Displaying 20 results from an estimated 30000 matches similar to: "[Bug 432] AIX does not log login attempts for unknown users"
2002 Nov 08
0
[Bug 432] New: AIX does not log login attempts for unknown users
http://bugzilla.mindrot.org/show_bug.cgi?id=432
Summary: AIX does not log login attempts for unknown users
Product: Portable OpenSSH
Version: -current
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2002 Jun 21
4
[Bug 145] sshd fails to increment AIX login failed counter
http://bugzilla.mindrot.org/show_bug.cgi?id=145
------- Additional Comments From dtucker at zip.com.au 2002-06-21 23:43 -------
Created an attachment (id=116)
Merge all previous patches and diff against -cvs
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2001 Feb 04
1
minor aix patch to auth1.c
--- auth1.c.orig Sat Feb 3 18:17:53 2001
Bringa AIX modes in line with latest changes to auth1.c
+++ auth1.c Sat Feb 3 18:19:15 2001
@@ -347,7 +347,7 @@
if (authctxt->failures++ > AUTH_FAIL_MAX) {
#ifdef WITH_AIXAUTHENTICATE
- loginfailed(user,get_canonical_hostname(),"ssh");
+
2002 Jun 06
9
[Bug 261] AIX capabilities + port-aix.c cleanup
http://bugzilla.mindrot.org/show_bug.cgi?id=261
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
OS/Version|other |AIX
------- Additional Comments From dtucker at zip.com.au 2002-06-06 21:22 -------
I finally got a chance to try this. I got compile
2002 Apr 05
5
[Bug 201] Building openssh from CVS fails on AIX 4.2.1
http://bugzilla.mindrot.org/show_bug.cgi?id=201
------- Additional Comments From mouring at eviladmin.org 2002-04-06 02:21 -------
Created an attachment (id=62)
Does this patch help?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Jun 07
1
[Bug 268] ssh-keysign build failure on AIX with gcc
http://bugzilla.mindrot.org/show_bug.cgi?id=268
------- Additional Comments From dtucker at zip.com.au 2002-06-07 17:34 -------
Created an attachment (id=108)
Conditionally define __progname in ssh-keysign.c
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Jan 22
7
AIX reading /etc/environment out of step.
I was discussing with Don about a private topic..and while skimming the
code I noticed that during a 'ssh mouring at site ls' the /etc/environment
is *ONLY* read if the remote machine is an AIX box. This is undocumented
and I'm wondering if someone using AIX could explain WHY it exists in the
session.c:do_child()? No other OS has this. I don't see why AIX should
require it.
2003 Jul 03
0
AIX cleanups: includes and arguments
Hi All.
First the questions:
Is there anything objectionable in this patch?
Is AUDIT_FAIL_AUTH appropriate for the "Reason" field?
Now the details: attached is a patch that changes some of the #includes
for AIX. It moves the AIX-specific includes to port-aix.h and adds
includes that contain the prototypes for many of the authentication
functions. The idea isto fix some warnings.
2003 Feb 28
0
[PATCH] Clean up failed login logging.
Hi All.
As noted in a previous post, the logging of failed user logins is
somewhat spread out. This patch creates a record_failed_login()
function in sshlogin.c and moves the AIX and UNICOS code to it,
eliminating 3 #ifdefs from the main code. It also provides an obvious
place to add the code for any other platforms that support this.
I've tested this on AIX 4.3.3. Wendy Palm was kind
2002 Jun 21
5
[Bug 283] UsePrivilegeSeparation fails on AIX, Couldn't set usrinfo:
http://bugzilla.mindrot.org/show_bug.cgi?id=283
------- Additional Comments From janfrode at parallab.uib.no 2002-06-22 09:00 -------
hmm, I lost part of a sentence there.. I meant to say that commenting out:
if (usrinfo(SETUINFO, cp, i) == -1)
fatal("Couldn't set usrinfo: %s", strerror(errno));
from openbsd-compat/port-aix.c makes sshd function with
2002 Jun 19
4
[Bug 220] sshd fails to read other users authorized_keys over nfs as root
http://bugzilla.mindrot.org/show_bug.cgi?id=220
------- Additional Comments From George.Baltz at noaa.gov 2002-06-20 01:23 -------
FWIW, I reported this to IBM Support, and they seem to agree realpath() is
broken. I have received a patched libc.a, which in light testing seems to
resolve the problem: public key login with perms 770 on ~/.ssh works.
