You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[RADIUS]Login fails. triggering six sshd processes to login device with same username and password at the same time, only one process login successfully.
#21130
Dec 10 2024 16:42:35.292312 sonic INFO sshd[2342684]: Connection from 127.0.0.1 port 43622 on 127.0.0.1 port 2081 rdomain ""
Dec 10 2024 16:42:35.292956 sonic INFO sshd[2342686]: Connection from 127.0.0.1 port 43648 on 127.0.0.1 port 2081 rdomain ""
Dec 10 2024 16:42:35.293365 sonic INFO sshd[2342683]: Connection from 127.0.0.1 port 43610 on 127.0.0.1 port 2081 rdomain ""
Dec 10 2024 16:42:35.293755 sonic INFO sshd[2342687]: Connection from 127.0.0.1 port 43654 on 127.0.0.1 port 2081 rdomain ""
Dec 10 2024 16:42:35.294185 sonic INFO sshd[2342682]: Connection from 127.0.0.1 port 43608 on 127.0.0.1 port 2081 rdomain ""
Dec 10 2024 16:42:35.295451 sonic INFO sshd[2342685]: Connection from 127.0.0.1 port 43634 on 127.0.0.1 port 2081 rdomain ""
Dec 10 2024 16:42:35.304709 sonic INFO sshd[2342684]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.305632 sonic INFO sshd[2342684]: nss: Creating user "usertest"
Dec 10 2024 16:42:35.307635 sonic INFO sshd[2342683]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.307805 sonic INFO sshd[2342685]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.308106 sonic INFO sshd[2342687]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.308390 sonic INFO sshd[2342686]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.308546 sonic INFO sshd[2342685]: Invalid user usertest from 127.0.0.1 port 43634
Dec 10 2024 16:42:35.308732 sonic INFO sshd[2342687]: Invalid user usertest from 127.0.0.1 port 43654
Dec 10 2024 16:42:35.309317 sonic INFO sshd[2342683]: Invalid user usertest from 127.0.0.1 port 43610
Dec 10 2024 16:42:35.309883 sonic INFO sshd[2342686]: Invalid user usertest from 127.0.0.1 port 43648
Dec 10 2024 16:42:35.310714 sonic INFO sshd[2342682]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.311287 sonic INFO sshd[2342682]: Invalid user usertest from 127.0.0.1 port 43608
Dec 10 2024 16:42:35.317159 sonic INFO sshd[2342682]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.317437 sonic NOTICE sshd[2342682]: pam_faillock(sshd:auth): User unknown: usertest
Dec 10 2024 16:42:35.320045 sonic INFO useradd[2342694]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.320211 sonic INFO sshd[2342685]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.320503 sonic NOTICE sshd[2342685]: pam_faillock(sshd:auth): User unknown: usertest
Dec 10 2024 16:42:35.321282 sonic INFO sshd[2342683]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.321785 sonic INFO sshd[2342687]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.321993 sonic INFO sshd[2342686]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.322176 sonic NOTICE sshd[2342683]: pam_faillock(sshd:auth): User unknown: usertest
Dec 10 2024 16:42:35.322246 sonic NOTICE sshd[2342687]: pam_faillock(sshd:auth): User unknown: usertest
Dec 10 2024 16:42:35.322538 sonic NOTICE sshd[2342686]: pam_faillock(sshd:auth): User unknown: usertest
Dec 10 2024 16:42:35.355893 sonic INFO [2342682]: pam_radius_auth: user:usertest domain:ca hostname:125.13.16.126:1812
Dec 10 2024 16:42:35.356266 sonic INFO useradd[2342694]: new group: name=usertest, GID=1012
Dec 10 2024 16:42:35.356452 sonic INFO useradd[2342694]: new user: name=usertest, UID=1012, GID=1012, home=/home/usertest, shell=/bin/bash, from=none
Dec 10 2024 16:42:35.370351 sonic INFO useradd[2342694]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.370734 sonic INFO useradd[2342694]: nss: "/var/cache/radius/user/usertest/Management-Privilege-Level": Absent.
