similar to: AIX and ADMCHG

Displaying 20 results from an estimated 2000 matches similar to: "AIX and ADMCHG"

2011 Jun 19
5
[Bug 1915] New: SSH5.4p1 in the AIX server, the system output error(ERRPT) when the password change fails ADMCHG flag.
https://bugzilla.mindrot.org/show_bug.cgi?id=1915 Summary: SSH5.4p1 in the AIX server, the system output error?ERRPT? when the password change fails ADMCHG flag. Product: Portable OpenSSH Version: 5.4p1 Platform: All OS/Version: AIX Status: NEW Severity: major Priority: P2
2007 Apr 06
1
Password enforcement problem with OpenSSH on AIX.
Hello, I've encountered a password enforcement problem with OpenSSH on AIX. In AIX, when the user contains the flags = ADMCHG in the /etc/security/passwd file, the user is forced to change the password at next login. It works for telnet but it does not work under the OpenSSH v3.4 version. Based on my research, it appears this issue is resolved with OpenSSH v3.8p1. Can anyone confirm?
2002 Feb 15
1
OpenSSH test server?
Hey guys, is there a publicly-available server out there to which I can connect my OpenSSH client? I'm just looking for a system that I can connect to (preferably 2.9.9p2), verify the session is working properly, and disconnect. Thanks, Kevin Cawlfield
2005 Apr 28
1
ssh 4.0 under AIX 5.3 password expiration
I have a user who's password has expired (ADMCHG) flag is set in /etc/security/passwd under AIX 5.3. For some reason it is not prompting for new passwd. This worked in 3.9. Any ideas? Thanks, Ryan # /usr/sbin/sshd -d debug1: sshd version OpenSSH_4.0p1 debug1: private host key: #0 type 0 RSA1 debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug1: read
2003 Apr 15
3
[Bug 543] sshd does not use AIX's setauthdb
http://bugzilla.mindrot.org/show_bug.cgi?id=543 Summary: sshd does not use AIX's setauthdb Product: Portable OpenSSH Version: 3.6p1 Platform: PPC OS/Version: AIX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: cawlfiel at
2002 Aug 25
7
[Bug 355] No last login message with PrivSep under AIX
http://bugzilla.mindrot.org/show_bug.cgi?id=355 ------- Additional Comments From dtucker at zip.com.au 2002-08-25 18:10 ------- It looks like the call to loginsuccess() fails because it's done as a non-privileged user. This is bad because in addition to generating the message it also clears the failed login counter that leads to account lockout. The following patch fixes it for me
2003 Jan 09
7
[Bug 14] Can't change expired /etc/shadow password without PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=14 ------- Additional Comments From dtucker at zip.com.au 2003-01-09 23:17 ------- Created an attachment (id=199) --> (http://bugzilla.mindrot.org/attachment.cgi?id=199&action=view) Implement password change via /bin/passwd in session. openssh-passexpire10.patch: * Implementes shadow and AIX password expiry. * Adds general expire_message
2004 Jun 17
2
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Proces s Software SSH for OpenVMS
I have found that this server, <snip> debug1: Remote protocol version 1.99, remote software version 3.1.0 F-SECURE SSH - Process Software SSH for OpenVMS debug1: no match: 3.1.0 F-SECURE SSH - Process Software SSH for OpenVMS </snip> does not follow the IETF secsh draft [1] related to the SSH_MSG_USERAUTH_PASSWD_CHANGEREQ message. <snip> ... Normally, the server responds
2006 Jun 23
0
[Bug 1136] User not logged off after forced password change in AIX 5.3
http://bugzilla.mindrot.org/show_bug.cgi?id=1136 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |INVALID ------- Comment #7 from dtucker at zip.com.au 2006-06-23 19:50
2000 Apr 25
3
passwords for NT and AIX
I've finally gotten Samba (version 1.9.18p4) working on a RS/6000 server running AIX version 4.3.2, for a group of Windows NT 4.0 workstations on build 5 to access some shared directories. Everything works fine when I set them up - I have encrypt passwords = yes smb passwd file = /usr/local/samba/private/smbpasswd in my smb.conf, added the passwords to the smbpasswd file, and it
