<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure shell messages in syslog in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667340#M381489</link>
    <description>Hello Steven;&lt;BR /&gt;&lt;BR /&gt;Thank you for your response.  To be honest have no idea what to change in sshd_config that would make these messages go away.  Idealy would like to understand why were getting these messages.   We could I suppose do something with ssh logging but that may hide other issues.   Again not sure what we could do with the ssh logging that would make these messages not appear in syslog.  Here is our sshd_config file, would you mind taking a look?   &lt;BR /&gt;&lt;BR /&gt;#  cat sshd_config&lt;BR /&gt;#       $OpenBSD: sshd_config,v 2.20 2009/02/26 $&lt;BR /&gt;&lt;BR /&gt;# This is the sshd server system-wide configuration file.  See&lt;BR /&gt;# sshd_config(5) for more information.&lt;BR /&gt;&lt;BR /&gt;# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin:/opt/ssh/bin&lt;BR /&gt;&lt;BR /&gt;# The strategy used for options in the default sshd_config shipped with&lt;BR /&gt;# OpenSSH is to specify options with their default value where&lt;BR /&gt;# possible, but leave them commented.  Uncommented options change a&lt;BR /&gt;# default value.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;#Port 22&lt;BR /&gt;Protocol 2&lt;BR /&gt;#AddressFamily any&lt;BR /&gt;#ListenAddress 0.0.0.0&lt;BR /&gt;#ListenAddress ::&lt;BR /&gt;&lt;BR /&gt;# HostKey for protocol version 1&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_key&lt;BR /&gt;# HostKeys for protocol version 2&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_rsa_key&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_dsa_key&lt;BR /&gt;&lt;BR /&gt;# Lifetime and size of ephemeral version 1 server key&lt;BR /&gt;#KeyRegenerationInterval 1h&lt;BR /&gt;#ServerKeyBits 1024&lt;BR /&gt;&lt;BR /&gt;# Logging&lt;BR /&gt;# obsoletes QuietMode and FascistLogging&lt;BR /&gt;#SyslogFacility AUTH&lt;BR /&gt;#LogLevel INFO&lt;BR /&gt;&lt;BR /&gt;# Authentication:&lt;BR /&gt;&lt;BR /&gt;#LoginGraceTime 2m&lt;BR /&gt;#PermitRootLogin yes&lt;BR /&gt;#StrictModes yes&lt;BR /&gt;#MaxAuthTries 6&lt;BR /&gt;#MaxSessions 10&lt;BR /&gt;#CountKeyAuthBadLogins no&lt;BR /&gt;&lt;BR /&gt;# Auth selection&lt;BR /&gt;&lt;BR /&gt;#HostbasedAuthAllowUsers&lt;BR /&gt;#HostbasedAuthDenyUsers&lt;BR /&gt;#PubkeyAuthAllowUsers&lt;BR /&gt;#PubkeyAuthDenyUsers&lt;BR /&gt;#KerberosAuthAllowUsers&lt;BR /&gt;#KerberosAuthDenyUsers&lt;BR /&gt;#KerberosOrLocalPasswdAllowUsers&lt;BR /&gt;#KerberosOrLocalPasswdDenyUsers&lt;BR /&gt;#PasswordAuthAllowUsers&lt;BR /&gt;#PasswordAuthDenyUsers&lt;BR /&gt;#ChallRespAuthAllowUsers [pam] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [pam] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [bsdauth] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [bsdauth] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [skey] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [skey] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [securid] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [securid] user1 user2 ...&lt;BR /&gt;#GSSAPIAuthAllowUsers&lt;BR /&gt;#GSSAPIAuthDenyUsers&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;#RSAAuthentication yes&lt;BR /&gt;#PubkeyAuthentication yes&lt;BR /&gt;#AuthorizedKeysFile     .ssh/authorized_keys&lt;BR /&gt;&lt;BR /&gt;# For this to work you will also need host keys in /opt/ssh/etc/ssh_known_hosts&lt;BR /&gt;#RhostsRSAAuthentication no&lt;BR /&gt;# similar for protocol version 2&lt;BR /&gt;#HostbasedAuthentication no&lt;BR /&gt;# Change to yes if you don't trust ~/.ssh/known_hosts for&lt;BR /&gt;# RhostsRSAAuthentication and HostbasedAuthentication&lt;BR /&gt;#IgnoreUserKnownHosts no&lt;BR /&gt;# Don't read the user's ~/.rhosts and ~/.shosts files&lt;BR /&gt;#IgnoreRhosts yes&lt;BR /&gt;&lt;BR /&gt;# To disable tunneled clear text passwords, change to no here!