Package: libpam-ssh Version: 1.91.0-9.1 Followup-For: Bug #325351
I'm not sure this relates to the same issue, but I'm able to login using wrong passwords (apparently only after my first successfull authentication on the system with the desired user). If that's desired functionality (behaves like it's authenticating against itself), it should be both well documented and optional. I'm using the recommended setup as per including pam-ssh-auth & pam-ssh-session. -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.16-1-k7 Locale: LANG=pt_BR, LC_CTYPE=pt_BR (charmap=ISO-8859-1) Versions of packages libpam-ssh depends on: ii libc6 2.3.6-7 GNU C Library: Shared libraries ii libpam0g 0.79-3.1 Pluggable Authentication Modules l ii libssl0.9.8 0.9.8a-8 SSL shared libraries Versions of packages libpam-ssh recommends: ii ssh 1:4.2p1-8 Secure shell client and server (tr -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

