Displaying 20 results from an estimated 3000 matches similar to: "/etc/nologin and Solaris PAM bug"
2000 Jul 09
0
OpenSSH 2.1.1p2: /etc/nologin handling and related stuff
Attached is a patch to be applied with GNU patch -p0, notice that
configure needs to be regenerated.
The patch addresses the following annoyances:
* On AIX there is a signal called SIGDANGER which is sent to all
processes when the machine runs low on virtual memory. This patch
makes sure that this signal is ignored, because the default on older
AIX releases is to kill the running process
2000 Aug 01
1
RSA authentication bypassing /etc/nologin
Hello everyone,
I noticed recently that when I had /etc/nologin in place on my
server I couldn't log in when I authenticated via passwords, but when I used
RSA authentication I was able to log in no problem. I looked through the
source, and I think I might see where the problem is. I have a Linux system,
so sshd was compiled with PAM support. Using normal authentication, the
pam_nologin
2001 Apr 13
0
Fixed patch for Digital Unix SIA
Okay, here is a fixed version of the patch I sent before for fixing the
problems I know about with Digital Unix SIA: displaying too much info
(MOTD, last login, etc.) when access is denied, and the loss of the
error message sometimes when access is denied.
It does break some code out of do_login into a couple of separate
functions. I did this to avoid duplicating the code in a couple of
places.
2007 Jan 22
2
nologin not working with openssh >= 4.3 and authentication != password
Hi developers,
today I tried to disable logins to an ssh server by putting a nologin
file into /etc. This only worked for logins that use the password
authentication mechanism. publickey-based authentications still
succeeded and the users were allowed into the system. This seems
straightforward to me since openssh 4.3 disabled the evaluation of
/etc/nologin in favour of pam_nologin but
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
Hello,
appended is a patch that makes it possible to use PAM both for
password authentication and TIS (i.e. s/key or opie or any other
interactive challenge/response scheme). I have developed this starting
from the patch at http://www.debian.org/Bugs/db/61/61906.html on
Debian with openssh-2.1.1p4-3. After configuring ssh with
--with-pam-tis, there are two PAM services, "sshd" and
2000 Oct 07
0
OpenSSH changes for BSD/OS
The following are patches against openssh 2.1.1p4 to add
support for the BSD_AUTH authentication mechanisms. It allows the
use of non-challenge/response style mechanisms (which styles are
allowed my be limited by appropriate auth-ssh entries in login.conf).
The patches also add support for calling setusercontext for the
appropriate class when called with a command (so that the PATH, limits,
2002 Feb 15
0
[Bug 118] New: Implement TIS (protocol 1) via PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=118
Summary: Implement TIS (protocol 1) via PAM
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: fcusack at
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
Hello All.
Attached is an update to my previous patch to make do_pam_chauthtok and
privsep play nicely together.
First, a question: does anybody care about these or the password
expiration patches?
Anyway, the "PRIVSEP(do_pam_hauthtok())" has been moved to just after
the pty has been allocated but before it's made the controlling tty.
This allows the child running chauthtok to
2000 Oct 15
1
Patch for Digital Unix SIA authentication
A while back, I sent in a patch that added Digital Unix SIA
authentication to OpenSSH. Well, I just figured out that it didn't
handle everything correctly (locked accounts could still log in). I
thought I had checked that, but I guess I missed it.
Anyway, here is a patch against OpenSSH 2.2.0p1 that fixes this.
--
Chris Adams <cmadams at hiwaay.net>
Systems and Network Administrator
2018 Nov 29
2
Where to implement user limit settings ?
Hello,
I'm trying to implement setting of user limits (ulimit) in sshd. I'm
not using PAM so I need it in the sshd itself. The task is very simple -
just to put one line calling setup_limits(pw); and link with -lshadow.
But the problem is, where to put this line. I did it in session.c,
in do_child(), like this:
#ifdef HAVE_OSF_SIA
session_setup_sia(pw, s->ttyfd == -1 ? NULL
2000 Dec 27
0
/etc/nologin ignored on RSA auth
Hi,
and here's another bug report against openssh which I could verify using
openssh from cvs. So could we please change the behaviour of openssh to
be consistent?