&lt;BR /&gt;#PasswordAuthentication yes&lt;BR /&gt;#PermitEmptyPasswords no&lt;BR /&gt;&lt;BR /&gt;# Change to no to disable s/key passwords&lt;BR /&gt;#ChallengeResponseAuthentication yes&lt;BR /&gt;&lt;BR /&gt;# Kerberos options&lt;BR /&gt;KerberosAuthentication yes&lt;BR /&gt;#KerberosOrLocalPasswd yes&lt;BR /&gt;#KerberosTicketCleanup yes&lt;BR /&gt;#KerberosGetAFSToken no&lt;BR /&gt;&lt;BR /&gt;# GSSAPI options&lt;BR /&gt;#GSSAPIAuthentication no&lt;BR /&gt;#GSSAPICleanupCredentials yes&lt;BR /&gt;&lt;BR /&gt;# Set this to 'yes' to enable PAM authentication, account processing, &lt;BR /&gt;# and session processing. If this is enabled, PAM authentication will &lt;BR /&gt;# be allowed through the ChallengeResponseAuthentication mechanism. &lt;BR /&gt;# Depending on your PAM configuration, this may bypass the setting of &lt;BR /&gt;# PasswordAuthentication, PermitEmptyPasswords, and &lt;BR /&gt;# "PermitRootLogin without-password". If you just want the PAM account and &lt;BR /&gt;# session checks to run without PAM authentication, then enable this but set &lt;BR /&gt;# ChallengeResponseAuthentication=no&lt;BR /&gt;UsePAM yes &lt;BR /&gt;&lt;BR /&gt;#AllowAgentForwarding yes&lt;BR /&gt;#AllowTcpForwarding yes&lt;BR /&gt;#GatewayPorts no&lt;BR /&gt;X11Forwarding yes &lt;BR /&gt;#X11DisplayOffset 10&lt;BR /&gt;#X11UseLocalhost yes &lt;BR /&gt;PrintMotd no&lt;BR /&gt;#PrintLastLog yes&lt;BR /&gt;#TCPKeepAlive yes&lt;BR /&gt;#UseLogin no&lt;BR /&gt;#EnforceSecureTTY no&lt;BR /&gt;#UsePrivilegeSeparation yes&lt;BR /&gt;#PermitUserEnvironment no&lt;BR /&gt;#Compression delayed&lt;BR /&gt;#ClientAliveInterval 0&lt;BR /&gt;#ClientAliveCountMax 3&lt;BR /&gt;#UseDNS yes&lt;BR /&gt;#PidFile /var/run/sshd.pid&lt;BR /&gt;#MaxStartups 10&lt;BR /&gt;#PermitTunnel no&lt;BR /&gt;#ChrootDirectory none&lt;BR /&gt;&lt;BR /&gt;# no default banner path&lt;BR /&gt;#Banner none&lt;BR /&gt;&lt;BR /&gt;#The following are HPN related configuration options&lt;BR /&gt;#tcp receive buffer polling. enable in autotuning kernels&lt;BR /&gt;#TcpRcvBufPoll no&lt;BR /&gt;&lt;BR /&gt;# set tcp buffer size in Kbytes&lt;BR /&gt;#TcpRcvBuf 128&lt;BR /&gt;&lt;BR /&gt;# allow the use of the none cipher&lt;BR /&gt;#NoneEnabled no&lt;BR /&gt;&lt;BR /&gt;# disable hpn performance boosts.&lt;BR /&gt;#HPNDisabled no &lt;BR /&gt;&lt;BR /&gt;# buffer size for hpn to non-hpn connections&lt;BR /&gt;#HPNBufferSize 2048&lt;BR /&gt;&lt;BR /&gt;# override default of no subsystems&lt;BR /&gt;Subsystem       sftp    /opt/ssh/libexec/sftp-server&lt;BR /&gt;&lt;BR /&gt;# sftp-server umask control&lt;BR /&gt;#SftpUmask&lt;BR /&gt;&lt;BR /&gt;#SftpPermitChmod yes&lt;BR /&gt;#SftpPermitChown yes&lt;BR /&gt;&lt;BR /&gt;#The following are TPM related configuration options&lt;BR /&gt;#Engine-loaded RSA key for host authentication (no default value)&lt;BR /&gt;# EngineHostRSAKey &lt;BR /&gt;&lt;BR /&gt;# If EngineHostRSAKey has been created, the associated OpenSSL information is identified with:&lt;BR /&gt;# EngineConfigFile        /opt/ssh/etc/server.cnf&lt;BR /&gt;# EngineConfigSection  server_conf&lt;BR /&gt;&lt;BR /&gt;# Example of overriding settings on a per-user basis&lt;BR /&gt;#Match User anoncvs&lt;BR /&gt;#     X11Forwarding no&lt;BR /&gt;#     AllowTcpForwarding no&lt;BR /&gt;#     ForceCommand cvs server&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Norm&lt;BR /&gt;</description>
    <pubDate>Wed, 28 Jul 2010 19:23:41 GMT</pubDate>
    <dc:creator>wvsa</dc:creator>
    <dc:date>2010-07-28T19:23:41Z</dc:date>
    <item>
      <title>Secure shell messages in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667338#M381487</link>
