Displaying 20 results from an estimated 2000 matches similar to: "[Bug 117] OpenSSH second-guesses PAM"
2001 Sep 05
1
reinit_creds (was Re: OpenSSHd barfs upon reauthentication: PAM, Solaris 8)
>> >Could we please have a clarification on the semantics of
>> >PAM_CRED_ESTABLISH vs. the semantics of PAM_REINITIALIZE_CREDS?
>>
>> My interpretation is:
>>
>> You call PAM_ESTABLISH_CRED to create them
>> You call PAM_REINITIALIZE_CRED to update creds that can expire over time,
>> for example a kerberos ticket.
Oops. I meant
2001 Sep 05
2
reinit_creds (was Re: OpenSSHd barfs upon reauthentication: PAM, Solaris 8)
>Neither the Sun PAM documentation nor the Linux-PAM documentation
>describe the semantics of PAM_REINITIALIZE_CREDS in any useful detail.
I would agree it is vague, but then that is also a problem with the XSSO
document (http://www.opengroup.org/onlinepubs/008329799/)
>Could we please have a clarification on the semantics of
>PAM_CRED_ESTABLISH vs. the semantics of
2002 Apr 16
5
[Bug 117] OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117
------- Additional Comments From fcusack at fcusack.com 2002-04-16 23:27 -------
sshd should definitely not be using 'NOUSER'. The correct thing is to use
the username, regardless of whether (pw) exists. I can't understand why
you would substitute the value 'NOUSER'.
------- You are receiving this mail because: -------
2003 Oct 29
4
Fix for USE_POSIX_THREADS in auth-pam.c
As many of you know, OpenSSH 3.7.X, unlike previous versions, makes
PAM authentication take place in a separate process or thread
(launched from sshpam_init_ctx() in auth-pam.c). By default (if you
don't define USE_POSIX_THREADS) the code "fork"s a separate process.
Or if you define USE_POSIX_THREADS it will create a new thread (a
second one, in addition to the primary thread).
The
2002 Aug 30
4
Patch so that sshd makes use of PAM_USER
<<pam_user.patch>>
Hello. I created a patch that causes sshd to take notice of the value of PAM_USER after calling into the pam_xxx functions. This makes it possible for a PAM module to effect user mappings by setting the value of PAM_USER with pam_set_item(). If anyone has comments or suggestions, let me know.
Thanks,
Jeremy
-------------- next part --------------
A non-text
2001 Oct 25
3
PAM conversation stuff
Okay, I'm confused again. They way you guys are talking about the
conversation routine, it would seem that you think it is a way to fetch
something from the user - like a new password. Is this possible? Does
calling pam_chauthtok() cause the underlying pam_sm_chauthtok()
eventually print something on stdout and read a new password from stdin
(the socket to the client) using the conversation
2000 Sep 13
2
auth-pam.c support for pam_chauthtok()
When we installed OpenSSH 2.1.1p4 on our Solaris systems, our users
noticed that it did not honor password expiration consistently with
other Solaris login services.
The patch below is against OpenSSH 2.2.0p1 and adds support for PAM
password changes on expiration via pam_chauthtok(). A brief summary of
changes:
auth-pam.c:
* change declaration of pamh to "static pam_handle_t *pamh",
2000 Nov 17
4
cvs
Hello,
I use cvs to download samba
with pserver.samba.org
i get the 2.0.4b version !
where can i get the last stable release (2.0.7)
and alpha versions with cvs and anonymous ?
Thanks
Guy Roussin
2004 Jun 14
1
PAM_RHOST item
A little problem, which is bugging me: when using PAM authentication,
Dovecot (0.99.5) does not set the PAM_RHOST item, so the PAM modules
cannot know who the client is. We need this for some PAM module doing
access control.
Changing passdb-pam.c to pam_set_item it seems trivial, but I'm bugged
as to how to get the client name from there. It seems not to be
available in the auth_request
2002 Feb 14
0
[Bug 117] New: OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117
Summary: OpenSSH second-guesses PAM
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: abartlet at
2001 Feb 12
2
OSF_SIA bug in 2.3.0p1
Is anyone maintaining the OSF_SIA support in openssh? This seems to be an
obvious bug triggered if you try to connect as a non-existant user.
