Displaying 20 results from an estimated 58 matches for "pam_end".
Did you mean:
pam_env
2007 Dec 06
0
[Bug 1396] New: When pam-authentication thread ends, it doesn' t call the function pam_end
https://bugzilla.mindrot.org/show_bug.cgi?id=1396
Summary: When pam-authentication thread ends, it doesn't call the
function pam_end
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: normal
Priority: P2
Component: PAM support
AssignedTo: b...
2003 Sep 01
2
[Bug 632] PAM conversation function does not return when connection is aborted
....org
ReportedBy: Markus.Kuhn at cl.cam.ac.uk
When a user presses Ctrl-C in ssh while being prompted by the PAM conversation
function during a keyboard-interactive authentication, then sshd's conversation
function does not return to the PAM library with PAM_CONV_ERR. Instead sshd
calls pam_end() directly from inside the conversation function.
This is in violation of "The Linux-PAM application developers' guide" (draft
0.73, 2000-12-02), which states in section 3.2.1, page 14 that "should an error
occur the application should [...] simply return PAM_CONV_ERR".
Wh...
2002 Oct 21
0
[Bug 419] New: HP-UX PAM problems with 3.5p1
...ithout the reason given is "Permission denied".)
When turning on debug logging in syslog, the messages corresponding
to session termination are
PAM: pam_close_session()
PAM: load_function: successful load of pam_sm_close_session
PAM: pam_setcred: error Authentication failed
PAM: pam_end(): status = Authentication failed
Strange enough that pam_end() is reported to have failed too, despite
the sshd apparently got PAM_SUCCESS returned! I tried the system native
login program to see how it is scheduling PAM session cleanup. Not at
all, neither pam_close_session() nor pam_setcred()...
2002 Jun 11
1
SSH / PAM Problem
...Benutzer die Sitzung beendet.
Hierzu wird zuerst pam_start aufgerufen. Dies authentisiert basierend
auf der pam.conf den Benutzer. Danach wird Accountmanagement
durchgef?hrt. Zum Schlu? folgt session. Diese Stufen werden pam -
Konform durchlaufen. Jedoch wird nachdem session durchgef?hrt wird nicht
pam_end aufgerufen. pam_end ruft die cleanup - Callbacks der einzelnen
Module auf. Da dies nicht aufgerufen wird, werden offene Filehandles
gehalten und sockets nicht geschlossen. pam_end wird erst aufgerufen,
wenn der Benutzer die Verbindung beendet.
Ich hoffe, es ist nicht allzu konfus.
Gru?
Cengiz...
2013 Aug 21
2
Bug on PAM_Winbind ?
...(samba) workgroup users and it works
fine (pam_smbpass). But after joining a domain and start using pam_winbind
too, pwauth (2.3.10) get a segmentation fault when trying to authenticate
any workgroup or domain user. What happens is that it does authenticate the
user successfully, but when it calls pam_end() to release its resources, it
crashes. Maybe pam_winbind is freeing something that will be freed by
pam_end or something like that - I don't really know about PAM and their
modules (smbpass/winbind), but it seems that pam_winbind might be misusing
libtalloc somehow. Any ideas ?
I believe this...
2007 Jun 17
19
[Bug 1322] New: pam_end() is not called if authentication fails, which breaks pam-abl
http://bugzilla.mindrot.org/show_bug.cgi?id=1322
Summary: pam_end() is not called if authentication fails, which
breaks pam-abl
Product: Portable OpenSSH
Version: 4.6p1
Platform: Other
URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=405041
OS/Version: Linux
Status: NEW...
2003 Oct 29
4
Fix for USE_POSIX_THREADS in auth-pam.c
...&null_conv);
- if (sshpam_cred_established) {
- pam_setcred(sshpam_handle, PAM_DELETE_CRED);
- sshpam_cred_established = 0;
- }
- if (sshpam_session_open) {
- pam_close_session(sshpam_handle, PAM_SILENT);
- sshpam_session_open = 0;
- }
- sshpam_authenticated = sshpam_new_authtok_reqd = 0;
- pam_end(sshpam_handle, sshpam_err);
- sshpam_handle = NULL;
+ if (grab_pamh(0, NULL) != NULL) {
+ pam_set_item(grab_pamh(0, NULL), PAM_CONV, (const void *)&null_conv);
+ if (sshpam_cred_established) {
+ pam_setcred(grab_pamh(0, NULL), PAM_DELETE_CRED);
+ sshpam_cred_established = 0;
+ }
+ if (s...
2001 Oct 26
1
PAM session cleanup on Sol8 with v2.9.9p2
In do_pam_cleanup_proc(), there are 3 calls to PAM:
1) pam_close_session() - do lastlog stuff
2) pam_setcred(PAM_DELETE_CRED) - delete credentials
3) pam_end() - close PAM
It appears that pam_setcred() always fails with the error PAM_PERM_DENIED.
This is due to a check done pam_unix.so to not allow a caller with euid 0
to even try to delete their SECURE_RPC credentials. When sshd calls
pam_setcred() to delete the credentials, evidentally, it is runnin...
2014 Dec 12
0
PATCH - add username_format to the PAM auth module
...e), &conv, &pamh);
if (status != PAM_SUCCESS) {
auth_request_log_error(request, "pam", "pam_start() failed: %s",
pam_strerror(pamh, status));
+ str_free(&username);
return PASSDB_RESULT_INTERNAL_FAILURE;
}
@@ -277,6 +300,7 @@
if ((status2 = pam_end(pamh, status)) != PAM_SUCCESS) {
auth_request_log_error(request, "pam", "pam_end() failed: %s",
pam_strerror(pamh, status2));
+ str_free(&username);
return PASSDB_RESULT_INTERNAL_FAILURE;
}
@@ -300,6 +324,7 @@
auth_request_set_field(request, "r...
2002 Jul 10
1
Samba 2.23a PDC
...ord check succeeded
smb_pam_start: PAM: Init user: root
smb_pam_start: PAM: setting rhost to: mads
smb_pam_start: PAM: setting tty
smb_pam_start: PAM: Init passed for user: root
smb_pam_account: PAM: Account Management for User: root
smb_pam_account: PAM: Account OK for User: root
smb_pam_end: PAM: PAM_END OK.
user token sid S-1-5-11
Clearing default real name
User name: root Real name: root
smb_pam_start: PAM: Init user: root
smb_pam_start: PAM: setting tty
smb_pam_start: PAM: Init passed for user: root
smb_pam_end: PAM: PAM_END OK.
Chained message
size=184
sm...
2003 Dec 01
0
No subject
...ord check succeeded
smb_pam_start: PAM: Init user: root
smb_pam_start: PAM: setting rhost to: mads
smb_pam_start: PAM: setting tty
smb_pam_start: PAM: Init passed for user: root
smb_pam_account: PAM: Account Management for User: root
smb_pam_account: PAM: Account OK for User: root
smb_pam_end: PAM: PAM_END OK.
user token sid S-1-5-11
Clearing default real name
User name: root Real name: root
smb_pam_start: PAM: Init user: root
smb_pam_start: PAM: setting tty
smb_pam_start: PAM: Init passed for user: root
smb_pam_end: PAM: PAM_END OK.
Chained message
size=184
sm...
2000 Sep 13
2
auth-pam.c support for pam_chauthtok()
...pam_handle_t *)pamh, PAM_DELETE_CRED);
+ pam_retval = pam_setcred(pamh, PAM_DELETE_CRED);
if (pam_retval != PAM_SUCCESS) {
debug("Cannot delete credentials: %.200s",
- PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
+ PAM_STRERROR(pamh, pam_retval));
}
- pam_retval = pam_end((pam_handle_t *)pamh, pam_retval);
+ pam_retval = pam_end(pamh, pam_retval);
if (pam_retval != PAM_SUCCESS) {
log("Cannot release PAM authentication: %.200s",
- PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
+ PAM_STRERROR(pamh, pam_retval));
}
}
}
@@ -139,14 +171,1...
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...t proceed."
static int do_pam_conversation(int num_msg, const struct pam_message **msg,
struct pam_response **resp, void *appdata_ptr);
@@ -186,12 +184,15 @@
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+/* HP-UX doesn't like credentials to be deleted. Skip and rely on pam_end() */
+#ifndef __hpux
if (__pamh && creds_set) {
pam_retval = pam_setcred(__pamh, PAM_DELETE_CRED);
if (pam_retval != PAM_SUCCESS)
debug("Cannot delete credentials[%d]: %.200s",
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+#endif
if (__pamh) {
pam...
2012 Jun 23
1
Home-Shares are not writeable
...14:07:02.439128, 4] auth/pampass.c:564(smb_pam_account)
smb_pam_account: PAM: Account Management for User: testuser
[2012/06/23 14:07:02.439189, 4] auth/pampass.c:583(smb_pam_account)
smb_pam_account: PAM: Account OK for User: testuser
[2012/06/23 14:07:02.439242, 4] auth/pampass.c:450(smb_pam_end)
smb_pam_end: PAM: PAM_END OK.
[2012/06/23 14:07:02.439255, 3] smbd/sec_ctx.c:418(pop_sec_ctx)
pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0
[2012/06/23 14:07:02.439262, 2] auth/auth.c:304(check_ntlm_password)
check_ntlm_password: authentication for user [testuser] ->
[testuser] ->...
2007 Mar 26
1
Upgrade 3.0.10 to 3.0.24 on RHEL4 - NT_STATUS_LOGON_FAILURE
...nit passed for user: root
[2007/03/26 15:30:46, 4] auth/pampass.c:smb_pam_account(551)
smb_pam_account: PAM: Account Management for User: root
[2007/03/26 15:30:46, 4] auth/pampass.c:smb_pam_account(570)
smb_pam_account: PAM: Account OK for User: root
[2007/03/26 15:30:46, 4] auth/pampass.c:smb_pam_end(440)
smb_pam_end: PAM: PAM_END OK.
[2007/03/26 15:30:46, 5] auth/auth.c:check_ntlm_password(296)
check_ntlm_password: PAM Account for user [root] succeeded
[2007/03/26 15:30:46, 2] auth/auth.c:check_ntlm_password(309)
check_ntlm_password: authentication for user [root] -> [root] -> [r...
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
...t proceed."
static int do_pam_conversation(int num_msg, const struct pam_message **msg,
struct pam_response **resp, void *appdata_ptr);
@@ -186,12 +184,15 @@
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+/* HP-UX doesn't like credentials to be deleted. Skip and rely on pam_end() */
+#ifndef __hpux
if (__pamh && creds_set) {
pam_retval = pam_setcred(__pamh, PAM_DELETE_CRED);
if (pam_retval != PAM_SUCCESS)
debug("Cannot delete credentials[%d]: %.200s",
pam_retval, PAM_STRERROR(__pamh, pam_retval));
}
+#endif
if (__pamh) {
pam...
2003 Nov 18
5
Testing of recent commits
...at cvs.openbsd.org 2003/11/17 11:06:07
[auth2-gss.c gss-genr.c gss-serv.c monitor.c monitor.h]
[monitor_wrap.c monitor_wrap.h sshconnect2.c ssh-gss.h]
replace "gssapi" with "gssapi-with-mic"; from Simon Wilkinson;
test + ok jakob.
- (djm) Bug #632: Don't call pam_end indirectly from within kbd-int
conversation function
- (djm) Export environment variables from authentication subprocess to
parent. Part of Bug #717
-d
2016 Mar 04
7
[Bug 2548] New: Make pam_set_data/pam_get_data work with OpenSSH
...fork ------- (future shell)
| | |
| | exec(bash)
| | |
| | X
| |
| X
|
pam_close_session
|
pam_setcred
|
pam_end
|
X
The problem is, that pam_authenticate and pam_acct_mgmt is called in a
separate auxiliary process. Any data stored using pam_set_data and any
other state information stored by those two functions are lost when the
auxiliary process exits (with exceptions like environment variables,
whic...
2001 Sep 05
1
reinit_creds (was Re: OpenSSHd barfs upon reauthentication: PAM, Solaris 8)
...ccache *before* the account
>management part of PAM has been called and suceeded??
Because you are supposed to call pam functions in this order:
pam_start(pamh,...);
pam_authenticate(pamh, ...);
pam_acct_mgmt(pamh,
pam_setcred(pamh, PAM_ESTABLISH_CRED)
...
pam_setcred(pamh, PAM_DELETE_CRED);
pam_end(pamh);
This is quite clear from the Solaris man page for pam_setcred(3pam)
" The pam_setcred() function is used to establish, modify, or
delete user credentials. It is typically called after the
user has been authenticated and after a session has been
opened. See...
1998 Oct 07
1
Re: sshd and PAM [summary]
-----BEGIN PGP SIGNED MESSAGE-----
Hi,
I''ve got several replies, thank you for them. Let me summarize:
o Many people say there is a PAMified version of ssh available at
ftp://ftp.replay.com/pub/crypto/redhat/SRPMS (the source)
ftp://ftp.replay.com/pub/crypto/redhat/i386 (Intel binaries)
(there are analogous paths for the other architectures). The packages
are made by Jan