This sounds to me as if it's the same thing I'm seeing. Prior to my
update last Wednesday I had no such auth failure entries in my logs. On
Wednesday I updated all my Redhat boxes to:

RH 9: openssh-server-3.5p1-6.9
RH 7.2, 7.3: openssh-server-3.1p1-8

I mostly use DSA keys, but passwords occasionally. No kerberos is in
use.

Every time I ssh to another machine I succeed as before, but I get an
additional entry in /var/log/messages like

Aug  3 23:08:27 tioga sshd(pam_unix)[20524]: authentication failure;
logname= uid=0 euid=0 tty=NODEVssh ruser= rhost=myhost  user=myuser

followed by

Aug  3 23:08:29 tioga sshd(pam_unix)[20524]: session opened for user
myuser by (uid=0)

Everything still works fine, but the auth failure messages are a little
unnerving. I've googled all over the web, learned a little bit about
PAM, tried a number of small configuration changes to
/etc/ssh/sshd_config and /etc/pam.d/sshd but the auth failure messages
from pam_unix are still generated. My configuration is pretty vanilla,
and I didn't change it at the time I updated the openssh packages.

I'd be happy to know what's going on, and whether there is something I
can fix to stop the (erroneous?) auth failure logging. I sure don't want
to start ignoring auth failure messages...

Thanks,

Bill Barnard


> We just upgraded to this version of openssh due to the recent 
> vulnerability (RHSA-2003:222-08). 
>
> Everything still works, but now we get a log message in
> /var/log/messages
> everytime a connection is made via public/private keypairs or password
> entry:
>
> sshd[11632]: pam_krb5: authenticate error: Input/output error (5)
> 
> If we backout to openssh-server-3.4p1-2, the log messages go away. I
> tried googling, but turned up nothing.


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to