>From auth1.c line 459
#elif defined(HAVE_OSF_SIA)
(sia_validate_user(NULL, saved_argc, saved_argv,
get_canonical_hostname(), pw->pw_name, NULL, 0,
NULL, "") == SIASUCCESS)) {
#else /*
2004 Dec 28
2
LinuxPAM and sshd: changing conversation function doesn't work but claims to.
Hi.
I'm one of the OpenSSH developers, and I've done some of the work on
sshd's PAM interface recently.
I've discovered some behaviour peculiar to LinuxPAM that I can't
explain: changing the conversation function does not appear to work,
even though the pam_set_item() call claims to succeed. The previous
conversation function is still called.
Background: the PAM API
2003 May 02
6
openssh 3.6.1_p2 problem with pam (fwd)
----- Forwarded message from Andrea Barisani <lcars at infis.univ.trieste.it> -----
Date: Fri, 2 May 2003 14:01:33 +0200
From: Andrea Barisani <lcars at infis.univ.trieste.it>
To: openssh at openssh.com
Subject: openssh 3.6.1_p2 problem with pam
Hi, I've just updated to openssh 3.6.1_p2 and I notice this behaviour:
# ssh -l lcars mybox
[2 seconds delay]
lcars at mybox's
2018 Feb 12
3
FreeBSD Core dump: PAM authentication with Kerberos credentials (GSSAPI_MIT)
Hi everyone,
I have a repeatable core dump when running dovecot on FreeBSD in the
specific scenario described below.
Dovecot is linked against MIT kerberos in /usr/local/lib/, whilst PAM is
linked against Heimdal in /usr/lib/.
My expectation was that dovecot authentication using GSSAPI would use MIT
kerberos in /usr/local/lib, whereas PAM authentication is independent from
dovecot and would
2003 Mar 10
1
[Bug 117] OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117
------- Additional Comments From djm at mindrot.org 2003-03-10 11:57 -------
Created an attachment (id=245)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=245&action=view)
Use supplied username in pam_start calls always
Make sshd always use supplied username (even if it is invalid) in calls to PAM
------- You are receiving this
2013 Nov 04
1
is sssd *faster* than samba4's builtin winbind?
Using samba 4.0.9 as an AD DC (no other domain servers).
Since my UIDs and GIDs have changed, I was doing cleanup:
find /srv/svn/ -xdev '(' -nouser -o -nogroup ')' -ls
I noticed this was very slow -- iostat reported only about 2tps and
50kB/s to my disks. So I timed it with nsswitch.conf users & groups set
to "files" vs. "files winbind":
# with
2001 Mar 06
1
Mapping SMB usernames to SCO users
I have about 40 SCO 5.0.5 servers on which I am installing samba (I've
tried 2.0.3 and 2.0.7, I'm having the same trouble with both).
For my example, assume the following:
NT domain: ORLANDO_ADMIN
NT PDC: ORLANDO_PDC
NT user: Administrator (I have tried other users as well)
samba server: CLASS
guest account (on UNIX server): nouser
A generic Unix account exists called samba.
My goal
2006 Jul 05
1
Could not get shadow information for NOUSER
Hello all,
I have a CentOS 4.2 server that gives me these error messages in my
/var/log/secure file, I realise that these are SSH attacks, but where does
the extra line "Could not get shadow information for NOUSER" come from?
This doesn't make any sense. I have many servers running CentOS 4.2, but
don't get this error message on any others. I hate junk in my logs. Is
there
2006 Jan 17
2
OpenSSH, Radius, PAM & NOUSER issue
Hi !
Sorry to bring back the infamous "NOUSER" in the conversation but I didn't get the workaround on that problem.
Firstly, I'm using :
- openssh-3.1p1-15 which is the version which comes by default with my Red Hat Linux Advanced Server release 2.1AS.
- I'm using PAM, set up to use radius. Please find below the /etc/pam.d/sshd file :
#%PAM-1.0
auth
2001 Oct 09
1
TISviaPAM patch
Here is a patch that does TIS auth via PAM. It's controlled by a switch
in the sshd_config. You'd use it by having a PAM module that sets
PAM_PROMPT_ECHO_ON. eg, you could use it with pam_skey or pam_smxs.
The patch is against the 2.9.9p2 distribution.
I'm not on the list, a reply if this patch is accepted would be great.
(But not required, I know some folks have a distaste for