| Summary: | telnet SRA password exchange trap when no password | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Base System | Reporter: | remy <remy> | ||||
| Component: | bin | Assignee: | nsayer <nsayer> | ||||
| Status: | Closed FIXED | ||||||
| Severity: | Affects Only Me | ||||||
| Priority: | Normal | ||||||
| Version: | 4.2-STABLE | ||||||
| Hardware: | Any | ||||||
| OS: | Any | ||||||
| Attachments: |
|
||||||
|
Description
remy
2001-03-29 17:30:01 UTC
Responsible Changed From-To: freebsd-bugs->nsayer nsayer wrote the SRA support State Changed From-To: open->closed Generally, SRA uses PAM for its authentication. telnetd is correctly passing the information obtained from the user via SRA into PAM. PAM is, aparently, deciding not to allow authentication on accounts with null passwords. This is probably adjustable in the pam.conf file. Check the 'telnetd' section (plaintext telnet winds up using the 'login' section, since it isn't actually telnet doing the authentication). There is a code path in SRA that will reject authentication with passwordless accounts, but it is #ifdef'd out when PAM support is turned on, which is the default. |