2021-05-31 15:38:59,361 [plugins.py:33 - __init__() - MainThread] [DEBUG] loading LogModule 2021-05-31 15:38:59,470 [server.py:98 - generate_host_key() - MainThread] [WARNING] created temporary RSAKey key with 2048 bit length 2021-05-31 15:38:59,473 [server.py:128 - start() - MainThread] [INFO] listen interfaces 0.0.0.0 and :: on port 14000 2021-05-31 15:39:01,600 [server.py:136 - start() - MainThread] [INFO] incoming connection from ('::ffff:185.163.45.177', 49768, 0, 0) to ('::ffff:185.163.45.155', 22, 0, 0) 2021-05-31 15:39:01,606 [key_negotiation.py:32 - intercept_key_negotiation() - Thread-2] [INFO] connected client version: ssh-2.0-openssh_7.6p1 ubuntu-4ubuntu0.3 2021-05-31 15:39:01,609 [key_negotiation.py:33 - intercept_key_negotiation() - Thread-2] [DEBUG] cookie: b'\x04\xe9R\xa3M\xd1\xcd\xb5^V8.\x87PD\xb5' 2021-05-31 15:39:01,610 [key_negotiation.py:34 - intercept_key_negotiation() - Thread-2] [DEBUG] kex_algorithms: ['curve25519-sha256', 'curve25519-sha256@libssh.org', 'ecdh-sha2-nistp256', 'ecdh-sha2-nistp384', 'ecdh-sha2-nistp521', 'diffie-hellman-group-exchange-sha256', 'diffie-hellman-group16-sha512', 'diffie-hellman-group18-sha512', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha256', 'diffie-hellman-group14-sha1', 'ext-info-c'] 2021-05-31 15:39:01,611 [key_negotiation.py:35 - intercept_key_negotiation() - Thread-2] [DEBUG] server_host_key_algorithms: ['ecdsa-sha2-nistp256-cert-v01@openssh.com', 'ecdsa-sha2-nistp384-cert-v01@openssh.com', 'ecdsa-sha2-nistp521-cert-v01@openssh.com', 'ssh-ed25519-cert-v01@openssh.com', 'ssh-rsa-cert-v01@openssh.com', 'ecdsa-sha2-nistp256', 'ecdsa-sha2-nistp384', 'ecdsa-sha2-nistp521', 'ssh-ed25519', 'rsa-sha2-512', 'rsa-sha2-256', 'ssh-rsa'] 2021-05-31 15:39:01,612 [key_negotiation.py:36 - intercept_key_negotiation() - Thread-2] [DEBUG] encryption_algorithms_client_to_server: ['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] 2021-05-31 15:39:01,613 [key_negotiation.py:37 - intercept_key_negotiation() - Thread-2] [DEBUG] encryption_algorithms_server_to_client: ['chacha20-poly1305@openssh.com', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr', 'aes128-gcm@openssh.com', 'aes256-gcm@openssh.com'] 2021-05-31 15:39:01,613 [key_negotiation.py:38 - intercept_key_negotiation() - Thread-2] [DEBUG] mac_algorithms_client_to_server: ['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] 2021-05-31 15:39:01,613 [key_negotiation.py:39 - intercept_key_negotiation() - Thread-2] [DEBUG] mac_algorithms_server_to_client: ['umac-64-etm@openssh.com', 'umac-128-etm@openssh.com', 'hmac-sha2-256-etm@openssh.com', 'hmac-sha2-512-etm@openssh.com', 'hmac-sha1-etm@openssh.com', 'umac-64@openssh.com', 'umac-128@openssh.com', 'hmac-sha2-256', 'hmac-sha2-512', 'hmac-sha1'] 2021-05-31 15:39:01,614 [key_negotiation.py:40 - intercept_key_negotiation() - Thread-2] [DEBUG] compression_algorithms_client_to_server: ['none', 'zlib@openssh.com', 'zlib'] 2021-05-31 15:39:01,614 [key_negotiation.py:41 - intercept_key_negotiation() - Thread-2] [DEBUG] compression_algorithms_server_to_client: ['none', 'zlib@openssh.com', 'zlib'] 2021-05-31 15:39:01,614 [key_negotiation.py:42 - intercept_key_negotiation() - Thread-2] [DEBUG] languages_client_to_server: [''] 2021-05-31 15:39:01,614 [key_negotiation.py:43 - intercept_key_negotiation() - Thread-2] [DEBUG] languages_server_to_client: [''] 2021-05-31 15:39:01,615 [key_negotiation.py:44 - intercept_key_negotiation() - Thread-2] [DEBUG] first_kex_packet_follows: False 2021-05-31 15:39:01,617 [cve202014145.py:73 - check_key_negotiation() - Thread-2] [INFO] CVE-2020-14145: Client connecting for the FIRST time! 2021-05-31 15:39:03,354 [server.py:134 - check_auth_none() - Thread-2] [DEBUG] check_auth_none: username=root 2021-05-31 15:39:03,355 [server.py:116 - get_allowed_auths() - Thread-2] [DEBUG] get_allowed_auths: username=root 2021-05-31 15:39:03,356 [server.py:128 - get_allowed_auths() - Thread-2] [DEBUG] Allowed authentication methods: publickey,password 2021-05-31 15:39:06,894 [server.py:150 - check_auth_password() - Thread-2] [DEBUG] check_auth_password: username=root, password=12345678 2021-05-31 15:39:06,895 [authentication.py:147 - connect() - Thread-2] [INFO] Client connection established with parameters: Remote Address: ::ffff:185.163.45.155 Port: 22 Username: root Password: 12345678 Key: None Agent: no agent 2021-05-31 15:39:06,898 [authentication.py:101 - authenticate() - Thread-2] [ERROR] internal error, abort authentication! Traceback (most recent call last): File "/usr/local/lib/python3.6/dist-packages/ssh_proxy_server/authentication.py", line 89, in authenticate self.args.auth_password or password File "/usr/local/lib/python3.6/dist-packages/ssh_proxy_server/authentication.py", line 177, in auth_password return self.connect(username, host, port, AuthenticationMethod.password, password=password) File "/usr/local/lib/python3.6/dist-packages/ssh_proxy_server/authentication.py", line 162, in connect if sshclient.connect(): File "/usr/local/lib/python3.6/dist-packages/ssh_proxy_server/clients/ssh.py", line 41, in connect self.transport = paramiko.Transport("{}:{}".format(self.host, str(self.port))) File "/usr/local/lib/python3.6/dist-packages/paramiko/transport.py", line 394, in __init__ sock = (hl[0], int(hl[1])) ValueError: invalid literal for int() with base 10: ':ffff:185.163.45.155:22' 2021-05-31 15:39:06,902 [server.py:116 - get_allowed_auths() - Thread-2] [DEBUG] get_allowed_auths: username=root 2021-05-31 15:39:06,903 [server.py:128 - get_allowed_auths() - Thread-2] [DEBUG] Allowed authentication methods: publickey,password ^C2021-05-31 15:39:10,629 [server.py:144 - start() - MainThread] [INFO] Shutting down server ... 2021-05-31 15:39:11,119 [server.py:163 - create_session() - Thread-1] [WARNING] (('::ffff:185.163.45.177', 49768, 0, 0)->('::ffff:185.163.45.155', 22, 0, 0)) session not started 2021-05-31 15:39:11,121 [session.py:156 - close() - Thread-1] [INFO] (('::ffff:185.163.45.177', 49768, 0, 0)->('::ffff:185.163.45.155', 22, 0, 0)) session closed