Hello Michael,
On Fri, 01 Oct 2021 14:37:44 +0200 Michael Schindler
wrote:
x On the client machine with libpam-ssh installed,
however, this functionality is broken: Instead of forwarding the agent from the
server, it sets the environment variables SSH_AUTH_PID and SSH_AUTH_SOCK then
point to
On Mon, 29 Nov 2021 11:19:36 +0100 Jerome BENOIT wrote:
Thanks for sharing your file.
I will have a closer look soon,
Cheers,
Jerome
ping,
cheers,
Jerome
--
Jerome BENOIT | calculus+at-rezozer^dot*net
https://qa.debian.org/developer.php?login=calcu...@rezozer.net
AE28 AE15 710D FF1D 87E5 A76
Thanks for sharing your file.
I will have a closer look soon,
Cheers,
Jerome
OpenPGP_signature
Description: OpenPGP digital signature
Looks like my spam filter ate the notification that you answered, and/or
since my post was "additional information only", I did not get a
notification in the first place.
My /etc/pam.d/sddm:
(lines wrapped by email client marked with \)
-
#%PAM-1.0
# Block login if
On Sun, 3 Oct 2021 03:25:54 +0300 Matti Kurkela wrote:
Dear Kurkela, thanks for your report.
I apologies for my late reply.
Actually I agree with your comments.
My current set up on my main computer follows your comment below.
So far I can remember, I have never revisited the pam-auth-update(
I am working on it.
OpenPGP_signature
Description: OpenPGP digital signature
The workaround/fix for this would be to not let pam-auth-update add
pam_ssh.so into common-auth and common-session, but add the necessary
lines *selectively* only to services that handle local logins like
/etc/pam.d/login and /etc/pam.d/*dm, but *not* to /etc/pam.d/sshd.
That should allow libp
Package: libpam-ssh
Version: 2.3+ds-2
Severity: critical
Justification: breaks unrelated software
Dear Maintainer,
I configured and used the ssh-key forwarding of openssh. The mere installation
of libpam-ssh on the client machine breaks the functionality of
agent-forwarding in openssh: The reason
8 matches
Mail list logo