Displaying 3 results from an estimated 3 matches for "fail_reason".
2025 May 22
1
LogLevel INFO shows few details for Certificate invalid: not yet valid / expired
...diff --git a/auth2-pubkey.c b/auth2-pubkey.c
index d6bc309..3292f7c 100644
--- a/auth2-pubkey.c
+++ b/auth2-pubkey.c
@@ -583,8 +583,14 @@ user_cert_trusted_ca(struct passwd *pw, struct sshkey *key,
if ((final_opts = sshauthopt_merge(principals_opts,
cert_opts, &reason)) == NULL) {
fail_reason:
- error("%s", reason);
- auth_debug_add("%s", reason);
+ error("Refusing certificate ID \"%s\" serial=%llu "
+ "signed by %s CA %s: %s", key->cert->key_id,
+ key->cert->serial,
+ sshkey_type(key->cert->sign...
2025 May 21
1
LogLevel INFO shows few details for Certificate invalid: not yet valid / expired
On 4/5/25 15:01, Lars Nood?n wrote:
> I notice that when using log level INFO it seems sshd(8) provides very
> little information about failed SSH certificate log in attempts:
>
> Apr? 5 14:44:41 server sshd-session[51695]: error: Certificate invalid:
> not yet valid
>
> Apr? 5 14:45:31 server sshd-session[88953]: error: Certificate invalid:
> expired
>
>
2024 Oct 14
2
[RFC] Preferentially TOFU certificate authorities rather than host keys
...ost_key(char *hostname, const struct ssh_conn_info *cinfo,
HostStatus host_status = -1, ip_status = -1;
struct sshkey *raw_key = NULL;
char *ip = NULL, *host = NULL;
- char hostline[1000], *hostp, *fp, *ra;
+ char hostline[1000], *hostp, *fp, *cafp, *ra;
char msg[1024];
const char *type, *fail_reason = NULL;
const struct hostkey_entry *host_found = NULL, *ip_found = NULL;
@@ -973,6 +973,7 @@ check_host_key(char *hostname, const struct ssh_conn_info *cinfo,
int r, want_cert = sshkey_is_cert(host_key), host_ip_differ = 0;
int hostkey_trusted = 0; /* Known or explicitly accepted by user */...