| Summary: | Restarting sshd kills current sessions | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Konstantin Svist <fry.kun> |
| Component: | systemd | Assignee: | systemd-maint |
| Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | urgent | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 16 | CC: | johannbg, lpoetter, metherid, notting, plautrba, systemd-maint |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-12-01 10:16:09 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Konstantin Svist
2011-11-30 01:11:41 UTC
How does your /etc/pam.d/sshd and /etc/pam.d/password-auth look like? Do you have 'UsePam yes' in /etc/ssh/sshd_config? See bug #757545 sshd_config indeed uses old configuration with "UsePam no" This server has a policy of only allowing logins using asymmetric keys -- will pam cause password logins to be allowed? PasswordAuthentication no ChallengeResponseAuthentication no GSSAPIAuthentication no # If you just want the PAM account and session checks to run without # PAM authentication, then enable this but set PasswordAuthentication # and ChallengeResponseAuthentication to 'no'. So with your configuration, PAM is used only for account and session checks and password logins are not enabled. *** This bug has been marked as a duplicate of bug 757545 *** |