| Summary: | Behaviour of openssh with pam_tally is very buggy | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | dave <dave> |
| Component: | PAM support | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WORKSFORME | ||
| Severity: | normal | CC: | djm |
| Priority: | P2 | ||
| Version: | 4.3p2 | ||
| Hardware: | Other | ||
| OS: | Linux | ||
|
Description
dave
2006-09-25 22:39:38 AEST
Forgot to add the fourth bug: 4) Use of a correct password doesn't reset the tally. When you say "password authentication" do you mean SSH protocol password authentication? ie does "ssh -o preferredauthentications=password server" behave as you're describing? 8 months with no reply == no bug Great way of fixing a bug - ask whether "password" means "password" then close after 8 months without performing the checks included in the bug. The magic words here are "password" and "pam"; in essence meaning ssh password authentication that uses pam (so in theory anything else that ssh uses to authenticate against pam). Though it's a pretty moot point now - I've just retried the steps and at some point in the past 9 months somebody has fixed the buggy code. Nice of you to finally respond. I asked because there are two protocol methods in SSH that allow password authentication: keyboard-interactive and password. Since you didn't see fit to attach a debug trace, I had to ask. Close resolved bugs after release. |