Displaying 8 results from an estimated 8 matches for "__bsdi__".
2002 Jun 25
3
BSD/OS with privsep
...euid() == 0) {
#endif /* HAVE_CYGWIN */
#ifdef HAVE_SETPCRED
setpcred(pw->pw_name);
#endif /* HAVE_SETPCRED */
#ifdef HAVE_LOGIN_CAP
- if (setusercontext(lc, pw, pw->pw_uid,
- (LOGIN_SETALL & ~LOGIN_SETPATH)) < 0) {
+ int flags = LOGIN_SETALL & ~LOGIN_SETPATH;
+#ifdef __bsdi__
+ if (getpid() != getpgrp())
+ flags &= ~LOGIN_SETLOGIN;
+#endif
+ if (setusercontext(lc, pw, pw->pw_uid, flags) < 0) {
perror("unable to set user context");
exit(1);
}
#else
# if defined(HAVE_GETLUID) && defined(HAVE_SETLUID)
/* Sets login uid for ac...
1998 Oct 07
1
Re: sshd and PAM [summary]
-----BEGIN PGP SIGNED MESSAGE-----
Hi,
I''ve got several replies, thank you for them. Let me summarize:
o Many people say there is a PAMified version of ssh available at
ftp://ftp.replay.com/pub/crypto/redhat/SRPMS (the source)
ftp://ftp.replay.com/pub/crypto/redhat/i386 (Intel binaries)
(there are analogous paths for the other architectures). The packages
are made by Jan
2003 Sep 23
1
3.7.1p1 appears to break pam session.
...y issues is rather limited. I would very much appreciate if
you guys could check this and verify that I am not introducing more
problems with this. So far this works for me.
--- session.c Tue Sep 23 10:14:47 2003
+++ session.c.orig Tue Sep 23 10:04:02 2003
@@ -1240,15 +1240,6 @@
# ifdef __bsdi__
setpgid(0, 0);
# endif
-# ifdef USE_PAM
- /*
- * PAM session wants to be run for LOGIN_CAP systems too!
- */
- if (options.use_pam) {
- do_pam_session();
- do_pam_setcred(0);
-...
2003 Oct 02
1
Connection drops after entering password.
Has anyone seen the error that I'm getting below? After you ssh to the box
and enter the password the connection just closes.
SSH Version
{ root at xxxxxxxx} # ssh -V
OpenSSH_3.7p1, SSH protocols 1.5/2.0, OpenSSL 0.9.7b 10 Apr 2003
OS Version
{ root at xxxxxxxx } # oslevel -r
AIX 4330-09
SSH Connect Failure
{ root at xxxxxxxxx } # ssh -l xxxxxxxxx -v localhost
OpenSSH_3.7p1, SSH protocols
2003 Jul 03
0
AIX cleanups: includes and arguments
....238
diff -u -r1.238 session.c
--- session.c 3 Jun 2003 00:25:48 -0000 1.238
+++ session.c 2 Jul 2003 04:37:09 -0000
@@ -1215,7 +1215,7 @@
{
#ifdef HAVE_SETPCRED
- setpcred(pw->pw_name);
+ setpcred(pw->pw_name, (char **)NULL);
#endif /* HAVE_SETPCRED */
#ifdef HAVE_LOGIN_CAP
# ifdef __bsdi__
Index: openbsd-compat/port-aix.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/port-aix.c,v
retrieving revision 1.10
diff -u -r1.10 port-aix.c
--- openbsd-compat/port-aix.c 3 Jun 2003 02:45:27 -0000 1.10...
2003 Nov 18
5
Testing of recent commits
There have been a few recent commits to portable OpenSSH that require
testing. It would be appreciated if you could grab the 20031118 (or
later) snapshot and give it a try on your platforms of choice.
Ideally, "giving it a try" means running the regress tests, in addition
to casual (non-production) use and reporting your experiences back to
the list. The more platforms and compile-time
1998 Oct 29
0
Digest.
...assword(user, "", 0))
@@ -3043,6 +3117,10 @@
int inout[2], err[2];
#endif /* USE_PIPES */
+#ifdef HAVE_PAM
+ retval = pam_open_session ((pam_handle_t *)pamh, 0);
+#endif /* HAVE_PAM */
+
#ifdef HAVE_OSF1_C2_SECURITY
{
const char *str;
@@ -3203,6 +3281,10 @@
#if defined (__bsdi__) && _BSDI_VERSION >= 199510
struct timeval tp;
#endif /* __bsdi__ && _BSDI_VERSION >= 199510 */
+
+#ifdef HAVE_PAM
+ retval = pam_open_session ((pam_handle_t *)pamh, 0);
+#endif /* HAVE_PAM */
#ifdef HAVE_OSF1_C2_SECURITY
{
--- auth-passwd.c.orig Tue Oct 6 18:1...
2002 Jul 04
4
Chroot patch (v3.4p1)
The following is a patch I've been working on to support a "ChrootUser"
option in the sshd_config file.
I was looking for a way to offer sftp access and at the same time restict
interactive shell access. This patch is a necessary first step (IMO).
It applies clean with 'patch -l'.
Also attached is a shell script that helps to build a chrooted home dir on
a RedHat 7.2