Displaying 20 results from an estimated 63 matches for "allowed_users".
Did you mean:
allowed_user
2001 Mar 18
2
char *getusershell();
I experienced a problem compiling openssh_cvs with IRIX 6.5.11f.
% cc -version
MIPSpro Compilers: Version 7.3.1.2m
% cc -n32 -mips3 -O2 -OPT:Olimit=0 ..... -c auth.c
cc-1515 cc: ERROR File = auth.c, Line = 100
A value of type "int" cannot be assigned to an entity of type "char *".
while ((cp = getusershell()) != NULL)
^
1 error detected in the
2009 Jun 25
6
Problems getting workaround for Fallout bug #6033
I can't get workaround for Fallout mouse problem working as mentioned on: http://bugs.winehq.org/show_bug.cgi?id=6033
I created a key at [HKEY_CURRENT_USER\Software\Wine\DirectInput]
named MouseWarpOverride with the value 'disable'
This had no effect.
Can anyone give me any ideas as to what I may need to do?
2000 Sep 02
1
A bug in openssh-2.2.0-p1
Hello!
Today I've found, downloaded and compiled openssh-2.2.0-p1. It basically worked, except that users
other than root were not allowed to login. My system is a Linux-2.4.0-test7 with glibc-2.1.3. No PAM
is installed/used. It uses MD5 passwords and shadow with account expiration feature.
In handling of the latter, a probable bug was found. In auth.c, allowed_user(), there is a
code at
2000 Dec 14
1
password expiration
How are people handling password expirations in (non-pam) openssh?
I'm currently running a program in the various startup scripts that
reports to the user when their password will expire and runs passwd if
that date is getting close. How are other people dealing with this?
Is anyone working on integrating password changing into openssh? Is
doing so even desired, since it's fairly trivial
2003 Aug 26
1
Locked account checks and PAM
Hi All.
I (actually the tinderbox[1]) found a problem with the fix for bug #422:
when PAM is enabled on a platform that uses /etc/shadow, the variable
"passwd" in auth.c is used uninitialized.
There's a simple patch attached to fix this.
The question is: should the locked account test be done when PAM is
enabled or should we rely on PAM to do the right thing? In theory they
2008 Sep 26
1
Diablo 2 Glide Wrapper does not work with full screen mode
As the title mentions, full screen mode does not work with Diablo 2 while using Glide Wrapper, but it does "work" for Direct3D (it's incredibly choppy/laggy though).
Another problem:
In window mode, it runs very smoothly, but if I happen to click outside of the window, Wine freezes and I have to terminate the program.
I'm running Ubuntu 8.04 and using the latest wine
2000 Jul 02
1
A error in auth.c of openssh-2.1.1p2 port on systems with a mixture of shadowed and non-shadowed passwords and Japanese Translations.
Hi.
I have found a error of
openssh-2.1.1p2 port on systems
with a mixture of shadowed and non-shadowed passwords.
I reported a same type of error to Mr. Miller
when openssh-1.2.1pre23 was released.
On our systems,
our local machines have shadowed /etc/passwd (and /etc/shadow)
and our NIS server distributes non-shadowed password
of general users.
We have to use
2000 Sep 20
1
password aging and account lock checks
I'm looking at the password aging and account lock checks in
auth.c:allowed_user(), and specifically their behaviour on
HP-UX.
First, should this code be ifdef'd away if we're using PAM?
Next:
/* Check account expiry */
if ((spw->sp_expire > 0) && (days > spw->sp_expire))
return 0;
If I lock an account by entering too many incorrect passwords,
sp_expire
2001 Feb 16
1
OpenSSH 2.3.0p1 port to BSDI BSD/OS
BSD/OS 4.2 comes with OpenSSH 2.1.1p4, patched to support BSDI's
authentication library. However, BSDI's patches have several
problems:
1. They don't run the approval phase, so they can allow users to login
who aren't supposed to be able to.
2. They don't patch configure to automatically detect the BSDI auth
system, so they're not ready to use in a general portable
2003 Jan 07
2
Test for locked account in auth.c (bug #442).
Hi Damien,
I noticed you merged a couple of ifdefs in the fix for bug #442. The
cvs comment says "Fix Bug #442 for PAM case". The code is now roughly:
#if !defined(USE_PAM) && defined(HAVE_SHADOW_H) && \
!defined(DISABLE_SHADOW) && defined(HAS_SHADOW_EXPIRE)
spw = getspnam(pw->pw_name);
passwd = spw->sp_pwdp;
#else
passwd =
2001 Feb 17
2
Small aix patch to configure.in
The following aix patch to configure.in forces /usr/include to be searched
before /usr/local/include on AIX systems only. This allows the normal
include rules to untangle <login.h> from "login.h" on AIX when using the AIX
cc compiler or gcc. Please see that it gets applied to the current cvs
source tree. It fixes the only compile time error the current cvs tree has
on aix with
2003 Feb 16
2
AllowUsers Change
...yone happy?
This does the follow.
it will always honor AllowUsers.
If there is no Allow/DenyGroups it stated they are not in allowUsers. IF
there are AllowDenyGroups it tries them. And then stated they are not in
either AllowUsers nor AllowGroups
since PErmitRootLogin is not handled in auth.c:allowed_users() I will not
try to add that logic. I still believe it should be true.
Diff against -ccurent BSD tree.
- Ben
Index: auth.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/auth.c,v
retrieving revision 1.46
diff -u -r1.46 auth.c
--- auth.c 4 Nov...
2004 Apr 14
8
[Bug 125] with BSM auditing, cron editing thru ssh session causes cron jobs to fail
http://bugzilla.mindrot.org/show_bug.cgi?id=125
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Severity|major |enhancement
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2000 Oct 07
0
OpenSSH changes for BSD/OS
The following are patches against openssh 2.1.1p4 to add
support for the BSD_AUTH authentication mechanisms. It allows the
use of non-challenge/response style mechanisms (which styles are
allowed my be limited by appropriate auth-ssh entries in login.conf).
The patches also add support for calling setusercontext for the
appropriate class when called with a command (so that the PATH, limits,
2000 Feb 25
0
Letting PAM add a user
Hello. I have a linux-based system that acts as a cvs-server on an
NT-domain. The cvs-repository is reached whith ssh.
My comments are for version 1.2.2 (debian distribution 1.2.2-1).
I made a pam-module for adding users automatically when they have been
authorized by the pam_smb_auth. Problem is that sshd checks if the user
exists in passwd before going to pam for authorization. I made a
2000 Mar 31
0
[PATCH] empty shell in /etc/passwd
The Linux/Unix-port of OpenSSH-1.2.3 in sshd.c:allowed_user() denies
Login to users with an empty shell-field in /etc/passwd. According
to the docs this is wrong and an empty shell-field should default to
/bin/sh.
I'm sure that this is what was intended, because code and comment get
it right in sshd.c:do_child():
* Get the shell from the password data. An empty shell field is
2000 Apr 15
0
patch in user validation code
I was encountering a strange message about "faked authloop for illegal
user". It turned out the allowed_user function was disallowing passwd
entries with a blank shell field, which is supposed to be equivalent
to "/bin/sh".
This patch is based on OpenSSH 1.2.3, and I have tested it on
Slackware 7.0.
--- sshd.old Wed Apr 12 23:47:04 2000
+++ sshd.c Thu Apr 13 00:35:54 2000
2001 Feb 16
1
CVS and AIX
Hi,
trying "current CVS" on AIX 4.3.3, yields:
gcc -O2 -Wall -I/usr/local/include -I/gnulocal/include -I/gnu/include -I. -I./openbsd-compat -I. -DETCDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/gnu/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/gnu/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/gnu/libexec/sftp-server\" -DHAVE_CONFIG_H -c auth.c
auth.c: In
2001 Apr 30
0
Insufficient sshd debug output
Apologies if this issue has already been addressed.
But it isn't plain, even using sshd -d -d -d, why function allowed_user
would return 0.
In my case, an old version of login was ignoring the expiry-date field
of /etc/shadow, but sshd was refusing access.
There are several reasons why access might be refused, and it shouldn't
be necessary to modify auth.c to print out the info - it
2001 May 01
0
problem with PAM coding, openssh-2.5.2p2
Howdy coders,
in openssh-2.5.2p2,
auth1.c, do_authentication()
you folks do a call to getpwnam(user)
If this fails, you NULL out 'pw'
Unfortunately, this stops start_pam() from being called at all.
I'm not a PAM API expert, but I was under the impression that there are pam
API calls you should be making for account verification, in PARALLEL to
getpwnam(), rather than being