open-sshd service withou pam support !! How can I add pam support to sshd? Ubuntu
- by marc.riera
Hi,
I'm using AD as my user account server with ldap.
Most of the servers run with UsePam yes except this one,
it has lack of pam support on sshd.
root@linserv9:~# ldd /usr/sbin/sshd
linux-vdso.so.1 => (0x00007fff621fe000)
libutil.so.1 => /lib/libutil.so.1 (0x00007fd759d0b000)
libz.so.1 => /usr/lib/libz.so.1 (0x00007fd759af4000)
libnsl.so.1 => /lib/libnsl.so.1 (0x00007fd7598db000)
libcrypto.so.0.9.8 => /usr/lib/libcrypto.so.0.9.8 (0x00007fd75955b000)
libcrypt.so.1 => /lib/libcrypt.so.1 (0x00007fd759323000)
libc.so.6 => /lib/libc.so.6 (0x00007fd758fc1000)
libdl.so.2 => /lib/libdl.so.2 (0x00007fd758dbd000)
/lib64/ld-linux-x86-64.so.2 (0x00007fd759f0e000)
I have this packages installed
root@linserv9:~# dpkg -l|grep -E 'pam|ssh'
ii denyhosts 2.6-2.1 an utility to help sys admins thwart ssh hac
ii libpam-modules 0.99.7.1-5ubuntu6.1 Pluggable Authentication Modules for PAM
ii libpam-runtime 0.99.7.1-5ubuntu6.1 Runtime support for the PAM library
ii libpam-ssh 1.91.0-9.2 enable SSO behavior for ssh and pam
ii libpam0g 0.99.7.1-5ubuntu6.1 Pluggable Authentication Modules library
ii libpam0g-dev 0.99.7.1-5ubuntu6.1 Development files for PAM
ii openssh-blacklist 0.1-1ubuntu0.8.04.1 list of blacklisted OpenSSH RSA and DSA keys
ii openssh-client 1:4.7p1-8ubuntu1.2 secure shell client, an rlogin/rsh/rcp repla
ii openssh-server 1:4.7p1-8ubuntu1.2 secure shell server, an rshd replacement
ii quest-openssh 5.2p1_q13-1 Secure shell
root@linserv9:~#
What I'm doing wrong?
thanks.
Edit:
root@linserv9:~# cat /etc/pam.d/sshd
# PAM configuration for the Secure Shell service
# Read environment variables from /etc/environment and
# /etc/security/pam_env.conf.
auth required pam_env.so # [1]
# In Debian 4.0 (etch), locale-related environment variables were moved to
# /etc/default/locale, so read that as well.
auth required pam_env.so envfile=/etc/default/locale
# Standard Un*x authentication.
@include common-auth
# Disallow non-root logins when /etc/nologin exists.
account required pam_nologin.so
# Uncomment and edit /etc/security/access.conf if you need to set complex
# access limits that are hard to express in sshd_config.
# account required pam_access.so
# Standard Un*x authorization.
@include common-account
# Standard Un*x session setup and teardown.
@include common-session
# Print the message of the day upon successful login.
session optional pam_motd.so # [1]
# Print the status of the user's mailbox upon successful login.
session optional pam_mail.so standard noenv # [1]
# Set up user limits from /etc/security/limits.conf.
session required pam_limits.so
# Set up SELinux capabilities (need modified pam)
# session required pam_selinux.so multiple
# Standard Un*x password updating.
@include common-password