------- You are receiving this mail
2003 Apr 03
0
[PATCH re-send]: Clean up logging of failed logins.
Hi All.
This is a re-send of a patch I submitted before 3.6p1.
As noted in a previous post, the logging of failed user logins is
somewhat spread out. This patch creates a record_failed_login()
function in sshlogin.c and moves the AIX and UNICOS code to it,
eliminating 3 #ifdefs from the main code. It also provides an obvious
place to add the code for any other platforms that support
2001 Nov 09
0
AIX lastlog change
Hi David,
I'm sure loginfailed(..) should be called immediately after
authenticate(..) returned an error. It is directly related
to an invalid password try. (Please see my attached mail from May 2001
to the list).
I'm not so sure when loginsuccess(..) should be called
(setting the loginfailed counter to zero):
Either
1) when somebody logs in successfully using all kinds
of valid
2003 May 06
1
compilation problems AIX 5.2
I am having difficulties compiling openssh3.6p2 under
AIX 5.2. I grabbed the latest from the contrib
section from openssh.com, applied passexpire19.patch
successfully and configure --prefix=/opt/freeware/
--with xauth=/usr/bin/X11/xauth. i get the following
@ the end of the make:
In file included from auth.c:41:
/usr/include/usersec.h:656: warning: `struct aud_rec'
declared inside parameter
2003 Oct 28
4
AIX patch for openssh-3.7.1p2
There are a couple of bugs in the openssh-3.7.1p2. The aix_setauthdb
function does not work with other types of authentication such as AFS/DFS.
The loginfailed test in configure is not correct. Also, AIX can use the
wtmp logging which I added in configure. Attached is the patch.
Thanks,
Matt Richards
-------------- next part --------------
*** openssh-3.7.1p2/openbsd-compat/port-aix.c Mon Jul 14
2003 Sep 22
13
[Bug 697] ending slash is not used
http://bugzilla.mindrot.org/show_bug.cgi?id=697
Summary: ending slash is not used
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sftp-server
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: ramses at
2002 Jun 23
13
[Bug 285] 3.3p1 on Linux 2.2.x doesn't accept connections
http://bugzilla.mindrot.org/show_bug.cgi?id=285
------- Additional Comments From dtucker at zip.com.au 2002-06-23 20:31 -------
Disabling PrivSep (add "UsePrivilegeSeparation no" to sshd_config) should get it
working on 2.2 kernels.
3.3p1 defaults PrivSep to on. Previous releases (that supported it) defaulted to
off.
------- You are receiving this mail because: -------
You
2003 Jun 28
1
[Bug 219] authorized_keys documentation
http://bugzilla.mindrot.org/show_bug.cgi?id=219
------- Additional Comments From dtucker at zip.com.au 2003-06-28 14:52 -------
Created an attachment (id=340)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=340&action=view)
Change authorized_keys description.
How about something like the attached? Or should this bug be closed as
WONTFIX?
------- You are receiving this mail
2003 May 14
3
[Bug 220] sshd fails to read other users authorized_keys over nfs as root
http://bugzilla.mindrot.org/show_bug.cgi?id=220
------- Additional Comments From djm at mindrot.org 2003-05-14 23:06 -------
Any followup on this, Ben?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Aug 14
1
[Bug 353] login failure on tru64
http://cvs-mirror.mozilla.org/webtools/bugzilla/show_bug.cgi?id=353
------- Additional Comments From Wayne.Corelli at hp.com 2002-08-14 23:56 -------
A temporary work around is to set "UsePrivilegeSeparation no" in sshd_config
althought this disables all the "enhanced security" features.
Would someone PLease address this!!!
------- You are receiving this mail