Displaying 20 results from an estimated 40000 matches similar to: "[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)"
2003 Mar 10
10
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
------- Additional Comments From djm at mindrot.org 2003-03-10 15:49 -------
Created an attachment (id=247)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=247&action=view)
Call pam_session after child fork()
Hopefully this patch will allow people to gather the feedback necessary to
close this bug.
------- You are receiving this
2003 Jan 07
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |rudolph at getsystems.com
------- Additional Comments From djm at mindrot.org 2003-01-07 18:31 -------
*** Bug 354 has been marked as a
2003 May 16
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|sshd |PAM support
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Sep 15
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
------- Additional Comments From dtucker at zip.com.au 2003-09-15 12:13 -------
Hey, isn't this fixed in -current? do_pam_session is now called before
permanently_set_uid.
Could you please try a snapshot?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Oct 16
2
[Bug 301] In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
------- Additional Comments From misiek at pld.org.pl 2002-10-16 10:14 -------
Of course this bug is not fixed even in latest 3.5 release :-( PAM really
_needs_ root priviledges. Any comments?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Jun 26
0
[Bug 301] New: In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
Summary: In openssh 3.3 and 3.4 pam session seems be called from
non-root
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: critical
Priority: P3
Component: sshd
AssignedTo:
2002 Jan 31
0
[Bug 83] fork() fails when there are PAM limits set
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Version|3.0.2p1 |-current
------- Additional Comments From djm at mindrot.org 2002-01-31 21:46 -------
I'm putting some replies from the
2002 Feb 12
3
[Bug 83] PAM limits applied incorrectly
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|fork() fails when there are |PAM limits applied
|PAM limits set |incorrectly
------- You are receiving this mail because: -------
You
2002 Oct 16
0
[Bug 84] last command provides incorrect information on Solaris 8
http://bugzilla.mindrot.org/show_bug.cgi?id=84
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |misiek at pld.org.pl
------- Additional Comments From djm at mindrot.org 2002-10-16 13:08 -------
*** Bug 301 has been marked as a
2002 Jun 26
1
[Bug 301] In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
------- Additional Comments From ldv at altlinux.org 2002-06-27 03:09 -------
In your case, to make pam_limits work,
use "ulimit -Sc 0" instead of "ulimit -c 0".
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Jun 18
1
[Bug 598] case sensitive in host matching
http://bugzilla.mindrot.org/show_bug.cgi?id=598
Summary: case sensitive in host matching
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: misiek at
2003 Mar 27
1
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |misiek at pld.org.pl
------- Additional Comments From djm at mindrot.org 2003-03-27 21:35 -------
*** Bug 523 has been marked as a
2003 Mar 27
1
[Bug 523] ssh saves only host/ip information in known_hosts while port information is missing
http://bugzilla.mindrot.org/show_bug.cgi?id=523
Summary: ssh saves only host/ip information in known_hosts while
port information is missing
Product: Portable OpenSSH
Version: 3.5p1
Platform: Other
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
2001 Feb 17
2
Important fix (sshd && binding). Portable version only.
If bind() fails we _always_ should close socket. I sent this patch while ago
to djm but I still don't see this fix in openssh_cvs.
diff -urN openssh-2.3.0p1.org/sshd.c openssh-2.3.0p1/sshd.c
--- openssh-2.3.0p1.org/sshd.c Sat Jan 6 19:54:11 2001
+++ openssh-2.3.0p1/sshd.c Sat Jan 6 19:55:48 2001
@@ -782,10 +782,10 @@
debug("Bind to port %s on %s.", strport, ntop);
/*
2004 Apr 28
1
[Bug 855] doesn't properly log logout event in utmp entry when pts bigger than 999
http://bugzilla.mindrot.org/show_bug.cgi?id=855
Summary: doesn't properly log logout event in utmp entry when pts
bigger than 999
Product: Portable OpenSSH
Version: 3.8p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2002 Nov 17
0
NT_STATUS_ACCESS_DENIED with smbclient
Hi,
the problem is that when doing smbclient -L user I'm getting
NT_STATUS_ACCESS_DENIED. ,,user'' is using win xp and I can view
his shares from other _windows_ computer but not with smbclient.
Any ideas why?
[misiek@arm ~]$ smbclient -L lookas -d4
Serverzone is -3600
Initialising global parameters
params.c:pm_process() - Processing configuration file "/etc/samba/smb.conf"
2000 Oct 21
2
scp and regstarting transfer
Hi,
I have one question. Is someone working on restarting transfers ability in scp ?
This will be nice feature especially when you want to download huge file and
you will lost connection (at 90%, 600MB file as I had) :-(
--
Arkadiusz Mi?kiewicz http://www.misiek.eu.org/ipv6/
PLD GNU/Linux [IPv6 enabled] http://www.pld.org.pl/
2000 Mar 07
0
ANNOUNCE: openssh-1.2.2p1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This is a patch release which contains fixes to all the problems
which have been reported over the last month.
Most importantly: OpenSSL-0.9.5 has exposed a bug in RSA key
generation on systems which lack a /dev/random (Solaris, HPUX,
SCO). On such systems this port was not properly initialising
OpenSSL's entropy pool. This results in lower
2001 Sep 28
2
2.9.9p2 bug in PAM support
With OpenSSH 2.9.9p2 as the server, I'm not able to do scp or "ssh
machinename command" in general to any of my Suns!
I tracked this down a bit; the problem occurs only when PAM support is
enabled. However, if I remove line 430 of session.c,
"do_pam_session(s->pw->pw_name, NULL);" inside of do_exec_no_pty, the
problem goes away.
It looks like the following entry
2009 Feb 19
2
auth-worker always opens PAM session
I'm using Dovecot 1.1.7 on CentOS 5.2.
I've changed my passdb from passwd to pam, it works fine, but I've
found this messages on /var/log/secure:
dovecot-auth: PAM adding faulty module: /lib64/security/pam_limits.so
dovecot-auth: PAM unable to dlopen(/lib64/security/pam_limits.so)
dovecot-auth: PAM [error: /lib64/security/pam_limits.so: failed to map
segment from shared object: