Displaying 9 results from an estimated 9 matches for "__pam_msg".
2001 Oct 26
5
New password echoes on Sol8
I tried replacing readpassphrase() for v2.9.9p2 on Sol8 with a different
version that just calls getpassphrase().  It appears to solve the echo
problem when the user tries to login in interactive mode and needs to
change their password.
Can anyone else try this with v2.9.9p2 on Solaris?  Be sure to add:
#define HAVE_GETPASSPHRASE
... to config.h when compiling (since it's not a configurable
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
...entials[%d]: %.200s", 
 			    pam_retval, PAM_STRERROR(__pamh, pam_retval));
 	}
+#endif
 
 	if (__pamh) {
 		pam_retval = pam_end(__pamh, pam_retval);
@@ -256,10 +257,8 @@
 		case PAM_SUCCESS:
 			/* This is what we want */
 			break;
-#if 0
 		case PAM_NEW_AUTHTOK_REQD:
-			message_cat(&__pam_msg, use_privsep ?
-			    NEW_AUTHTOK_MSG_PRIVSEP : NEW_AUTHTOK_MSG);
+			message_cat(&__pam_msg, NEW_AUTHTOK_MSG);
 			/* flag that password change is necessary */
 			password_change_required = 1;
 			/* disallow other functionality for now */
@@ -267,7 +266,6 @@
 			no_agent_forwarding_flag |=...
2002 Aug 07
0
[Bug 381] New: unable to access expired accounts using PAM with openssh-3.4P1
...nedTo: openssh-unix-dev at mindrot.org
        ReportedBy: don.sudom at dahlt.com
Expired accounts fail with "PAM rejected by account configuration" error 
message.
I noticed that this functionality has been disabled in auth-pam.c
#if 0
		case PAM_NEW_AUTHTOK_REQD:
			message_cat(&__pam_msg, use_privsep ?
			    NEW_AUTHTOK_MSG_PRIVSEP : NEW_AUTHTOK_MSG);
			/* flag that password change is necessary */
			password_change_required = 1;
			/* disallow other functionality for now */
			no_port_forwarding_flag |= 2;
			no_agent_forwarding_flag |= 2;
			no_x11_forwarding_flag |= 2;
			brea...
2002 Dec 08
1
Password expiry related clarification in OpenSSH3.5p1
...hanges, we would like to know specifically the reasons for the
commented part of the PAM account expiration part in auth-pam.c.
Why this part of the code is not used in 3.5p1? Is there any specific
reasons for not using this part of the code? 
#if 0
  case PAM_NEW_AUTHTOK_REQD:
   message_cat(&__pam_msg, use_privsep ?
       NEW_AUTHTOK_MSG_PRIVSEP : NEW_AUTHTOK_MSG);
   /* flag that password change is necessary */
   password_change_required = 1;
   /* disallow other functionality for now */
   no_port_forwarding_flag |= 2;
   no_agent_forwarding_flag |= 2;
   no_x11_forwarding_flag |= 2;
   brea...
2003 Jan 07
2
[Bug 463] PrintLastLog doesn't work in privsep mode
http://bugzilla.mindrot.org/show_bug.cgi?id=463
------- Additional Comments From dtucker at zip.com.au  2003-01-07 23:43 -------
Generate the message earlier in the login process and store for display after 
session startup?
Rather than another variable for this (eg aixloginmsg, maybe __pam_msg), what 
about using a single Buffer for storing all of the messages to be displayed 
after login?
I've started doing something like this (see 
http://www.zip.com.au/~dtucker/openssh/openssh-passexpire9.patch) and a (as yet 
unpublished) update to this makes things neater (eg the patch removes...
2003 Feb 20
0
"if 0" in auth-pam.c
...hese tests.
Here is the piece of code I'm talking about:
        switch (pam_retval) {
                case PAM_SUCCESS:
                        /* This is what we want */
                        break;
#if 0
                case PAM_NEW_AUTHTOK_REQD:
                        message_cat(&__pam_msg, use_privsep ?
                            NEW_AUTHTOK_MSG_PRIVSEP : NEW_AUTHTOK_MSG);
                        /* flag that password change is necessary */
                        password_change_required = 1;
                        /* disallow other functionality for now */...
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...entials[%d]: %.200s", 
 			    pam_retval, PAM_STRERROR(__pamh, pam_retval));
 	}
+#endif
 
 	if (__pamh) {
 		pam_retval = pam_end(__pamh, pam_retval);
@@ -256,10 +257,8 @@
 		case PAM_SUCCESS:
 			/* This is what we want */
 			break;
-#if 0
 		case PAM_NEW_AUTHTOK_REQD:
-			message_cat(&__pam_msg, use_privsep ?
-			    NEW_AUTHTOK_MSG_PRIVSEP : NEW_AUTHTOK_MSG);
+			message_cat(&__pam_msg, NEW_AUTHTOK_MSG);
 			/* flag that password change is necessary */
 			password_change_required = 1;
 			/* disallow other functionality for now */
@@ -267,7 +266,6 @@
 			no_agent_forwarding_flag |=...
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
..._required = 0;
+extern int password_change_required;
 /* remember whether the last pam_authenticate() succeeded or not */
 static int was_authenticated = 0;
 
@@ -256,7 +256,6 @@
 		case PAM_SUCCESS:
 			/* This is what we want */
 			break;
-#if 0
 		case PAM_NEW_AUTHTOK_REQD:
 			message_cat(&__pam_msg, use_privsep ?
 			    NEW_AUTHTOK_MSG_PRIVSEP : NEW_AUTHTOK_MSG);
@@ -267,7 +266,6 @@
 			no_agent_forwarding_flag |= 2;
 			no_x11_forwarding_flag |= 2;
 			break;
-#endif
 		default:
 			log("PAM rejected by account configuration[%d]: "
 			    "%.200s", pam_retval, PAM_STRER...
2002 Aug 28
5
password aging problem with ssh protocol 2
Hi,
I'm using openssh3.1p1 and I'm having some problem with password aging
with ssh protocol 2. Every time a password expires and I try to login I
get the following message 
ssh username at hostname
username at hostname's password: 
Warning: Your password has expired, please change it now
Enter login password: 
removing root credentials would break the rpc services that
use secure rpc