Package: libpam-ssh
Version: 1.91.0-9.1
Followup-For: Bug #325351

I'm not sure this relates to the same issue, but I'm able to login using
wrong passwords (apparently only after my first successfull authentication on 
the system with the desired user). If that's desired functionality (behaves 
like it's authenticating against itself), it should be both well documented and 
optional. I'm using the recommended setup as per including pam-ssh-auth & 
pam-ssh-session.



-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.16-1-k7
Locale: LANG=pt_BR, LC_CTYPE=pt_BR (charmap=ISO-8859-1)

Versions of packages libpam-ssh depends on:
ii  libc6                         2.3.6-7    GNU C Library: Shared libraries
ii  libpam0g                      0.79-3.1   Pluggable Authentication Modules l
ii  libssl0.9.8                   0.9.8a-8   SSL shared libraries

Versions of packages libpam-ssh recommends:
ii  ssh                           1:4.2p1-8  Secure shell client and server (tr

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to