      <description>Good morning all;&lt;BR /&gt;&lt;BR /&gt;Running the latest version of secure shell on a rx6600 servers with 11iv3 release 5.   Were getting the following messages in syslog, the messages are being generated from our nagios server.&lt;BR /&gt;&lt;BR /&gt;SSH: Server;Ltype: Version;Remote: 89.0.1.193-53297;Protocol: 2.0;Client: check_ssh_1991&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Was wondering if anyone has seen these messages?  How can we make these messages go away?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thank you for your input&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Norm&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Jul 2010 16:27:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667338#M381487</guid>
      <dc:creator>wvsa</dc:creator>
      <dc:date>2010-07-28T16:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: Secure shell messages in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667339#M381488</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Probably ssh_config or sshd_config has been modified to do this.&lt;BR /&gt;&lt;BR /&gt;Take a look at syslog.conf as well.&lt;BR /&gt;&lt;BR /&gt;There are a number of ways to do this.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 28 Jul 2010 17:49:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667339#M381488</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2010-07-28T17:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: Secure shell messages in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667340#M381489</link>
      <description>Hello Steven;&lt;BR /&gt;&lt;BR /&gt;Thank you for your response.  To be honest have no idea what to change in sshd_config that would make these messages go away.  Idealy would like to understand why were getting these messages.   We could I suppose do something with ssh logging but that may hide other issues.   Again not sure what we could do with the ssh logging that would make these messages not appear in syslog.  Here is our sshd_config file, would you mind taking a look?   &lt;BR /&gt;&lt;BR /&gt;#  cat sshd_config&lt;BR /&gt;#       $OpenBSD: sshd_config,v 2.20 2009/02/26 $&lt;BR /&gt;&lt;BR /&gt;# This is the sshd server system-wide configuration file.  See&lt;BR /&gt;# sshd_config(5) for more information.&lt;BR /&gt;&lt;BR /&gt;# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin:/opt/ssh/bin&lt;BR /&gt;&lt;BR /&gt;# The strategy used for options in the default sshd_config shipped with&lt;BR /&gt;# OpenSSH is to specify options with their default value where&lt;BR /&gt;# possible, but leave them commented.  Uncommented options change a&lt;BR /&gt;# default value.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;#Port 22&lt;BR /&gt;Protocol 2&lt;BR /&gt;#AddressFamily any&lt;BR /&gt;#ListenAddress 0.0.0.0&lt;BR /&gt;#ListenAddress ::&lt;BR /&gt;&lt;BR /&gt;# HostKey for protocol version 1&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_key&lt;BR /&gt;# HostKeys for protocol version 2&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_rsa_key&lt;BR /&gt;#HostKey /opt/ssh/etc/ssh_host_dsa_key&lt;BR /&gt;&lt;BR /&gt;# Lifetime and size of ephemeral version 1 server key&lt;BR /&gt;#KeyRegenerationInterval 1h&lt;BR /&gt;#ServerKeyBits 1024&lt;BR /&gt;&lt;BR /&gt;# Logging&lt;BR /&gt;# obsoletes QuietMode and FascistLogging&lt;BR /&gt;#SyslogFacility AUTH&lt;BR /&gt;#LogLevel INFO&lt;BR /&gt;&lt;BR /&gt;# Authentication:&lt;BR /&gt;&lt;BR /&gt;#LoginGraceTime 2m&lt;BR /&gt;#PermitRootLogin yes&lt;BR /&gt;#StrictModes yes&lt;BR /&gt;#MaxAuthTries 6&lt;BR /&gt;#MaxSessions 10&lt;BR /&gt;#CountKeyAuthBadLogins no&lt;BR /&gt;&lt;BR /&gt;# Auth selection&lt;BR /&gt;&lt;BR /&gt;#HostbasedAuthAllowUsers&lt;BR /&gt;#HostbasedAuthDenyUsers&lt;BR /&gt;#PubkeyAuthAllowUsers&lt;BR /&gt;#PubkeyAuthDenyUsers&lt;BR /&gt;#KerberosAuthAllowUsers&lt;BR /&gt;#KerberosAuthDenyUsers&lt;BR /&gt;#KerberosOrLocalPasswdAllowUsers&lt;BR /&gt;#KerberosOrLocalPasswdDenyUsers&lt;BR /&gt;#PasswordAuthAllowUsers&lt;BR /&gt;#PasswordAuthDenyUsers&lt;BR /&gt;#ChallRespAuthAllowUsers [pam] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [pam] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [bsdauth] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [bsdauth] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [skey] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [skey] user1 user2 ...&lt;BR /&gt;#ChallRespAuthAllowUsers [securid] user1 user2 ...&lt;BR /&gt;#ChallRespAuthDenyUsers  [securid] user1 user2 ...&lt;BR /&gt;#GSSAPIAuthAllowUsers&lt;BR /&gt;#GSSAPIAuthDenyUsers&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;#RSAAuthentication yes&lt;BR /&gt;#PubkeyAuthentication yes&lt;BR /&gt;#AuthorizedKeysFile     .ssh/authorized_keys&lt;BR /&gt;&lt;BR /&gt;# For this to work you will also need host keys in /opt/ssh/etc/ssh_known_hosts&lt;BR /&gt;#RhostsRSAAuthentication no&lt;BR /&gt;# similar for protocol version 2&lt;BR /&gt;#HostbasedAuthentication no&lt;BR /&gt;# Change to yes if you don't trust ~/.ssh/known_hosts for&lt;BR /&gt;# RhostsRSAAuthentication and HostbasedAuthentication&lt;BR /&gt;#IgnoreUserKnownHosts no&lt;BR /&gt;# Don't read the user's ~/.rhosts and ~/.shosts files&lt;BR /&gt;#IgnoreRhosts yes&lt;BR /&gt;&lt;BR /&gt;# To disable tunneled clear text passwords, change to no here!&lt;BR /&gt;#PasswordAuthentication yes&lt;BR /&gt;#PermitEmptyPasswords no&lt;BR /&gt;&lt;BR /&gt;# Change to no to disable s/key passwords&lt;BR /&gt;#ChallengeResponseAuthentication yes&lt;BR /&gt;&lt;BR /&gt;# Kerberos options&lt;BR /&gt;KerberosAuthentication yes&lt;BR /&gt;#KerberosOrLocalPasswd yes&lt;BR /&gt;#KerberosTicketCleanup yes&lt;BR /&gt;#KerberosGetAFSToken no&lt;BR /&gt;&lt;BR /&gt;# GSSAPI options&lt;BR /&gt;#GSSAPIAuthentication no&lt;BR /&gt;#GSSAPICleanupCredentials yes&lt;BR /&gt;&lt;BR /&gt;# Set this to 'yes' to enable PAM authentication, account processing, &lt;BR /&gt;# and session processing. If this is enabled, PAM authentication will &lt;BR /&gt;# be allowed through the ChallengeResponseAuthentication mechanism. &lt;BR /&gt;# Depending on your PAM configuration, this may bypass the setting of &lt;BR /&gt;# PasswordAuthentication, PermitEmptyPasswords, and &lt;BR /&gt;# "PermitRootLogin without-password". If you just want the PAM account and &lt;BR /&gt;# session checks to run without PAM authentication, then enable this but set &lt;BR /&gt;# ChallengeResponseAuthentication=no&lt;BR /&gt;UsePAM yes &lt;BR /&gt;&lt;BR /&gt;#AllowAgentForwarding yes&lt;BR /&gt;#AllowTcpForwarding yes&lt;BR /&gt;#GatewayPorts no&lt;BR /&gt;X11Forwarding yes &lt;BR /&gt;#X11DisplayOffset 10&lt;BR /&gt;#X11UseLocalhost yes &lt;BR /&gt;PrintMotd no&lt;BR /&gt;#PrintLastLog yes&lt;BR /&gt;#TCPKeepAlive yes&lt;BR /&gt;#UseLogin no&lt;BR /&gt;#EnforceSecureTTY no&lt;BR /&gt;#UsePrivilegeSeparation yes&lt;BR /&gt;#PermitUserEnvironment no&lt;BR /&gt;#Compression delayed&lt;BR /&gt;#ClientAliveInterval 0&lt;BR /&gt;#ClientAliveCountMax 3&lt;BR /&gt;#UseDNS yes&lt;BR /&gt;#PidFile /var/run/sshd.pid&lt;BR /&gt;#MaxStartups 10&lt;BR /&gt;#PermitTunnel no&lt;BR /&gt;#ChrootDirectory none&lt;BR /&gt;&lt;BR /&gt;# no default banner path&lt;BR /&gt;#Banner none&lt;BR /&gt;&lt;BR /&gt;#The following are HPN related configuration options&lt;BR /&gt;#tcp receive buffer polling. enable in autotuning kernels&lt;BR /&gt;#TcpRcvBufPoll no&lt;BR /&gt;&lt;BR /&gt;# set tcp buffer size in Kbytes&lt;BR /&gt;#TcpRcvBuf 128&lt;BR /&gt;&lt;BR /&gt;# allow the use of the none cipher&lt;BR /&gt;#NoneEnabled no&lt;BR /&gt;&lt;BR /&gt;# disable hpn performance boosts.