Dec 10 2024 16:42:35.371091 sonic INFO useradd[2342694]: add 'usertest' to group 'usertest'
Dec 10 2024 16:42:35.371546 sonic INFO useradd[2342694]: add 'usertest' to shadow group 'usertest'
Dec 10 2024 16:42:35.391931 sonic INFO [2342687]: pam_radius_auth: user:usertest domain:ca hostname:125.13.16.126:1812
Dec 10 2024 16:42:35.392659 sonic INFO [2342686]: pam_radius_auth: user:usertest domain:ca hostname:125.13.16.126:1812
Dec 10 2024 16:42:35.393147 sonic INFO [2342683]: pam_radius_auth: user:usertest domain:ca hostname:125.13.16.126:1812
Dec 10 2024 16:42:35.393606 sonic INFO [2342685]: pam_radius_auth: user:usertest domain:ca hostname:125.13.16.126:1812
Dec 10 2024 16:42:35.560863 sonic INFO [2342684]: pam_radius_auth: user:usertest domain:ca hostname:125.13.16.126:1812
Dec 10 2024 16:42:35.643546 sonic INFO [2342684]: pam_radius_auth: authentication succeeded
Dec 10 2024 16:42:35.747905 sonic INFO sshd[2342684]: Accepted password for usertest from 127.0.0.1 port 43622 ssh2
Dec 10 2024 16:42:35.751078 sonic INFO sshd[2342684]: pam_unix(sshd:session): session opened for user usertest(uid=1012) by (uid=0)
Dec 10 2024 16:42:35.751908 sonic INFO sshd[2342684]: User child is on pid 2342712
Dec 10 2024 16:42:35.793955 sonic INFO sshd[2342712]: Starting session: command for usertest from 127.0.0.1 port 43622 id 0
Dec 10 2024 16:42:35.824443 sonic INFO sshd[2342712]: Close session: user usertest from 127.0.0.1 port 43622 id 0
Dec 10 2024 16:42:35.834003 sonic INFO sshd[2342712]: Connection closed by 127.0.0.1 port 43622
Dec 10 2024 16:42:35.834267 sonic INFO sshd[2342712]: Transferred: sent 2072, received 1184 bytes
Dec 10 2024 16:42:35.834383 sonic INFO sshd[2342712]: Closing connection to 127.0.0.1 port 43622
Dec 10 2024 16:42:35.834592 sonic INFO sshd[2342684]: pam_unix(sshd:session): session closed for user usertest
Dec 10 2024 16:42:37.682477 sonic INFO [2342687]: pam_radius_auth: authentication failed
Dec 10 2024 16:42:37.684928 sonic NOTICE sshd[2342687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=usertest
Dec 10 2024 16:42:37.708500 sonic INFO [2342686]: pam_radius_auth: authentication failed
Dec 10 2024 16:42:37.710814 sonic NOTICE sshd[2342686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=usertest
Dec 10 2024 16:42:37.733235 sonic INFO [2342683]: pam_radius_auth: authentication failed
Dec 10 2024 16:42:37.735558 sonic NOTICE sshd[2342683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=usertest
Dec 10 2024 16:42:37.757846 sonic INFO [2342685]: pam_radius_auth: authentication failed
Dec 10 2024 16:42:37.760176 sonic NOTICE sshd[2342685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=usertest
Dec 10 2024 16:42:37.781020 sonic INFO [2342682]: pam_radius_auth: authentication failed
Dec 10 2024 16:42:37.783306 sonic NOTICE sshd[2342682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.0.0.1 user=usertest
Dec 10 2024 16:42:40.016871 sonic INFO sshd[2342687]: Failed password for invalid user usertest from 127.0.0.1 port 43654 ssh2
Dec 10 2024 16:42:40.044460 sonic INFO sshd[2342686]: Failed password for invalid user usertest from 127.0.0.1 port 43648 ssh2
Dec 10 2024 16:42:40.069311 sonic INFO sshd[2342683]: Failed password for invalid user usertest from 127.0.0.1 port 43610 ssh2
Dec 10 2024 16:42:40.093744 sonic INFO sshd[2342685]: Failed password for invalid user usertest from 127.0.0.1 port 43634 ssh2
Dec 10 2024 16:42:40.117046 sonic INFO sshd[2342682]: Failed password for invalid user usertest from 127.0.0.1 port 43608 ssh2
Dec 10 2024 16:42:42.418766 sonic INFO sshd[2342682]: Connection closed by invalid user usertest 127.0.0.1 port 43608 [preauth]
Dec 10 2024 16:42:42.421598 sonic INFO sshd[2342685]: Connection closed by invalid user usertest 127.0.0.1 port 43634 [preauth]
Dec 10 2024 16:42:42.422696 sonic INFO sshd[2342683]: Connection closed by invalid user usertest 127.0.0.1 port 43610 [preauth]
Dec 10 2024 16:42:42.423625 sonic INFO sshd[2342687]: Connection closed by invalid user usertest 127.0.0.1 port 43654 [preauth]
Dec 10 2024 16:42:42.425027 sonic INFO sshd[2342686]: Connection closed by invalid user usertest 127.0.0.1 port 43648 [preauth]
Describe the results you expected:
All processes have been successfully authenticated.
Output of show version:
(paste your output here)
Output of show techsupport:
(paste your output here or download and attach the file here )
Additional information you deem important (e.g. issue happens only occasionally):
#14466
Try to fix it with this method, but the problem still exists.
The text was updated successfully, but these errors were encountered:
Description
Triggering 6 sshd processes to login device with same username and password at the same time, only one user login successfully.
Steps to reproduce the issue:
config aaa authentication login radius local
config radius add {RadiusServerIP} -k {RadiusServerPassword}
Describe the results you received:
Out of six processes, only one process has been authenticated successfully.
Logs and Config:
Describe the results you expected:
All processes have been successfully authenticated.
Output of
show version
:Output of
show techsupport
:Additional information you deem important (e.g. issue happens only occasionally):
#14466
Try to fix it with this method, but the problem still exists.
The text was updated successfully, but these errors were encountered: