Displaying 20 results from an estimated 3000 matches similar to: "[Bug 609] empty password accounts can login with random password"
2003 Jul 01
3
[Bug 611] Unnecessary authentication attempt in auth2-none.c creates delay
http://bugzilla.mindrot.org/show_bug.cgi?id=611
Summary: Unnecessary authentication attempt in auth2-none.c
creates delay
Product: Portable OpenSSH
Version: 3.6.1p2
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-bugs
2008 May 22
6
[Bug 1468] New: sshd does not log failed attempts using key-based authentication only
https://bugzilla.mindrot.org/show_bug.cgi?id=1468
Summary: sshd does not log failed attempts using key-based
authentication only
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: security
Priority: P2
2013 Sep 24
2
Protocol negotiation issue in rsync
I was trying to use rsync to send files to a fileserver using an rssh
restricted server.
It refuses, saying that trying to override the shell with -e is forbidden. I
didn't type "-e".
When I look at the source, I see
/* Checking the pre-negotiated value allows --protocol=29 override. */
if (protocol_version >= 30) {
/* We make use of the -e
2007 Dec 05
1
[patch] Headers, unresolved footnotes, and fractions
Hi folks, thanks for the useful code!
I've added some functionality to PHP Markdown Extra and PHP
SmartyPants. Diffs attached.
For PHP Markdown Extra:
*A new config option, MARKDOWN_HEADER_BASE, which sets the largest
header level that Markdown can generate and defaults to 1; useful if
you use <h1> for site-wide elements and want Markdown-generated
headers to start at
2020 Jul 18
2
[Bug 3193] New: Add separate section in sshd_config man page on Access Control
https://bugzilla.mindrot.org/show_bug.cgi?id=3193
Bug ID: 3193
Summary: Add separate section in sshd_config man page on Access
Control
Product: Portable OpenSSH
Version: 8.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2014 Aug 26
2
Dual boot with Windows 8.1, UEFI
(apologies for the length - there are questions at the end...)
I've been running Linux for 20 years, and done a lot of dual-boots. I know
that's old-school now, but I run Linux 95% of the time yet don't want to
lose a Windows system I've paid for - but I've never tried removing it
from a system and reinstalling the same licenced copy inside a virtual machine.
I bought a
2003 Jun 10
2
SecurID authentication for 3.6.1p2 with privsep
Hello all,
I have made SecurID authentication for OpenSSH 3.6.1p2.
This patch was totaly rewritten, so please test it before use.
Kbd-int authentication is now integrated into challenge response
auth.
Privsep is now fully suported.
PS: What do you think of selective access to the individual
authentications, similar to AllowGroups/DenyGroups or maybe
AllowUsers/DenyUsers ?
Vaclav Tomec
2003 May 07
1
3.6.1p2, Spurious PAM failure messages WITH "PermitEmptyPasswords no", and a (micro) fix
Hi,
after installing 3.6.1p2 I noticed spurious PAM login failures
even with PermitEmptyPasswords set to "no":
sshd(pam_unix)[1740]: authentication failure; logname=XXX uid=0 euid=0
tty=NODEVssh ruser= rhost=localhost user=XXX
After looking at the code I noticed the following in the portability p2
patch:
+++ openssh-3.6.1p2/auth-passwd.c 2003-04-29 19:12:08.000000000 +1000
2003 Jul 10
1
OpenSSH 3.6.1p2 +UnixWare 7.1.1 +SSH2 + PasswordAuthentication no + PermitEmptyPasswords yes
Greetings,
I recently discovered a problem with OpenSSH 3.6.1p2 and UnixWare 7.1.1
(as well as OpenServer 5.0.X and SCO 3.2v4.2)
When I set up sshd_config as follows:
PasswordAuthentication no
PermitEmptyPasswords yes
and try to connect to a password less account ( I know its a F*up, but
that's the application ID10Ts .... ) I can get in using the SSH2 version
without a valid key, the
2003 Sep 17
4
[Bug 652] PermitEmptyPasswords option silently ignored
http://bugzilla.mindrot.org/show_bug.cgi?id=652
Summary: PermitEmptyPasswords option silently ignored
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: All
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2003 Jul 10
1
OpenSSH 3.6.1p2 +UnixWare 7.1.1 +SSH2 + PasswordAuthentication no + PermitEmptyPasswords yes (followup)
Greetings,
Problem : Openssh3.6.1p2 on UnixWare 7.1.1 allows access to passwordless
account without a valid key when sshd_config has PasswordAuthentication no
+ PermitEmptyPasswords yes
Attempts:
Installed maintence pack3 and recompiled both OpenSSH and OpenSSL (0.9.7b)
with native c compiler.
