Hi Darren, I'm using OpenSSH version 4.6p1. I also use -lbsm flag when running configure to enable Solaris 10's BSM. I notice that the none method failure is counted in /etc/shadow as a failed login, but the successful of the publickey method is not decrementing the failed login count in /etc/shadow. Hence resulting in the user account eventually being locked with a few ssh using publickey authentication as described below. I configured a user in a server with Openssh publickey authentication. I found that everytime when ssh to the user using publickey, there's at the beginning of the ssh session, the following log message: sshd[743]: Failed none for xxxx from a.b.c.d port xxxx ssh2 I understand that is required as the first step in SSHV2 authentication. However, as I'm using Solaris 10 with LOCK_AFTER_RETRIES=yes. I found in the /etc/shadow file, the failed count for the user is incremented by one everytime when ssh with publickey. I suspect the failure of this first "none" authentication method is somehow returned and consider by Solaris as a login failure. This causes the user eventually being locked after a few ssh by publickey. I wonder if there is any way to skip returning this "none" failure to the Solaris OS resulting in the fail login count being incremented. Thanks in advance, John Wong