[PATCH] Added features for AIX authentication

douglas.manton at uk.ibm.com douglas.manton at uk.ibm.com
Wed Sep 6 01:49:42 EST 2000



Please find attached a patch I put together to provide some useful extras
using
OpenSSH 2.2.0p1 under AIX.  I have been forced to write these to allow
OpenSSH to
conform to our local security policy and to aid our user administration
department.

Please note that in testing of this latest release we found "useLogin yes"
to be
broken again.  Since login provides no extra functionality in this
environment we
have disabled it completely.  This change was omitted from this patch.

      - Prompts user to change expired password (regardless of
authentication
        method used, but only for interative sessions).  This enforces the
system's
        password policy.  E.g.

                $ ssh remotehost
                testing's New password:

                Your new password must have:
                        minimum of 1 alphabetic character
                        minimum of 1 non-alphabetic character
                        minimum of 3 characters not in old password
                        maximum of 2 repeated characters
                        minimum of 6 characters in length

                Your password failed to meet:
                        minimum of 1 alphabetic character
                        minimum of 1 non-alphabetic character
                        minimum of 6 characters in length

                user at remotehost's password:

                3004-610 You are required to change your password.
                Please choose a new one.

                user's New password:
                Re-enter user's new password:
                $

      - Reports why login is denied to users who have successfully
authenticated
        but cannot log in due to security restriction (locked account, no
rlogin,
        logintimes).  E.g.

                $ ssh remotehost
                Enter passphrase for RSA key 'user at localhost':
                Received disconnect: There have been too many unsuccessful
login
                        attempts; please see the system administrator.

                $ scp test remotehost:test
                testing at localhost's password:
                Received disconnect: You are not allowed to login at this
time.

                lost connection

      - Increments the failed login count with each failed authentication
attempt
        (to match AIX login's behaviour).  Previous behaviour was to
increment once
        after AUTH_FAIL_MAX attempts.  Our policy is 5 strikes -- the
previous
        behaviour gave 25.

I have tested these with the OpenSSH client and SecureCRT v3.1.  They don't
attempt
to extend the SSH protocols -- they work within established sessions.

     (See attached file: aix_changes.patch)

Best wishes,
--------------------------------------------------------
 Doug Manton, AT&T EMEA Firewall and Security Solutions

                   demanton at att.com
--------------------------------------------------------
"If privacy is outlawed, only outlaws will have privacy"
-------------- next part --------------
A non-text attachment was scrubbed...
Name: aix_changes.patch
Type: application/octet-stream
Size: 6073 bytes
Desc: not available
Url : http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20000905/42015690/attachment.obj 


More information about the openssh-unix-dev mailing list