&lt;BR /&gt;#HPNDisabled no &lt;BR /&gt;&lt;BR /&gt;# buffer size for hpn to non-hpn connections&lt;BR /&gt;#HPNBufferSize 2048&lt;BR /&gt;&lt;BR /&gt;# override default of no subsystems&lt;BR /&gt;Subsystem       sftp    /opt/ssh/libexec/sftp-server&lt;BR /&gt;&lt;BR /&gt;# sftp-server umask control&lt;BR /&gt;#SftpUmask&lt;BR /&gt;&lt;BR /&gt;#SftpPermitChmod yes&lt;BR /&gt;#SftpPermitChown yes&lt;BR /&gt;&lt;BR /&gt;#The following are TPM related configuration options&lt;BR /&gt;#Engine-loaded RSA key for host authentication (no default value)&lt;BR /&gt;# EngineHostRSAKey &lt;BR /&gt;&lt;BR /&gt;# If EngineHostRSAKey has been created, the associated OpenSSL information is identified with:&lt;BR /&gt;# EngineConfigFile        /opt/ssh/etc/server.cnf&lt;BR /&gt;# EngineConfigSection  server_conf&lt;BR /&gt;&lt;BR /&gt;# Example of overriding settings on a per-user basis&lt;BR /&gt;#Match User anoncvs&lt;BR /&gt;#     X11Forwarding no&lt;BR /&gt;#     AllowTcpForwarding no&lt;BR /&gt;#     ForceCommand cvs server&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Norm&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Jul 2010 19:23:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667340#M381489</guid>
      <dc:creator>wvsa</dc:creator>
      <dc:date>2010-07-28T19:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Secure shell messages in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667341#M381490</link>
      <description>You can change the sshd_config file:&lt;BR /&gt; &lt;BR /&gt;# Logging&lt;BR /&gt;# obsoletes QuietMode and FascistLogging&lt;BR /&gt;#SyslogFacility AUTH&lt;BR /&gt;#LogLevel INFO&lt;BR /&gt; &lt;BR /&gt;But I would leave the facility as AUTH (the default). You can raise the level to more important messages but whether this drops the Nagios message is unknown until you find out what level (called priority in syslogd) this message uses. You can experiment by raising the level:&lt;BR /&gt; &lt;BR /&gt;LogLevel Notice&lt;BR /&gt;or&lt;BR /&gt;LogLevel Warning&lt;BR /&gt;or&lt;BR /&gt;LogLevel Err&lt;BR /&gt; &lt;BR /&gt;After changing to a higher level, restart sshd and see if the messages stop. The downside is that you don't know what may be filtered out of ssh messages that you may need.&lt;BR /&gt; &lt;BR /&gt;The simplest way to clean up syslog.log is to separate the various facilities into different logs. This is done with the syslog.conf file. Change the line with syslog.log on the end to add auth.none:&lt;BR /&gt; &lt;BR /&gt;*.info;mail.none;auth.none /var/adm/syslog/syslog.log&lt;BR /&gt; &lt;BR /&gt;and add 1 additional line:&lt;BR /&gt; &lt;BR /&gt;auth.info       /var/adm/syslog/auth.log&lt;BR /&gt; &lt;BR /&gt;NOTE: all spaces in the entire file MUST be tabs -- no spaces allowed! Any line with a space is silently ignored. Now restart syslogd with this command:&lt;BR /&gt; &lt;BR /&gt;kill -HUP $(cat /var/run/syslog.pid)&lt;BR /&gt; &lt;BR /&gt;Now check /var/adm/syslog and you'll see a new logfile called auth.log. All daemons that send messages to syslog using the AUTH facility will now send their messages to auth.log.&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Jul 2010 21:06:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667341#M381490</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2010-07-28T21:06:55Z</dc:date>
    </item>
    <item>
      <title>Re: Secure shell messages in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667342#M381491</link>
