The current PAM code requires clients to authenticate via challenge-response to actually authenticate via PAM. sshd should support PasswordAuthentication via PAM as best it can (which requires a "blind" conversation function, which is not ideal but is the best that can be done within the limits of PAM and SSH's password authentication). This would also work with Kerberos/AFS PAM modules (bug #688).
Target next major release.
Created attachment 644 [details] re-add PasswordAuthentication for UsePAM=yes Works for me, but needs lots of testing and review.
Created attachment 645 [details] re-add PasswordAuthentication and UsePAM take 2 Fix a couple of problems spotted by djm. Logging of PAM errors was wrong too, it's been removed for now but will be fixed later.
Created attachment 646 [details] re-add PasswordAuthentication and UsePAM take 3 Fixed logging (debug only, failed password authentications are logged by the main password code), made reused auth-pam.c code more consistent with current code, added comments. Tested OK on Redhat 9 and Solaris 8.
Comment on attachment 646 [details] re-add PasswordAuthentication and UsePAM take 3 ok by me
Thanks, committed to HEAD.