Displaying 7 results from an estimated 7 matches for "b_smith44".
2002 Feb 27
0
[Bug 127] New: PAM with ssh authentication and pam_krb5 doesn't work properly
...erly
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: b_smith44 at hotmail.com
when using authenticating against pam_krb5 a user can only login when sshd is
configured to use the system's login routine. the byproduct of this problem is
that the user can not use X forwarding.
this patch fixes the problem by modifying the call to pam_setcred to only use...
2002 Feb 27
0
[Bug 128] New: PAM with ssh authentication and pam_krb5 doesn't work properly
...erly
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: b_smith44 at hotmail.com
when authenticating against pam_krb5 before pam_unix the user can not login,
sshd logs the error "input_userauth_info_response_pam: no authentication
context".
i don't know why this is failing, this patch fixes the problem by removing the
check for an authenticati...
2002 Feb 27
0
[Bug 129] New: PAM with ssh authentication fails treat PAM_NEW_AUTHTOK_REQD properly
...erly
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: b_smith44 at hotmail.com
when using ssh's authentication against either pam_unix or pam_krb5 expired
passwords are not treated properly.
with pam_unix: sshd: users are not prompted to change their password and can
login.
with pam_unix: scp: users are not prompted to change their password and can
t...
2003 Jan 02
4
[Bug 423] Workaround for pw change in privsep mode (3.5.p1)
http://bugzilla.mindrot.org/show_bug.cgi?id=423
------- Additional Comments From stevesk at pobox.com 2003-01-02 11:52 -------
regarding log() clash, shouldn't the HP libsec log() be
static or renamed or ?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Feb 24
0
Sol8/pam_krb5/OpenSSH 3.0.2
with the following pam.conf entries, after being prompted for a login
password the connection is closed:
other auth sufficient /usr/lib/security/$ISA/pam_krb5.so.1
other auth required /usr/lib/security/$ISA/pam_unix.so.1 try_first_pass
the system logs the error:
sshd[4215]: fatal: input_userauth_info_response_pam: no authentication
context
if the pam.conf entry is changed to the
2002 Feb 27
0
openssh & solaris
while trying to sort out the PAM incompatabilities between openssh 3.0.2p1
and solaris 8 and sun's pam_krb5 i got some things to work. i'm really not
sure where the appropriate place to submit patches is so for now i'm sending
them here.
this patch will allow PAM interoperability when using sun's pam_krb5 without
using the system login routine (this way X forwarding will
2002 Feb 27
0
openssh & solaris (part 2)
this patch will allow PAM authentication when using sun's pam_krb5 before
pam_unix in the PAM stack. without this patch a pam.conf entry like:
sshd auth sufficient /usr/lib/security/$ISA/pam_krb5.so.1
sshd auth required /usr/lib/security/$ISA/pam_unix.so.1 try_first_pass
would fail with the error "input_userauth_info_response_pam: no
authentication context".
NOTE: when