Date: Mon, 31 Jul 2006 04:07:05 GMT From: Michael Reynolds <michael.reynolds@gmail.com> To: freebsd-gnats-submit@FreeBSD.org Subject: misc/101075: pam_group always fails Message-ID: <200607310407.k6V475mp075465@www.freebsd.org> Resent-Message-ID: <200607310410.k6V4AGGK012678@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 101075 >Category: misc >Synopsis: pam_group always fails >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Jul 31 04:10:16 GMT 2006 >Closed-Date: >Last-Modified: >Originator: Michael Reynolds >Release: 6.1-RELEASE >Organization: >Environment: FreeBSD lithium.delinked.us 6.1-RELEASE FreeBSD 6.1-RELEASE #0: Sun May 7 04:32:43 UTC 2006 root@opus.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386 >Description: pam_group fails in the following context: auth optional pam_group.so group=users Where, by failure, it does not cause the chain to fail as it's the last member of the chain auth requisite pam_group.so group=suspended deny Where, by failure, it rejects everyone, regardless of group membership (These were tested in /etc/pam.d/sshd) >How-To-Repeat: Place the lines into your sshd pam config file and login with appropriate group memberships. >Fix: >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200607310407.k6V475mp075465>