On 03/19/2013 01:46 PM, Alex wrote:
It sure is. How did you become so proficient with it?
I've been using LDAP and to some lesser extend KRB5 for a long-ish time.
I've done my share of troubleshooting authentication issues during
that time.
It's been around
forever, but has never been ver
Hi,
>> It appears that you're saying ssh as root would fail because of the
>> UID >=1000 and pam_deny
>
> PAM is complex.
It sure is. How did you become so proficient with it? It's been around
forever, but has never been very well documented. Do you use it
regularly?
Thanks for the great explana
On 03/19/2013 08:55 AM, Alex wrote:
It appears that you're saying ssh as root would fail because of the
UID >=1000 and pam_deny
PAM is complex.
If the password is successful against pam_unix, processing stops. For
any user that successfully authenticates with pam_unix, none of the
remaining
Hi,
>> I am trying to ssh into my fc18 server as root and have the following
>> message in syslog:
>>
>> Mar 18 18:29:20 bwipropnew sshd[12473]: pam_succeed_if(sshd:auth):
>> requirement "uid >= 1000" not met by user "root"
>
> You'll see that after an auth failure for any account with uid < 1000:
On 03/18/2013 07:02 PM, Alex wrote:
I am trying to ssh into my fc18 server as root and have the following
message in syslog:
Mar 18 18:29:20 bwipropnew sshd[12473]: pam_succeed_if(sshd:auth):
requirement "uid >= 1000" not met by user "root"
You'll see that after an auth failure for any account
Hi all,
I am trying to ssh into my fc18 server as root and have the following
message in syslog:
Mar 18 18:29:20 bwipropnew sshd[12473]: pam_succeed_if(sshd:auth):
requirement "uid >= 1000" not met by user "root"
I see this is defined in /etc/login.defs as well as various files in
/etc/pam.d/. I