602]: Failed password for invalid user anish from 128.199.133.249 port 53298 ssh2
Jun 16 07:04:32 X sshd[2602]: Disconnecting: Too many authentication failures for invalid user anish from 128.199.133.249 port 53298 ssh2 [preauth]
Jun 16 07:09:00 X sshd[2604]: reverse mapping checking getaddrinfo for 110.55.109.42.bti.net.ph [110.55.109.42] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 16 07:09:00 X sshd[2604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.55.109.42  user=root
Jun 16 07:09:01 X CRON[2606]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 07:09:01 X CRON[2606]: pam_unix(cron:session): session closed for user root
Jun 16 07:09:02 X sshd[2604]: Failed password for root from 110.55.109.42 port 55549 ssh2
Jun 16 07:09:02 X sshd[2604]: Disconnecting: Too many authentication failures for root from 110.55.109.42 port 55549 ssh2 [preauth]
Jun 16 07:10:21 X sshd[2657]: Accepted password for root from 46.134.182.16 port 2899 ssh2
Jun 16 07:10:21 X sshd[2657]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jun 16 07:11:09 X sshd[2670]: Accepted password for root from 46.134.182.16 port 5610 ssh2
Jun 16 07:11:09 X sshd[2670]: pam_unix(sshd:session): session opened for user root by (uid=0)
Jun 16 07:17:01 X CRON[2673]: pam_unix(cron:session): session opened for user root by (uid=0)
Jun 16 07:17:01 X CRON[2673]: pam_unix(cron:session): session closed for user root

Yea, idk how it works in new tfs, but older versions default option block startup when you try to run as root user, you could compile with --enable-root-permission or remove security lines from src. But best option is to run as normal user, not root it's very unsafe.
And why you posted your auth.log with ip addresses?
 
Back
Top