- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Newer T1471AA Secure Shell unexpectedly incrementi...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-26-2011 08:32 AM
09-26-2011 08:32 AM
Newer T1471AA Secure Shell unexpectedly incrementing TCB failed login count
Under T1471AA Secure Shell version 5.3.7 on a Trusted Mode system, when I lack an "authorized keys" file and I am sent to the Password: prompt, the failed login count is not incremented until I enter the wrong password.
However in 5.6, my failed login count is bumped up by one when I fail the public key based authentication (moving my authorized_keys file out of the way), leaving me at one failed login before I even have a chance to enter my password. I haven't had a chance to try 5.8 yet, but I expect it wouldn't be any different. We have "UsePAM" enabled due to other requirements.
There's a section in the "known bugs" of the release notes discussing login failure audit events under SMSE (Standard Mode Security Extensions), but it doesn't mention a workaround. Our security requirements are tightening steadily, and we're having to implement locking an account after only three failed logins. This issue cuts that even further to only two, in effect, for anyone who doesn't use public-key authentication.
Does anyone have any suggestions? It's not clear whether we'd be permitted to revert to an earlier SSH to resolve this, so it'd be best to find a fix in the sshd_config or pam.conf if at all possible.
Thanks!
- Tags:
- ssh