Bug#341883: openssh-server: doesn't log bad login attempts to /var/log/btmp
Package: openssh-server
Version: 1:4.2p1-5
Severity: normal
After a day of beating my head against a wall trying to get sshd to log
bad logins as it does on my Slackware box, I just realized that it was
the Debian specific package that prevented sshd from logging bad login
attempts. I would like to see this feature either turned back on, or
made into a config option.
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Versions of packages openssh-server depends on:
ii adduser 3.80 Add and remove users and groups
ii debconf [debconf-2.0] 1.4.59 Debian configuration management sy
ii dpkg 1.13.11.0.1 package maintenance system for Deb
ii libc6 2.3.5-8.1 GNU C Library: Shared libraries an
ii libcomerr2 1.38-2 common error description library
ii libkrb53 1.4.3-2 MIT Kerberos runtime libraries
ii libpam-modules 0.79-3 Pluggable Authentication Modules f
ii libpam-runtime 0.79-3 Runtime support for the PAM librar
ii libpam0g 0.79-3 Pluggable Authentication Modules l
ii libselinux1 1.26-1 SELinux shared libraries
ii libssl0.9.8 0.9.8a-4 SSL shared libraries
ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers libra
ii openssh-client 1:4.2p1-5 Secure shell client, an rlogin/rsh
ii zlib1g 1:1.2.3-8 compression library - runtime
openssh-server recommends no packages.
-- debconf information:
ssh/insecure_rshd:
ssh/insecure_telnetd:
ssh/new_config: true
* ssh/use_old_init_script: true
ssh/disable_cr_auth: false
ssh/encrypted_host_key_but_no_keygen:
Reply to: