Displaying 7 results from an estimated 7 matches for "pam_debug".
2020 Jul 21
11
[RFC PATCH 0/4] PAM module for ssh-agent user authentication
Hi,
The main (and probably the only) use case of this PAM module is to let
sudo authenticate users via their ssh-agent, therefore without having
to type any password and without being tempted to use the NOPASSWD sudo
option for such convenience.
The principle is originally implemented by an existing module [0][1]
and many pages that explain how to use it for such purpose can be
found online.
2006 Aug 14
4
too many close calls for non-opened fds
...mmended to check the
resource limits. Is there anyway to fix this too many close() calls which
results in performance degradation?
Relavant part of tusc output for sshd is given below,
...............
..............
set_userthreadid(1) ...................................... = 1
stat("/etc/pam_debug", 0x7ffff5b0) ....................... ERR#2 ENOENT
stat("/tcb/files/auth/system/default", 0x7fffec70) ....... ERR#2 ENOENT
getuid() ................................................. = 0 (0)
getuid() ................................................. = 0 (0)
getuid() .....................
2007 Jan 05
0
troubles with telnet sessions under Solaris8 as AD member with winbind V3.0.23d
...7
19080: open("/var/adm/utmpx", O_RDWR) = 8
19080: fstat64(8, 0xFFBEED58) = 0
19080: ioctl(8, TCGETA, 0xFFBEECE4) Err#25 ENOTTY
19080: read(8, "\0\0\0\0\0\0\0\0\0\0\0\0".., 8192) = 6696
19080: open("/etc/pam_debug", O_RDONLY) Err#2 ENOENT
19080: stat64("/etc/pam.conf", 0xFFBEEDF8) = 0
19080: open("/etc/pam.conf", O_RDONLY) = 9
19080: mmap(0x00000000, 3769, PROT_READ, MAP_PRIVATE, 9, 0) = 0xFF1E0000
19080: munmap(0xFF1E0000, 3769)...
2018 Aug 07
2
id <username> - doesnt list all groups
Thank for your answer:
But i dont know understand why is following not working:
I want to restrict the ssh access for a special domain member:
In my "sshd_config" i added:
AllowGroups restrictaccess root
With user2 im able to login via ssh!
log: pam_krb5(sshd:auth): user user2 authenticated as user2 at ROOTRUDI.DE
With user1 im not!
log: User user1 from 192.168.0.100 not allowed
2020 Sep 08
26
[Bug 3210] New: Confusing errors when pam_acct_mgmt() fails
...r as I read that, I do not see any recovery from either of these
errors worth retrying so I believe we should be fine handling them the
same as expired account though.
The attached is proposed patch, which should handle this use case as
well as the original issue in #1188. Tested in Fedora 32 with
pam_debug.so with respective return values as well as with expired
user.
--
You are receiving this mail because:
You are watching the assignee of the bug.
2004 Feb 24
4
Pam trouble
...= 0
29981: fork1() (returning as child ...) = 29964
29981: getpid() = 29981 [29964]
29981: close(15) = 0
29981: lwp_schedctl(SC_STATE|SC_PREEMPT, 0, 0xFFBFF4A4) = 0
29981: open("/etc/pam_debug", O_RDONLY) Err#2 ENOENT
29981: stat64("/etc/pam.conf", 0xFFBFF4C0) = 0
29981: open("/etc/pam.conf", O_RDONLY) = 15
29981: mmap(0x00000000, 1893, PROT_READ, MAP_PRIVATE, 15, 0) = 0xFEBA0000
29981: munmap(0xFEBA0000, 1893)...
2004 Jan 29
10
Back to 3.0.1, Winbind and Solaris 9
...ot;/var/adm/utmpx", O_RDONLY) = 3
llseek(3, 3720, SEEK_SET) = 3720
read(3, " s a p\0\0\0\0\0\0\0\0\0".., 372) = 372
close(3) = 0
open("/var/adm/sulog", O_WRONLY|O_APPEND|O_CREAT, 0600) = 3
close(3) = 0
chown("/var/adm/sulog", 0, 0) = 0
open("/etc/pam_debug", O_RDONLY) Err#2 ENOENT
stat64("/etc/pam.conf", 0xFFBFEAE8) = 0
open("/etc/pam.conf", O_RDONLY) = 3
mmap(0x00000000, 3731, PROT_READ, MAP_PRIVATE, 3, 0) = 0xFF0C0000
munmap(0xFF0C0000, 3731) = 0
close(3) = 0
uname(0x000251C8) = 1
auditsys(BSM_AUDITCTL, 0x00000...