Recompiled both OpenSSH and OpenSSL (0.9.7b) with gcc (2.95.2).
Still the same problem.
Looking at
2002 May 15
0
/etc/usertty and SSH login
I want to set up a machine which has an account with no password that can
only be used locally, i.e. you cannot login over the network.
The machine is in a room which is normally locked. It needs access to the
network for videoconferencing, and this seemed a reasonable way to do
things rather than putting passwords on post-it notes or Web pages.
This is on a PC running RedHat Linux (7.0)
I
2003 Feb 12
1
((AllowUsers || AllowGroups) && !(AllowUsers && AllowGroups))
Hey everyone,
After discussing the AllowGroups I think I've discovered a bug.
The system is a solaris 8 system and the problem is that when I use
AllowGroups with no AllowUsers args, the proper actions happen. Same
with AllowUsers and no AllowGroups. When I try to combine the two, none
of the Allow directives seem to take.
Is it just me or maybe a bug?
-James
2003 Nov 06
5
[Bug 755] PermitEmptyPasswords ignored
http://bugzilla.mindrot.org/show_bug.cgi?id=755
Summary: PermitEmptyPasswords ignored
Product: Portable OpenSSH
Version: -current
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: critical
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2003 May 02
6
openssh 3.6.1_p2 problem with pam (fwd)
----- Forwarded message from Andrea Barisani <lcars at infis.univ.trieste.it> -----
Date: Fri, 2 May 2003 14:01:33 +0200
From: Andrea Barisani <lcars at infis.univ.trieste.it>
To: openssh at openssh.com
Subject: openssh 3.6.1_p2 problem with pam
Hi, I've just updated to openssh 3.6.1_p2 and I notice this behaviour:
# ssh -l lcars mybox
[2 seconds delay]
lcars at mybox's
2005 Jun 28
2
more flexible AllowUsers/DenyUsers syntax
Hi,
I hope this is the right place for a feature request.
I'd like to have more flexible AllowUsers/DenyUsers synax.
I am in a situation, where I have machines connected to three
networks (a private, high speed, a public, and a private vpn) and I'd
like to enable root logins only on the private networks. Currently I
see no way of doing this, because there is no way to specify a
2008 Jul 22
2
Dual video card, 1 monitor each (ref dual head) CentoS4.6 xorg does only 1 head
I need to start running a dual head on one of my machines. Eventual
target is CentOS 5.x. Decided to test first on my 4.6 setup (eventually
it will achieve 5.x). Both machines are fully up to date.
The test machine is 4.6, 2 radeon video cards. Searched the web, CentOS
site, even bugzilla. This bugzilla entry from a 4.2 system),
http://bugs.centos.org/view.php?id=1875
had only a WFM response.
2004 May 27
1
openssh & delay
Hi, I wrote you to ask whether this patch is OK for you. I extracted
from the current debian openssh patch set.
The problem is that in a openssh 3.6.1p2
installation compiled with pam support
when one is doing an ssh connection to a 3.6.1p2 ssh server there is a
slight delay of around 3-4 seconds before one gets the login, and even
before you type the login name and password you get this
2009 Sep 02
8
[Bug 1646] New: Match directive does not override default settings
https://bugzilla.mindrot.org/show_bug.cgi?id=1646
Summary: Match directive does not override default settings
Product: Portable OpenSSH
Version: 5.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
2011 Sep 19
6
64.31.19.48 attempt to break into my computer
>From my secure log:
Sep 19 01:16:44 lin12 dovecot-auth: pam_unix(dovecot:auth): check pass; user unknown
Sep 19 01:16:44 lin12 dovecot-auth: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser= rhost=::ffff:64.31.19.48
Sep 19 01:16:44 lin12 dovecot-auth: pam_succeed_if(dovecot:auth): error retrieving information about user aaron
Sep 19 01:16:45 lin12