Package: openssh-server Version: 1:4.2p1-5 Severity: normal After a day of beating my head against a wall trying to get sshd to log bad logins as it does on my Slackware box, I just realized that it was the Debian specific package that prevented sshd from logging bad login attempts. I would like to see this feature either turned back on, or made into a config option.
-- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Versions of packages openssh-server depends on: ii adduser 3.80 Add and remove users and groups ii debconf [debconf-2.0] 1.4.59 Debian configuration management sy ii dpkg 1.13.11.0.1 package maintenance system for Deb ii libc6 2.3.5-8.1 GNU C Library: Shared libraries an ii libcomerr2 1.38-2 common error description library ii libkrb53 1.4.3-2 MIT Kerberos runtime libraries ii libpam-modules 0.79-3 Pluggable Authentication Modules f ii libpam-runtime 0.79-3 Runtime support for the PAM librar ii libpam0g 0.79-3 Pluggable Authentication Modules l ii libselinux1 1.26-1 SELinux shared libraries ii libssl0.9.8 0.9.8a-4 SSL shared libraries ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers libra ii openssh-client 1:4.2p1-5 Secure shell client, an rlogin/rsh ii zlib1g 1:1.2.3-8 compression library - runtime openssh-server recommends no packages. -- debconf information: ssh/insecure_rshd: ssh/insecure_telnetd: ssh/new_config: true * ssh/use_old_init_script: true ssh/disable_cr_auth: false ssh/encrypted_host_key_but_no_keygen: -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

