]> code.ossystems Code Review - openembedded-core.git/commitdiff
openssh: fix login fails for ssh -o Batchmode=yes with empty passwords
authorWenlin Kang <wenlin.kang@windriver.com>
Thu, 30 Apr 2015 10:17:39 +0000 (18:17 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Sun, 3 May 2015 10:39:47 +0000 (11:39 +0100)
The patch fixes the login fails for ssh -o Batchmode=yes when passwords is
empty and without authorized_keys file even if set "PermitEmptyPasswords yes"
in sshd_config file.

Here, to fix this issue, we remove the file auth2-none.c-avoid-authenticate-
empty-passwords-to-m.patch, that fixed broken pipe while sshd with pam,
but it isn't needed any more now, because we make it has gone by change
ChallengeResponseAuthentication value in sshd_config file.

Signed-off-by: Wenlin Kang <wenlin.kang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-connectivity/openssh/openssh/auth2-none.c-avoid-authenticate-empty-passwords-to-m.patch [deleted file]
meta/recipes-connectivity/openssh/openssh/sshd_config
meta/recipes-connectivity/openssh/openssh_6.8p1.bb

diff --git a/meta/recipes-connectivity/openssh/openssh/auth2-none.c-avoid-authenticate-empty-passwords-to-m.patch b/meta/recipes-connectivity/openssh/openssh/auth2-none.c-avoid-authenticate-empty-passwords-to-m.patch
deleted file mode 100644 (file)
index ba13cd1..0000000
+++ /dev/null
@@ -1,30 +0,0 @@
-Upstream-Status: Pending
-
-Subject: auth2-none.c: avoid authenticate empty passwords to mess up with PAM
-
-If UsePAM, PermitEmptyPasswords, PasswordAuthentication are enabled. The ssh daemon
-will try to authenticate an empty password, resulting in login failures of any user.
-If PAM is enabled, then we should leave the task of password authentication to PAM.
-
-Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
-
----
- auth2-none.c |    2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/auth2-none.c b/auth2-none.c
-index c8c6c74..b48b2fd 100644
---- a/auth2-none.c
-+++ b/auth2-none.c
-@@ -61,7 +61,7 @@ userauth_none(Authctxt *authctxt)
- {
-       none_enabled = 0;
-       packet_check_eom();
--      if (options.permit_empty_passwd && options.password_authentication)
-+      if (options.permit_empty_passwd && options.password_authentication && !options.use_pam)
-               return (PRIVSEP(auth_password(authctxt, "")));
-       return (0);
- }
--- 
-1.7.9.5
-
index 3553669aa0d64efe36ef7fce344af084f05ab090..d48bd2b98da4855ab229eef7319dca88561c04db 100644 (file)
@@ -73,7 +73,7 @@ AuthorizedKeysFile .ssh/authorized_keys
 #PermitEmptyPasswords no
 
 # Change to no to disable s/key passwords
-#ChallengeResponseAuthentication yes
+ChallengeResponseAuthentication no
 
 # Kerberos options
 #KerberosAuthentication no
index 8e07e00029442305f6b4571ef3aa7f51a9cad726..b00ef6f835edafa3056256544901c69496ef41b4 100644 (file)
@@ -20,8 +20,7 @@ SRC_URI = "ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar.
            file://sshdgenkeys.service \
            file://volatiles.99_sshd \
            file://add-test-support-for-busybox.patch \
-           file://run-ptest \
-           file://auth2-none.c-avoid-authenticate-empty-passwords-to-m.patch"
+           file://run-ptest"
 
 PAM_SRC_URI = "file://sshd"