Displaying 20 results from an estimated 60000 matches similar to: "[Bug 117] OpenSSH second-guesses PAM"
2002 Feb 14
2
[Bug 117] OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117
------- Additional Comments From djm at mindrot.org 2002-02-15 10:10 -------
> OpenSSH traditionally would not even start PAM, and
> now starts it specifying 'NOUSER' as the login name.
We have always used NOUSER, the recent patch just makes it consistent between
protocols 1 and 2.
> The second is to prevent username guessing
2002 Apr 16
5
[Bug 117] OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117
------- Additional Comments From fcusack at fcusack.com 2002-04-16 23:27 -------
sshd should definitely not be using 'NOUSER'. The correct thing is to use
the username, regardless of whether (pw) exists. I can't understand why
you would substitute the value 'NOUSER'.
------- You are receiving this mail because: -------
2003 May 14
0
[Bug 117] OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Resolution| |FIXED
------- Additional Comments From djm at mindrot.org 2003-05-14 10:26
2002 Feb 14
0
[Bug 117] New: OpenSSH second-guesses PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=117
Summary: OpenSSH second-guesses PAM
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: abartlet at
2016 Mar 04
8
[Bug 2548] New: Make pam_set_data/pam_get_data work with OpenSSH
https://bugzilla.mindrot.org/show_bug.cgi?id=2548
Bug ID: 2548
Summary: Make pam_set_data/pam_get_data work with OpenSSH
Product: Portable OpenSSH
Version: 7.2p1
Hardware: Sparc
OS: Solaris
Status: NEW
Severity: major
Priority: P5
Component: PAM support
Assignee:
2003 Jul 30
7
[Bug 564] new PAM code only calls pam_acct_mgmt for challenge-response clients
http://bugzilla.mindrot.org/show_bug.cgi?id=564
------- Additional Comments From djm at mindrot.org 2003-07-30 11:48 -------
Maybe UsePAM should be a tri-state: "kbd-int", "no" or "always". This is ugly -
suggestions wanted.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 May 12
10
[Bug 559] PAM fixes
http://bugzilla.mindrot.org/show_bug.cgi?id=559
Summary: PAM fixes
Product: Portable OpenSSH
Version: 3.6.1p2
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: fcusack at fcusack.com
- start PAM
2015 Feb 20
2
Call for testing: OpenSSH 6.8
On Fri, 20 Feb 2015, ?smail D?nmez wrote:
> Hi,
>
> On Fri, Feb 20, 2015 at 12:21 AM, Damien Miller <djm at mindrot.org> wrote:
> > Hi,
> >
> > OpenSSH 6.8 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This release contains
> > some substantial new features and a number of bugfixes.
>
2015 Jul 07
2
[Bug 2426] New: OpenSSH doesn't need the second call to do_pam_setcred() on non-Linux platforms
https://bugzilla.mindrot.org/show_bug.cgi?id=2426
Bug ID: 2426
Summary: OpenSSH doesn't need the second call to
do_pam_setcred() on non-Linux platforms
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Sparc
OS: Solaris
Status: NEW
Severity: minor
Priority: P5
2003 Mar 10
10
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
------- Additional Comments From djm at mindrot.org 2003-03-10 15:49 -------
Created an attachment (id=247)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=247&action=view)
Call pam_session after child fork()
Hopefully this patch will allow people to gather the feedback necessary to
close this bug.
------- You are receiving this
2019 Feb 14
2
Modifying 7.9p1 to use PAM
On Thu, Feb 7, 2019 at 11:16 PM Damien Miller <djm at mindrot.org> wrote:
>
> On Fri, 8 Feb 2019, CLOSE Dave wrote:
>
> > I deal with a large number of internal machines that have not been
> > updated for a while and which I am not at liberty to update. They run
> > Fedora 20 which includes openssh 6.4p1. For various reasons, I'd like to
> > put a more
2014 Apr 24
0
Help implementing username_format in auth PAM driver
While configuring my server with dovecot I noticed that the PAM
authentication driver does not support the username_format option as
does the password file driver. This didn't seem too hard to implement
so I through together a patch.
As you can see in the attached patch I only modify the username sent
to PAM. Despit doing this I run into the domain lost
2024 Nov 06
2
[Bug 3749] New: RELEASE_KEY.asc at https://www.openssh.com/portable.html is expired
https://bugzilla.mindrot.org/show_bug.cgi?id=3749
Bug ID: 3749
Summary: RELEASE_KEY.asc at
https://www.openssh.com/portable.html is expired
Product: Portable OpenSSH
Version: 9.9p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component:
2003 Sep 21
11
[Bug 696] PAM modules getting bypassed when connecting from f-secure ssh client to openssh 3.7p1 or 3.7.1p1 servers
http://bugzilla.mindrot.org/show_bug.cgi?id=696
Summary: PAM modules getting bypassed when connecting from f-
secure ssh client to openssh 3.7p1 or 3.7.1p1 servers
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: Sparc
OS/Version: Solaris
Status: NEW
Severity: minor
Priority: P2
2000 Sep 13
2
auth-pam.c support for pam_chauthtok()
When we installed OpenSSH 2.1.1p4 on our Solaris systems, our users
noticed that it did not honor password expiration consistently with
other Solaris login services.
The patch below is against OpenSSH 2.2.0p1 and adds support for PAM
password changes on expiration via pam_chauthtok(). A brief summary of
changes:
auth-pam.c:
* change declaration of pamh to "static pam_handle_t *pamh",
2002 Oct 16
2
[Bug 301] In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
------- Additional Comments From misiek at pld.org.pl 2002-10-16 10:14 -------
Of course this bug is not fixed even in latest 3.5 release :-( PAM really
_needs_ root priviledges. Any comments?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Feb 13
5
[Bug 114] Invalid users vs. PAM (protocol 1 only (?))
http://bugzilla.mindrot.org/show_bug.cgi?id=114
------- Additional Comments From djm at mindrot.org 2002-02-13 23:00 -------
Created an attachment (id=24)
Fake username for invalid ssh protocol 1 users
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2014 Jun 18
15
[Bug 2246] New: PAM enhancements for OpenSSH server
https://bugzilla.mindrot.org/show_bug.cgi?id=2246
Bug ID: 2246
Summary: PAM enhancements for OpenSSH server
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Sparc
OS: Solaris
Status: NEW
Severity: enhancement
Priority: P5
Component: PAM support
Assignee: unassigned-bugs at
2015 Aug 11
10
[Bug 2443] New: Bugs intended to be fixed for OpenSSH 7.1
https://bugzilla.mindrot.org/show_bug.cgi?id=2443
Bug ID: 2443
Summary: Bugs intended to be fixed for OpenSSH 7.1
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
2003 Nov 13
4
[Bug 632] PAM conversation function does not return when connection is aborted
http://bugzilla.mindrot.org/show_bug.cgi?id=632
das at decisionsoft.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Severity|major |security
Priority|P2 |P1
------- Additional Comments From das at decisionsoft.com 2003-11-13