Displaying 4 results from an estimated 4 matches for "input_userauth_failur".
Did you mean:
input_userauth_failure
2014 Aug 04
1
Password authentication problem with 6.4p1 (and later) clients: An analysis
...EST
message with an authentication Boolean set to TRUE (i.e. a real public
key authentication request, rather than just a probe) and the
authentication itself failed.
In the OpenSSH side, when receiving an SSH_MSG_USERAUTH_FAILURE
message, the OpenSSH client code will invoke a function called
'input_userauth_failure'. This function will retrieve the value of the
partial success Boolean from the incoming message and will store it
into a variable called 'partial'. Then, in 6.4p1 and later,
'input_userauth_failure' will do the following:
if (partial != 0) {
logit("Authenticated wi...
2018 Feb 22
3
Attempts to connect to Axway SFTP server result in publickey auth loopin
We are attempting to use openssh sftp to connect to a server that is
running some version of the Axway SFTP server. After a publickey auth
completes, the server resends publickey as a valid auth. This results in
a loop as openssh sftp resubmits the publickey information. This seems
similar to a discussion in 2014 that terminated with the thought that it
might be nice if the client tracked
2016 Nov 21
11
[Bug 2642] New: [sshconnect2] publickey authentication only properly works if used first: pubkey_prepare doesn't work after pubkey_cleanup
https://bugzilla.mindrot.org/show_bug.cgi?id=2642
Bug ID: 2642
Summary: [sshconnect2] publickey authentication only properly
works if used first: pubkey_prepare doesn't work after
pubkey_cleanup
Product: Portable OpenSSH
Version: 7.3p1
Hardware: amd64
OS: Linux
Status:
2018 Feb 23
2
Attempts to connect to Axway SFTP server result in publickey auth loopin
...t identity {
TAILQ_ENTRY(identity) next;
int agent_fd; /* >=0 if agent supports key */
@@ -268,6 +269,7 @@ struct cauthctxt {
int attempt;
/* pubkey */
struct idlist keys;
+ struct identity *sent_signed_id;
int agent_fd;
/* hostbased */
Sensitive *sensitive;
@@ -562,6 +564,11 @@ input_userauth_failure(int type, u_int32_t seq, struct ssh *ssh)
if (partial != 0) {
verbose("Authenticated with partial success.");
+ if (authctxt->sent_signed_id != NULL) {
+ debug3("Marking key %s as successful",
+ authctxt->sent_signed_id->filename);
+ authctxt->sent...