search for: pam_debug

Displaying 7 results from an estimated 7 matches for "pam_debug".

2020 Jul 21
11
[RFC PATCH 0/4] PAM module for ssh-agent user authentication
Hi, The main (and probably the only) use case of this PAM module is to let sudo authenticate users via their ssh-agent, therefore without having to type any password and without being tempted to use the NOPASSWD sudo option for such convenience. The principle is originally implemented by an existing module [0][1] and many pages that explain how to use it for such purpose can be found online.
2006 Aug 14
4
too many close calls for non-opened fds
...mmended to check the resource limits. Is there anyway to fix this too many close() calls which results in performance degradation? Relavant part of tusc output for sshd is given below, ............... .............. set_userthreadid(1) ...................................... = 1 stat("/etc/pam_debug", 0x7ffff5b0) ....................... ERR#2 ENOENT stat("/tcb/files/auth/system/default", 0x7fffec70) ....... ERR#2 ENOENT getuid() ................................................. = 0 (0) getuid() ................................................. = 0 (0) getuid() .....................
2007 Jan 05
0
troubles with telnet sessions under Solaris8 as AD member with winbind V3.0.23d
...7 19080: open("/var/adm/utmpx", O_RDWR) = 8 19080: fstat64(8, 0xFFBEED58) = 0 19080: ioctl(8, TCGETA, 0xFFBEECE4) Err#25 ENOTTY 19080: read(8, "\0\0\0\0\0\0\0\0\0\0\0\0".., 8192) = 6696 19080: open("/etc/pam_debug", O_RDONLY) Err#2 ENOENT 19080: stat64("/etc/pam.conf", 0xFFBEEDF8) = 0 19080: open("/etc/pam.conf", O_RDONLY) = 9 19080: mmap(0x00000000, 3769, PROT_READ, MAP_PRIVATE, 9, 0) = 0xFF1E0000 19080: munmap(0xFF1E0000, 3769)...
2018 Aug 07
2
id <username> - doesnt list all groups
Thank for your answer: But i dont know understand why is following not working: I want to restrict the ssh access for a special domain member: In my "sshd_config" i added: AllowGroups restrictaccess root With user2 im able to login via ssh! log: pam_krb5(sshd:auth): user user2 authenticated as user2 at ROOTRUDI.DE With user1 im not! log: User user1 from 192.168.0.100 not allowed
2020 Sep 08
26
[Bug 3210] New: Confusing errors when pam_acct_mgmt() fails
...r as I read that, I do not see any recovery from either of these errors worth retrying so I believe we should be fine handling them the same as expired account though. The attached is proposed patch, which should handle this use case as well as the original issue in #1188. Tested in Fedora 32 with pam_debug.so with respective return values as well as with expired user. -- You are receiving this mail because: You are watching the assignee of the bug.
2004 Feb 24
4
Pam trouble
...= 0 29981: fork1() (returning as child ...) = 29964 29981: getpid() = 29981 [29964] 29981: close(15) = 0 29981: lwp_schedctl(SC_STATE|SC_PREEMPT, 0, 0xFFBFF4A4) = 0 29981: open("/etc/pam_debug", O_RDONLY) Err#2 ENOENT 29981: stat64("/etc/pam.conf", 0xFFBFF4C0) = 0 29981: open("/etc/pam.conf", O_RDONLY) = 15 29981: mmap(0x00000000, 1893, PROT_READ, MAP_PRIVATE, 15, 0) = 0xFEBA0000 29981: munmap(0xFEBA0000, 1893)...
2004 Jan 29
10
Back to 3.0.1, Winbind and Solaris 9
...ot;/var/adm/utmpx", O_RDONLY) = 3 llseek(3, 3720, SEEK_SET) = 3720 read(3, " s a p\0\0\0\0\0\0\0\0\0".., 372) = 372 close(3) = 0 open("/var/adm/sulog", O_WRONLY|O_APPEND|O_CREAT, 0600) = 3 close(3) = 0 chown("/var/adm/sulog", 0, 0) = 0 open("/etc/pam_debug", O_RDONLY) Err#2 ENOENT stat64("/etc/pam.conf", 0xFFBFEAE8) = 0 open("/etc/pam.conf", O_RDONLY) = 3 mmap(0x00000000, 3731, PROT_READ, MAP_PRIVATE, 3, 0) = 0xFF0C0000 munmap(0xFF0C0000, 3731) = 0 close(3) = 0 uname(0x000251C8) = 1 auditsys(BSM_AUDITCTL, 0x00000...