This sounds to me as if it's the same thing I'm seeing. Prior to my update last Wednesday I had no such auth failure entries in my logs. On Wednesday I updated all my Redhat boxes to:
RH 9: openssh-server-3.5p1-6.9 RH 7.2, 7.3: openssh-server-3.1p1-8 I mostly use DSA keys, but passwords occasionally. No kerberos is in use. Every time I ssh to another machine I succeed as before, but I get an additional entry in /var/log/messages like Aug 3 23:08:27 tioga sshd(pam_unix)[20524]: authentication failure; logname= uid=0 euid=0 tty=NODEVssh ruser= rhost=myhost user=myuser followed by Aug 3 23:08:29 tioga sshd(pam_unix)[20524]: session opened for user myuser by (uid=0) Everything still works fine, but the auth failure messages are a little unnerving. I've googled all over the web, learned a little bit about PAM, tried a number of small configuration changes to /etc/ssh/sshd_config and /etc/pam.d/sshd but the auth failure messages from pam_unix are still generated. My configuration is pretty vanilla, and I didn't change it at the time I updated the openssh packages. I'd be happy to know what's going on, and whether there is something I can fix to stop the (erroneous?) auth failure logging. I sure don't want to start ignoring auth failure messages... Thanks, Bill Barnard > We just upgraded to this version of openssh due to the recent > vulnerability (RHSA-2003:222-08). > > Everything still works, but now we get a log message in > /var/log/messages > everytime a connection is made via public/private keypairs or password > entry: > > sshd[11632]: pam_krb5: authenticate error: Input/output error (5) > > If we backout to openssh-server-3.4p1-2, the log messages go away. I > tried googling, but turned up nothing. -- redhat-list mailing list unsubscribe mailto:[EMAIL PROTECTED] https://www.redhat.com/mailman/listinfo/redhat-list