> when /etc/nologin exists and the pam_nologin.so module is included in
> the sshd pam file then users will be denied access when it exists
> (though its contents are not displayed to them) however if the user
>
2000 Nov 25
0
/etc/nologin & Solaris
I know this has come up before and I even saw a patch from Niklas
Edmundsson for 2.1.1p2 (see
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=96316919430887&w=2 )
I had the (mis)fortune recently of realizing that if PAM is defined,
/etc/nologin is not honored. session.c tells me that pam_nologin is
supposed to take care of this, and that's nice, except that it's a
Linux
2001 Mar 22
0
Solaris UseLogin problem
I was having problems getting the UseLogin option to work
on Solaris.
I would recieve this error:
No utmpx entry. You must exec "login" from the lowest level "shell".
This led me to believe that Solaris login wants a utmpx entry in
order to function. I put together a patch that calls record_login
on Solaris when using the system login. I also noticed that writing
a wtmpx
2000 Oct 24
2
feature request & patch submit: chroot(2) in sshd
Hello,
whereas most people take passwd/shadow/ldap/<whatever> as the place where
decision on a chrooted environment / sandbox for certain users is met (just
set the given usershell appropriateley), I needed a somewhat different
approach. Below is a tiny patch to 2.2.0p1 which enhances the sshd-config
by two options and, when set, places all users / users of a certain group
immediately in
2000 Jun 09
0
OpenSSH's UseLogin option allows remote access with root privilege. (fwd)
--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
---------- Forwarded message ----------
Date: Fri, 9 Jun 2000 17:06:30 +0200
From: Markus Friedl <markus.friedl at informatik.uni-erlangen.de>
To: BUGTRAQ at SECURITYFOCUS.COM, misc at openbsd.org,
2000 Jun 09
2
OpenSSH's UseLogin option allows remote access with root privilege.
OpenSSH's UseLogin option allows remote access with root privilege.
1. Systems affected:
The default installation of OpenSSH is not vulnerable, since
UseLogin defaults to 'no'. However, if UseLogin is enabled,
all versions of OpenSSH prior to 2.1.1 are affected.
2. Description:
If the UseLogin option is enabled the OpenSSH server (sshd)
2002 Jun 28
0
Newer OSF patch.
It still is not right, but thanks to Steve we have gotten this far..
The issue seems to be here:
debug3: entering: type 26
debug3: entering
debug1: session_new: init
debug1: session_new: session 0
debug3: entering: type 26
: sendmsg(12): Invalid argument
debug1: Calling cleanup 0x1200365c0(0x14000d9d8)
debug1: session_pty_cleanup: session 0 release /dev/ttyp4
debug1: Calling cleanup
2010 Jan 21
2
nologin in auth proto version 1.1
I notice that the nologin parameter for the AUTH command is gone in
version 1.1 of Dovecot Authentication Protocol.
nologin was added in 1.1, so that authentication client could indicate
that there will be no subsequent master requests to retrieve user info.
Could we have nologin back please?
Kirill
2010 Jan 11
2
/etc/nologin must be world-readable which is not totally clear
hi, the man page for sshd(1) says about /etc/nologin: "The file
should be world-readable". However, nologin has no effect if it's not
readable by the connecting user:
if (pw->pw_uid)
f = fopen(_PATH_NOLOGIN, "r");
if (f) {
/* /etc/nologin exists. Print its contents and exit. */
...
...
return(254)
if root has a
2013 Jan 31
3
Userdb passwd and 'nologin' users
I am running Dovecot with system users (userdb passwd), but some of
those users don't have shell accounts on the IMAP server so their shell
on that machine is set to /usr/sbin/nologin. Currently I am using
maildirs and this is not a problem, but I am in the process of switching
to dbox which means I will need a cronjob running 'doveadm purge -A'.
During testing I found that those