Displaying 20 results from an estimated 100000 matches similar to: "[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)"
2002 Oct 16
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |misiek at pld.org.pl
Summary|PAM limits applied |PAM limits applied
|incorrectly
2003 Jan 07
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |rudolph at getsystems.com
------- Additional Comments From djm at mindrot.org 2003-01-07 18:31 -------
*** Bug 354 has been marked as a
2003 Mar 10
10
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
------- Additional Comments From djm at mindrot.org 2003-03-10 15:49 -------
Created an attachment (id=247)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=247&action=view)
Call pam_session after child fork()
Hopefully this patch will allow people to gather the feedback necessary to
close this bug.
------- You are receiving this
2003 Sep 15
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
------- Additional Comments From dtucker at zip.com.au 2003-09-15 12:13 -------
Hey, isn't this fixed in -current? do_pam_session is now called before
permanently_set_uid.
Could you please try a snapshot?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Feb 12
3
[Bug 83] PAM limits applied incorrectly
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|fork() fails when there are |PAM limits applied
|PAM limits set |incorrectly
------- You are receiving this mail because: -------
You
2002 Jan 31
0
[Bug 83] fork() fails when there are PAM limits set
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Version|3.0.2p1 |-current
------- Additional Comments From djm at mindrot.org 2002-01-31 21:46 -------
I'm putting some replies from the
2002 Jun 26
0
[Bug 301] New: In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
Summary: In openssh 3.3 and 3.4 pam session seems be called from
non-root
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: critical
Priority: P3
Component: sshd
AssignedTo:
2002 Jan 29
2
[Bug 83] New: fork() fails when there are PAM limits set
http://bugzilla.mindrot.org/show_bug.cgi?id=83
Summary: fork() fails when there are PAM limits set
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2002 Oct 16
2
[Bug 301] In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
------- Additional Comments From misiek at pld.org.pl 2002-10-16 10:14 -------
Of course this bug is not fixed even in latest 3.5 release :-( PAM really
_needs_ root priviledges. Any comments?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
1999 Dec 09
2
OpenSSH-1.12pre17: PATCH: Red Hat PAM limits
With the sshd in recent releases of OpenSSH, some Red Hat Linux systems
complain about ulimit trying to raise a limit when logging in via ssh.
The problem is that packages/redhat/sshd.pam doesn't do limit checking
for an sshd session.
The attached patch adds the pam_limits module to the sshd session,
which checks for limits set in /etc/security/limits.conf.
This works on Red Hat Linux 5.2
2003 Mar 26
1
Changing PAM service name in sshd_config, or running sshd as non-root
Currently, openssh's PAM service name is a compile-time choice.
That's fine when one uses one sshd to serve normal shell logins
and the like. But this will not work IF sshd is nor run as
root (which I don't want it to do), because pam_open_session
usually requires access to one's shadow information (for account
expiration perhaps?), and there is no way (and need: this sshd
is
2000 Jun 09
0
OpenSSH's UseLogin option allows remote access with root privilege. (fwd)
--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
---------- Forwarded message ----------
Date: Fri, 9 Jun 2000 17:06:30 +0200
From: Markus Friedl <markus.friedl at informatik.uni-erlangen.de>
To: BUGTRAQ at SECURITYFOCUS.COM, misc at openbsd.org,
2002 Apr 17
0
[Bug 120] sshd fails pty chown() when run as non-root userid
http://bugzilla.mindrot.org/show_bug.cgi?id=120
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Severity|normal |enhancement
Keywords| |help-wanted
------- You are receiving this mail because: -------
You are
2014 Apr 18
3
[Bug 2233] New: curve25519-sha256@libssh.org Signature Failures When 'sshd' Used with Dropbear Clients
https://bugzilla.mindrot.org/show_bug.cgi?id=2233
Bug ID: 2233
Summary: curve25519-sha256 at libssh.org Signature Failures When
'sshd' Used with Dropbear Clients
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: All
Status: NEW
Severity: major
Priority: P5
2004 Jan 14
18
[Bug 789] pam_setcred() not being called as root
http://bugzilla.mindrot.org/show_bug.cgi?id=789
Summary: pam_setcred() not being called as root
Product: Portable OpenSSH
Version: 3.7.1p2
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: PAM support
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2004 Jan 14
18
[Bug 789] pam_setcred() not being called as root
http://bugzilla.mindrot.org/show_bug.cgi?id=789
Summary: pam_setcred() not being called as root
Product: Portable OpenSSH
Version: 3.7.1p2
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: PAM support
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2003 May 14
1
[Bug 564] new PAM code only calls pam_acct_mgmt for challenge-response clients
http://bugzilla.mindrot.org/show_bug.cgi?id=564
Summary: new PAM code only calls pam_acct_mgmt for challenge-
response clients
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2003 Jan 24
0
[Bug 473] New: cannot update password using PAM on HP-UX system that has been tsconverted
http://bugzilla.mindrot.org/show_bug.cgi?id=473
Summary: cannot update password using PAM on HP-UX system that
has been tsconverted
Product: Portable OpenSSH
Version: older versions
Platform: All
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
2002 Feb 18
0
[Bug 120] New: sshd fails pty chown() when run as non-root userid
http://bugzilla.mindrot.org/show_bug.cgi?id=120
Summary: sshd fails pty chown() when run as non-root userid
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2002 Jun 26
1
[Bug 301] In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
------- Additional Comments From ldv at altlinux.org 2002-06-27 03:09 -------
In your case, to make pam_limits work,
use "ulimit -Sc 0" instead of "ulimit -c 0".
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.