On Mon, Jan 29, 2007 at 06:24:38PM +0100, Eric Van Buggenhaut wrote:
> Package: proftpd
> Version: 1.2.10-15sarge4
> Severity: grave
> 
> I have proftpd installed on one of our production server. It seems like
> any user registered with the system can initiate a ftp session whether
> he correctly enters his password. I've been investigating this for a
> while without finding any explanation. Here is /etc/pam.d/proftd:
> 
> #%PAM-1.0
> auth       required     pam_listfile.so item=user sense=deny 
> file=/etc/ftpusers
> onerr=succeed
> @include common-auth
> 
> # This is disabled because anonymous logins will fail otherwise,
> # unless you give the 'ftp' user a valid shell, or /bin/false and add
> # /bin/false to /etc/shells.
> auth       required     pam_shells.so
> 
> 
> and /etc/pam.d/common-auth:
> 
> auth    sufficient      pam_unix.so nullok_secure
> auth    sufficient    pam_ldap.so try_first_pass
> 
> 
> Would that explain why a registered unix user can initiate a session
> without providing any password ?
> 

Providing your proftpd.conf is mandatory before opening
silly grave bugs for a server which is in production since 2005
on sarge and at least 2 years before that on testing. 

Anyway, authoritativeness of any pam module is controlled by
AuthPAMOrder and by default failing a PAM auth does not imply
a denied access necessarily. It depends on your configuration.
The default configuration does not allow unauthenticated users
to login, so the problem is definitively on your side.

-- 
Francesco P. Lovergine


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to