Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 83585 - SSH Does not conform to Password Expiration Standard
SSH Does not conform to Password Expiration Standard
Product: Red Hat Linux
Classification: Retired
Component: openssh (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Nalin Dahyabhai
Brian Brock
Depends On:
Blocks: 98330 107562
  Show dependency treegraph
Reported: 2003-02-05 15:20 EST by Sherif Abdelgawad
Modified: 2013-08-05 23:19 EDT (History)
11 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2004-05-12 00:23:35 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
patch to allow password expiration to work in non separated mode (840 bytes, patch)
2003-09-15 14:49 EDT, Neil Horman
no flags Details | Diff

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2004:114 normal SHIPPED_LIVE Updated openssh packages fix password expiration bugs 2004-05-12 00:00:00 EDT

  None (edit)
Description Sherif Abdelgawad 2003-02-05 15:20:16 EST
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.0.1) Gecko/20020823

Description of problem:
SSH drops/close the connection if the user authenticating has an expired
password, rather than prompting for changing the password as it should be.

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1.# useradd test

2.# chage test
Changing the aging information for test
Enter the new value, or press return for the default

        Minimum Password Age [0]:
        Maximum Password Age [90]:
        Last Password Change (YYYY-MM-DD) [2002-12-05]: 2002-11-01
        Password Expiration Warning [7]:
        Password Inactive [-1]:
        Account Expiration Date (YYYY-MM-DD) [1969-12-31]:

Change the Last updates password to be more than the Max Password age
(i.e. force to fall in expiration)

3.# ssh test@0
test@0's password:
Connection to 0 closed by remote host.
Connection to 0 closed.


Actual Results:  Close connection 

Expected Results:  prompt for new password like

# ssh test@0
test@0's password:
You are required to change your password immediately (password aged)
Warning: Your password has expired, please change it now
Changing password for test
(current) UNIX password:

Additional info: The the promlem does not exists on the ssh version on AS2.1
Comment 1 Sherif Abdelgawad 2003-02-05 15:27:35 EST
it seems to be only on OpenSSH 3.4p1
Comment 2 Antonio Pérez Pérez 2003-06-09 11:57:46 EDT
This problem also exists in Redhat9 openssh-server-3.5p1-6.

You will find a report for this bug in OpenSSH bugzilla as #423: 
"Workaround for pw change in privsep mode (3.5.p1)"

I've found this through a message from Darren Tucker
He also gives a patch for this bug (patch #198) that I've tested in Redhat9
openssh-server 3.5p1-6 with no success.

Is there any oficial solution to this bug?
Comment 3 Peter Åstrand 2003-06-16 04:37:11 EDT
This would'nt be much of a problem if password expiration worked withed PrivSep
disabled, but it doesn't. 

Maybe the patch 
http://www.zip.com.au/~dtucker/openssh/openssh-3.6.1p2-passexpire20.patch helps. 
Comment 4 Eric Hopper 2003-08-08 12:38:03 EDT
This is a problem in RH 9 and Severn as well.
Comment 5 Neil Horman 2003-09-15 14:49:59 EDT
Created attachment 94503 [details]
patch to allow password expiration to work in non separated mode

I've done some looking into the attached patches for this bug, and it seems to
me that without the aforementioned helper app, getting this to work in
non-separated mode is going to take some time.	In the interim, I've found that
the only reason 3.5p1 doesn't work in non-separated mode is that the case for
PAM_NEW_AUTHTOK_REQD in do_pam_account was #if 0-ed out.  Anywho, the attached
patch corrects this, and  after that, setting UsePrivilegeSeparation in
sshd_config to no allows password expiration to work.
Comment 6 Chris Stankaitis 2004-01-05 11:04:03 EST
tested, and this is also still an issue with RH9 openssh-3.5p1-11,
fedora core 1 openssh-3.6.1p2-19 and RHEL 3 openssh-3.6.1p2-18
Comment 9 Phil Knirsch 2004-03-04 09:49:43 EST
It has been fixed in FC2 already and an errata for RHEL3 has been
issued and should be released within the next few weeks.


Read ya, Phil
Comment 13 John Flanagan 2004-05-12 00:23:35 EDT
An errata has been issued which should help the problem described in this bug report. 
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen 
this bug report if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.