ssh 4.0 under AIX 5.3 password expiration

Ryan Robertson r3r2 at yahoo.com
Fri Apr 29 09:51:02 EST 2005


I have a user who's password has expired (ADMCHG) flag
is set in /etc/security/passwd under AIX 5.3.  For
some reason it is not prompting for new passwd.  This
worked in 3.9.  Any ideas?

Thanks,
Ryan

# /usr/sbin/sshd -d
debug1: sshd version OpenSSH_4.0p1
debug1: private host key: #0 type 0 RSA1
debug1: read PEM private key done: type RSA
debug1: private host key: #1 type 1 RSA
debug1: read PEM private key done: type DSA
debug1: private host key: #2 type 2 DSA
debug1: rexec_argv[0]='/usr/sbin/sshd'
debug1: rexec_argv[1]='-d'
debug1: Bind to port 22 on 0.0.0.0.
Server listening on 0.0.0.0 port 22.
debug1: Bind to port 22 on ::.
Bind to port 22 on :: failed: Address already in use.
Generating 768 bit RSA key.
RSA key generation complete.
debug1: fd 4 clearing O_NONBLOCK
debug1: Server will not fork when running in debugging
mode.
debug1: rexec start in 4 out 4 newsock 4 pipe -1 sock
9
debug1: inetd sockets after dupping: 3, 3
Connection from 192.168.247.63 port 34762
debug1: Client protocol version 2.0; client software
version OpenSSH_3.8.1p1
debug1: match: OpenSSH_3.8.1p1 pat OpenSSH_3.*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-1.99-OpenSSH_4.0
debug1: permanently_set_uid: 202/201
debug1: list_hostkey_types: ssh-rsa,ssh-dss
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user dummy service
ssh-connection method none
debug1: attempt 0 failures 0
Failed none for dummy from 192.168.247.63 port 34762
ssh2
Failed none for dummy from 192.168.247.63 port 34762
ssh2
debug1: userauth-request for user dummy service
ssh-connection method publickey
debug1: attempt 1 failures 1
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 203/1 (e=0/0)
debug1: trying public key file
/home/dummy/.ssh/authorized_keys
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 203/1 (e=0/0)
debug1: trying public key file
/home/dummy/.ssh/authorized_keys2
debug1: restore_uid: 0/0
Failed publickey for dummy from 192.168.247.63 port
34762 ssh2
debug1: userauth-request for user dummy service
ssh-connection method publickey
debug1: attempt 2 failures 2
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 203/1 (e=0/0)
debug1: trying public key file
/home/dummy/.ssh/authorized_keys
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 203/1 (e=0/0)
debug1: trying public key file
/home/dummy/.ssh/authorized_keys2
debug1: restore_uid: 0/0
Failed publickey for dummy from 192.168.247.63 port
34762 ssh2
debug1: userauth-request for user dummy service
ssh-connection method keyboard-interactive
debug1: attempt 3 failures 3
debug1: keyboard-interactive devs
debug1: auth2_challenge: user=dummy devs=
debug1: kbdint_alloc: devices ''
Failed keyboard-interactive for dummy from
192.168.247.63 port 34762 ssh2
debug1: userauth-request for user dummy service
ssh-connection method password
debug1: attempt 4 failures 4
debug1: do_cleanup
Segmentation fault(coredump)


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 




More information about the openssh-unix-dev mailing list