On Mon, 24 Nov 2025, Sad Clouds wrote:

Get sshd PID:
# ps aux | grep sshd
root    2348  0.0  0.2 71728  3364 ?     Ss    9:19AM 0:00.01 sshd: 
/usr/sbin/sshd [listener] 0 of 10-100 startups (ssh

Looks like it is using fd 5 for blocklistd socket:
# fstat -p 2348
USER     CMD          PID   FD  MOUNT         INUM MODE         SZ|DV R/W
root     sshd        2348   wd  /                2 drwxr-xr-x     512 r
root     sshd        2348    0  /          1489292 crw-rw-rw-    null rw
root     sshd        2348    1  /          1489292 crw-rw-rw-    null rw
root     sshd        2348    2  /          1489292 crw-rw-rw-    null rw
root     sshd        2348    3* internet6 stream tcp *:ssh
root     sshd        2348    4* internet stream tcp *:ssh
root     sshd        2348    5* unix dgram  <-> /var/run/blocklistd.sock [using]

Now trace all syscalls while simulating ssh login failure:
ktruss -d -t A -p 2348

... No read/write calls are made to fd 5 by sshd


You'll have to trace the forked child sshd instance...

Can you add a line like:

```
user.*                                          /var/log/messages
```

to /etc/syslog.conf, reboot the system then check what messages `blocklistd'
logs now?

-RVP

Reply via email to