2005 Dec 19
6
[Bug 1136] User not logged off after forced password change in AIX 5.3
http://bugzilla.mindrot.org/show_bug.cgi?id=1136 Summary: User not logged off after forced password change in AIX 5.3 Product: Portable OpenSSH Version: 4.1p1 Platform: PPC OS/Version: AIX Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at
2013 Apr 19
1
Auth_Banner question
Hi all, I'm working with a pure PHP implementation of the SSH2 protocol. I've read the rfc and the thousands of lines in this project: http://phpseclib.sourceforge.net/ I'm simply trying to add a feature that will capture and display the USERAUTH_BANNER displayed by Open sshd prior to login. When I connect to my opensshd server configured with the banner from openssh on any
2018 Sep 28
2
Support for RFC4252 in sshd with PAM
Hi I'm trying to integration a Java application using SSHJ <https://github.com/hierynomus/sshj> client-side - into OpenSSH 7.4. This is fine, except where I get to a password expiry situation. Looking at RFC4252 <https://www.ietf.org/rfc/rfc4252.txt> (which is supported by SSHJ) I don't see any SSH_MSG_USERAUTH_PASSWD_CHANGEREQ [60] messages getting passed from
2003 Oct 01
1
Build fails on AIX 5.2
I'm trying to build openssh-3.7.1p2 on aix and am currently failing with the build errors below. This is a default build no special config options. I was able to build 3.6.1p2 with the patches but havn't been able to build any version of 3.7. I saw some changes were made to aix files in the changelog. /usr/include/sys/audit.h:284: warning: `\' followed by white space at end of
2004 Feb 11
0
OpenSSH 3.8 and password expiry.
Hi All. I'm pleased to report that as of yesterday, OpenSSH -current now supports forced changes of expired passwords on most platforms, and bug #14 is now closed. Specifically, AIX's native authentication, BSD Authentication and shadow passwords with the expiry field are supported. The password is changed by exec'ing /usr/bin/passwd in the session. Interested parties should
2002 Mar 27
4
[Bug 188] pam_chauthtok() is called too late
http://bugzilla.mindrot.org/show_bug.cgi?id=188 ------- Additional Comments From Nicolas.Williams at ubsw.com 2002-03-28 02:43 ------- Created an attachment (id=55) Patch to do pw aging in kbd-interactive ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2023 Aug 10
2
Packet Timing and Data Leaks
Philipp Marek wrote: > An easy workaround is to use a password manager (a plain file as a minimum) If you can/want to use a file then consider using a key instead. publickey authentication is non-interactive on the wire and the key is already unlocked so packet timing leaks nothing about your passphrase. //Peter
2004 Dec 03
3
do_pwchange() is broken on SCO UnixWare 7
The do_pwchange() function in session.c needs to pass the username as an argument to the passwd command. Without it, passwd always fails with something like "passwd: unknown user" as if its getting a blank user arg. It's strange but so are many other things in SCO, which BTW was NOT my OS of choice :( To make it work I simply changed line 1317 to this: execl(_PATH_PASSWD_PROG,
2004 Jun 29
1
OpenVMS SSH password expiry woes continue
I sent in a patch a week or so ago for a problem a customer of mine was seeing when trying to connect to their OpenVMS system with an 3.8.1p2 OpenSSH client (running on a linux box or in cygwin) and trying to login to an account who had an expired password. The problem continues although now it has nothing to do with what my patch handled as they have since upgraded their SSH software on the VMS
2014 Nov 18
55
[Bug 2319] New: [PATCH REVIEW] U2F authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=2319 Bug ID: 2319 Summary: [PATCH REVIEW] U2F authentication Product: Portable OpenSSH Version: 6.7p1 Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: Miscellaneous Assignee: unassigned-bugs at