      <description>Hello Bill;&lt;BR /&gt;&lt;BR /&gt;Thank you for your response, the syslog re-config worked as advertised.   However the log options for SSH did not.  The options for ssh logging are as follows:&lt;BR /&gt;&lt;BR /&gt;LogLevel&lt;BR /&gt;      Gives the verbosity level that is used when logging messages from&lt;BR /&gt;      sshd.  The possible values are: QUIET, FATAL, ERROR, INFO, VER-&lt;BR /&gt;      BOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3.  The default is INFO.&lt;BR /&gt;      DEBUG and DEBUG1 are equivalent.  DEBUG2 and DEBUG3 each specify&lt;BR /&gt;      higher levels of debugging output.  Logging with a DEBUG level&lt;BR /&gt;      violates the privacy of users and is not recommended.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Do you have any idea what are causing these messages to appear in the first place, see below;&lt;BR /&gt;&lt;BR /&gt;SSH: Server;Ltype: Version;Remote: 89.0.1.193-53297;Protocol: 2.0;Client: check_ssh_1991&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks again for your response.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Norm&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Jul 2010 16:44:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667342#M381491</guid>
      <dc:creator>wvsa</dc:creator>
      <dc:date>2010-07-29T16:44:50Z</dc:date>
    </item>
    <item>
      <title>Re: Secure shell messages in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667343#M381492</link>
      <description>The message seems to be identifying the version of the client that is trying to connect to the SSH server.&lt;BR /&gt;&lt;BR /&gt;"Client: check_ssh_1991" might mean that this is not a real SSH client, but a Nagios check_ssh plugin that monitors the availability of your SSH service. "1991" might be the PID of the Nagios check_ssh process.&lt;BR /&gt;&lt;BR /&gt;(Note: "check_by_ssh" is a different Nagios plugin, that uses an actual SSH login to run other monitoring tasks on a remote server. Don't confuse the two.) &lt;BR /&gt;&lt;BR /&gt;The check_ssh plugin does the monitoring by connecting to the SSH service, then stopping short of an actual login. The sshd daemon will see this as an aborted connection: it logs information to aid troubleshooting in case this was a real connection attempt.&lt;BR /&gt;&lt;BR /&gt;It's a bit like the Heisenberg's Uncertainty Principle in physics: when you actively probe something to monitor it, the probes will have some effect on their target too. In this case, the effect is some extra log messages.&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Thu, 29 Jul 2010 20:18:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667343#M381492</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2010-07-29T20:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Secure shell messages in syslog</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667344#M381493</link>
      <description>Hello Bill;&lt;BR /&gt;&lt;BR /&gt;Is there anyway to remove the following message from syslog:&lt;BR /&gt;&lt;BR /&gt;Isaac inetd[25943]: registrar/tcp: Connection from localhost (127.0.0.1) at Thu Jul 29 16:41:41 2010&lt;BR /&gt;&lt;BR /&gt;Don't want to use inetd -l would prefer move these messages to a different file.  Played with syslog.conf and could not get syslog to write these messages to a seperate file, not sure if the .info option in syslog.conf has the option to make this happen (moving the inetd: registrar/tcp localhost connections to a seperate file.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thank you for the input.&lt;BR /&gt;&lt;BR /&gt;Norm&lt;BR /&gt;</description>
      <pubDate>Thu, 29 Jul 2010 22:48:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/secure-shell-messages-in-syslog/m-p/4667344#M381493</guid>
      <dc:creator>wvsa</dc:creator>
      <dc:date>2010-07-29T22:48:04Z</dc:date>
    </item>
  </channel>
</rss>

