--- dropbear-2018.76/default_options.h 2018-02-27 15:25:10.000000000 +0100 +++ dropbear-2018.76/default_options.h 2018-07-27 10:06:57.568004797 +0200 @@ -179,7 +179,7 @@ /* Authentication Types - at least one required. RFC Draft requires pubkey auth, and recommends password */ -#define DROPBEAR_SVR_PASSWORD_AUTH 1 +#define DROPBEAR_SVR_PASSWORD_AUTH 0 /* Note: PAM auth is quite simple and only works for PAM modules which just do * a simple "Login: " "Password: " (you can edit the strings in svr-authpam.c). @@ -187,7 +187,7 @@ * but there's an interface via a PAM module. It won't work for more complex * PAM challenge/response. * You can't enable both PASSWORD and PAM. */ -#define DROPBEAR_SVR_PAM_AUTH 0 +#define DROPBEAR_SVR_PAM_AUTH 1 /* ~/.ssh/authorized_keys authentication */ #define DROPBEAR_SVR_PUBKEY_AUTH 1 --- dropbear-2018.76/svr-authpam.c 2018-02-27 15:25:12.000000000 +0100 +++ dropbear-2018.76/svr-authpam.c 2018-07-27 11:03:50.265006424 +0200 @@ -211,14 +211,14 @@ userData.passwd = password; /* Init pam */ - if ((rc = pam_start("sshd", NULL, &pamConv, &pamHandlep)) != PAM_SUCCESS) { + if ((rc = pam_start("dropbear", NULL, &pamConv, &pamHandlep)) != PAM_SUCCESS) { dropbear_log(LOG_WARNING, "pam_start() failed, rc=%d, %s", rc, pam_strerror(pamHandlep, rc)); goto cleanup; } /* just to set it to something */ - if ((rc = pam_set_item(pamHandlep, PAM_TTY, "ssh")) != PAM_SUCCESS) { + if ((rc = pam_set_item(pamHandlep, PAM_TTY, "dropbear")) != PAM_SUCCESS) { dropbear_log(LOG_WARNING, "pam_set_item() failed, rc=%d, %s", rc, pam_strerror(pamHandlep, rc)); goto cleanup;