Skip Menu |

This queue is for tickets about the Net-SSH-Perl CPAN distribution.

Report information
The Basics
Id: 6102
Status: resolved
Priority: 0/
Queue: Net-SSH-Perl

People
Owner: Nobody in particular
Requestors: post [...] rolandgruber.de
Cc:
AdminCc:

Bug Information
Severity: Critical
Broken in: 1.25
Fixed in: (no value)



Subject: Login() does not work after Perl update
After upgrading to Perl 5.8.3 the login() command does no longer work. It returns always "Permission denied". When I login on the commandline with same user + password the login works. The ssh server says that the password is wrong (in auth.log). The debug output from Net::SSH::Perl gives no clue what went wrong. We use this module in our project LDAP Account Manager and several users have this problem, too. Here is the debug output from sshd from one of our users: Apr 6 17:50:13 fogra-gate sshd[741]: Connection from 127.0.0.1 port 32973 Apr 6 17:50:13 fogra-gate sshd[465]: debug1: Forked child 741. Apr 6 17:50:13 fogra-gate sshd[741]: debug1: Client protocol version 2.0; client software version 1.25 Apr 6 17:50:13 fogra-gate sshd[741]: debug1: no match: 1.25 Apr 6 17:50:13 fogra-gate sshd[741]: debug1: Enabling compatibility mode for protocol 2.0 Apr 6 17:50:13 fogra-gate sshd[741]: debug1: Local version string SSH-2.0-OpenSSH_3.8p1 Debian 1:3.8p1-2 Apr 6 17:50:13 fogra-gate sshd[741]: debug2: Network child is on pid 742 Apr 6 17:50:13 fogra-gate sshd[741]: debug3: preauth child monitor started Apr 6 17:50:13 fogra-gate sshd[741]: debug3: mm_request_receive entering Apr 6 17:50:14 fogra-gate sshd[741]: debug3: monitor_read: checking request 4 Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_answer_sign Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_answer_sign: signature 0x80b2d18(55) Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_request_send entering: type 5 Apr 6 17:50:14 fogra-gate sshd[741]: debug2: monitor_read: 4 used once, disabling now Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_request_receive entering Apr 6 17:50:14 fogra-gate sshd[741]: debug3: monitor_read: checking request 6 Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_answer_pwnamallow Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_answer_pwnamallow: sending MONITOR_ANS_PWNAM: 1 Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_request_send entering: type 7 Apr 6 17:50:14 fogra-gate sshd[741]: debug2: monitor_read: 6 used once, disabling now Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_request_receive entering Apr 6 17:50:14 fogra-gate sshd[741]: debug3: monitor_read: checking request 45 Apr 6 17:50:14 fogra-gate sshd[741]: debug1: PAM: initializing for "ldapadmin" Apr 6 17:50:14 fogra-gate sshd[741]: debug3: Trying to reverse map address 127.0.0.1. Apr 6 17:50:14 fogra-gate sshd[741]: debug1: PAM: setting PAM_RHOST to "localhost" Apr 6 17:50:14 fogra-gate sshd[741]: debug1: PAM: setting PAM_TTY to "ssh" Apr 6 17:50:14 fogra-gate sshd[741]: debug2: monitor_read: 45 used once, disabling now Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_request_receive entering Apr 6 17:50:14 fogra-gate sshd[741]: debug3: monitor_read: checking request 3 Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_answer_authserv: service=ssh-connection, style= Apr 6 17:50:14 fogra-gate sshd[741]: debug2: monitor_read: 3 used once, disabling now Apr 6 17:50:14 fogra-gate sshd[741]: debug3: mm_request_receive entering Apr 6 17:50:14 fogra-gate sshd[741]: debug1: do_cleanup Apr 6 17:50:14 fogra-gate sshd[741]: debug1: PAM: cleanup Apr 6 17:50:14 fogra-gate sshd[741]: debug3: PAM: sshpam_thread_cleanup entering Apr 6 17:50:35 fogra-gate sshd[535]: debug2: channel 0: rcvd adjust 24485 Apr 6 17:50:35 fogra-gate sshd[535]: debug2: channel 0: rcvd adjust 8819 Apr 6 17:50:36 fogra-gate sshd[535]: debug2: channel 0: rcvd adjust 65536 Apr 6 17:50:36 fogra-gate sshd[535]: debug2: channel 0: rcvd adjust 9503 Apr 6 17:50:36 fogra-gate sshd[535]: debug2: channel 0: rcvd adjust 65536 Apr 6 17:50:36 fogra-gate sshd[535]: debug2: channel 0: rcvd adjust 866 Apr 6 17:50:37 fogra-gate sshd[535]: debug2: channel 0: rcvd adjust 46556
This bug can be deleted. The problem was that the password was stored in LDAP and hashed with SSHA. SSH only supports passwords which are encrypted with the CRYPT hash algorithmn.