Package: libpam-ssh
Version: 1.91.0-9.1
Severity: important

If you replace pam_unix.so with pam_ssh.so as the module for
authenticating users, say, /etc/pam.d/common-auth contains only:

auth required pam_ssh.so keyfiles=id_dsa

then login will say "Login incorrect" when user does not exist, and the
following is logged to syslog:

May  5 23:28:10 [EMAIL PROTECTED] login[14755]: FAILED LOGIN (1) on 'tty1'
FOR `UNKNOWN', Permission denied

Login should behave the same if the user exist or not as not to leak
information.

If you stack this module after pam_unix but still authenticate against
your ssh keys, then pam_unix will generate a false event indicating that
authentication failed.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.20.1
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages libpam-ssh depends on:
ii  libc6                       2.3.6.ds1-13 GNU C Library: Shared libraries
ii  libpam0g                    0.79-4       Pluggable Authentication Modules l
ii  libssl0.9.8                 0.9.8c-4     SSL shared libraries

Versions of packages libpam-ssh recommends:
pn  ssh-krb5 | ssh                <none>     (no description available)

-- no debconf information

Attachment: signature.asc
Description: Digital signature

Reply via email to