Displaying 20 results from an estimated 41 matches for "disable_shadow".
2000 Nov 09
2
SCO Openserver Patch
...grams only to run into another problem with the shadow stuff. It
turns out that even though Openserver has a shadow file, the protected
password database stuff seems to work fine in the current code but if you
do not define DISABLE-SHADOW, conflicts arise... So I made another change
to configure to DISABLE_SHADOW if HAVE_SCO_PROTECTED_PW is defined. I have
tested this on Openserver 5.0.5 and 5.0.6. Here is the universal patch fo
configure to allow it to work with openserver.
--- configure Sun Nov 5 21:25:18 2000
+++ /configure Thu Nov 9 14:18:21 2000
@@ -1685,7 +1685,7 @@
LDFLAGS="$LDFLAGS -L/usr/...
2003 Jan 07
2
Test for locked account in auth.c (bug #442).
Hi Damien,
I noticed you merged a couple of ifdefs in the fix for bug #442. The
cvs comment says "Fix Bug #442 for PAM case". The code is now roughly:
#if !defined(USE_PAM) && defined(HAVE_SHADOW_H) && \
!defined(DISABLE_SHADOW) && defined(HAS_SHADOW_EXPIRE)
spw = getspnam(pw->pw_name);
passwd = spw->sp_pwdp;
#else
passwd = pw->pw_passwd;
#endif
[test for locked passwd entry]
If the platform is using PAM, /etc/passwd is checked regardless of
whether or not it actually has /etc/s...
2003 Sep 02
12
[Bug 633] Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW
http://bugzilla.mindrot.org/show_bug.cgi?id=633
Summary: Password authentication fails in HP-UX trusted mode due
to DISABLE_SHADOW
Product: Portable OpenSSH
Version: -current
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: michael_steffen...
2000 May 12
0
SunOS 4.x port
...6,6 +51,9 @@
#ifdef HAVE_SHADOW_H
struct spwd *spw;
#endif
+#ifdef HAVE_GETPWANAM
+ struct passwd_adjunct *spw;
+#endif
#ifdef WITH_AIXAUTHENTICATE
char *authmsg;
char *loginmsg;
@@ -99,6 +107,16 @@
pw_password = spw->sp_pwdp;
}
#endif /* defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW) */
+#if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW)
+ if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
+ {
+ /* Check for users with no password. */
+ if (strcmp(password, "") == 0 && strcmp(spw->pwa_passwd, "") == 0)
+ return...
2002 Mar 12
2
sys/queue.h
...)
# /usr/ucblib/libucb.a no longer needed on ReliantUNIX
# Attention: always take care to bind libsocket and libnsl before libc,
# otherwise you will find lots of "SIOCGPGRP errno 22" on syslog
@@ -227,7 +222,6 @@
AC_DEFINE(USE_PIPES)
AC_DEFINE(HAVE_SCO_PROTECTED_PW)
AC_DEFINE(DISABLE_SHADOW)
- AC_DEFINE(HAVE_BOGUS_SYS_QUEUE_H)
AC_DEFINE(BROKEN_SAVED_UIDS)
AC_CHECK_FUNCS(getluid setluid)
MANTYPE=man
@@ -242,7 +236,6 @@
AC_DEFINE(USE_PIPES)
AC_DEFINE(HAVE_SCO_PROTECTED_PW)
AC_DEFINE(DISABLE_SHADOW)
- AC_DEFINE(HAVE_BOGUS_SYS_QUEUE_H)
AC_CHECK_FUNCS(getluid setluid)
MANTY...
2009 Mar 18
1
[PATCH] Remove setting IP_TOS_IS_BROKEN for Cygwin
.../openssh/configure.ac,v
retrieving revision 1.418
diff -u -p -r1.418 configure.ac
--- configure.ac 7 Mar 2009 11:22:35 -0000 1.418
+++ configure.ac 18 Mar 2009 15:03:02 -0000
@@ -434,8 +434,6 @@ int main(void) { exit(0); }
AC_DEFINE(USE_PIPES, 1, [Use PIPES instead of a socketpair()])
AC_DEFINE(DISABLE_SHADOW, 1,
[Define if you want to disable shadow passwords])
- AC_DEFINE(IP_TOS_IS_BROKEN, 1,
- [Define if your system choked on IP TOS setting])
AC_DEFINE(NO_X11_UNIX_SOCKETS, 1,
[Define if X11 doesn't support AF_UNIX sockets on that system])
AC_DEFINE(NO_IPPORT_RESERVED_CONCEPT, 1,
--
C...
2001 May 16
1
[PATCH]: configure.in
...g revision 1.285
diff -u -p -r1.285 configure.in
--- configure.in 2001/05/08 20:42:28 1.285
+++ configure.in 2001/05/16 16:22:50
@@ -64,6 +64,7 @@ case "$host" in
*-*-cygwin*)
LIBS="$LIBS -lregex /usr/lib/textmode.o"
AC_DEFINE(HAVE_CYGWIN)
+ AC_DEFINE(USE_PIPES)
AC_DEFINE(DISABLE_SHADOW)
AC_DEFINE(IPV4_DEFAULT)
AC_DEFINE(IP_TOS_IS_BROKEN)
Thanks,
Corinna
--
Corinna Vinschen
Cygwin Developer
Red Hat, Inc.
mailto:vinschen at redhat.com
2003 Aug 26
1
Locked account checks and PAM
...th.c 25 Aug 2003 13:56:25 -0000
@@ -73,7 +73,7 @@ int
allowed_user(struct passwd * pw)
{
struct stat st;
- const char *hostname = NULL, *ipaddr = NULL, *passwd;
+ const char *hostname = NULL, *ipaddr = NULL, *passwd = NULL;
char *shell;
int i;
#if defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW)
@@ -85,8 +85,7 @@ allowed_user(struct passwd * pw)
return 0;
#if defined(HAVE_SHADOW_H) && !defined(DISABLE_SHADOW)
- if (!options.use_pam)
- spw = getspnam(pw->pw_name);
+ spw = getspnam(pw->pw_name);
#ifdef HAS_SHADOW_EXPIRE
#define DAY (24L * 60 * 60) /* 1 day in seconds...
2001 Nov 22
1
[PATCH]: Fix configure.ac to allow linking against PCRE on Cygwin
...19:09:33 1.4
+++ configure.ac 2001/11/22 11:57:34
@@ -65,7 +65,7 @@ case "$host" in
AC_DEFINE(DISABLE_LASTLOG)
;;
*-*-cygwin*)
- LIBS="$LIBS -lregex /usr/lib/textmode.o"
+ LIBS="$LIBS /usr/lib/textmode.o"
AC_DEFINE(HAVE_CYGWIN)
AC_DEFINE(USE_PIPES)
AC_DEFINE(DISABLE_SHADOW)
@@ -367,6 +367,17 @@ if test "x$with_tcp_wrappers" != "xno" ;
AC_CHECK_LIB(rpc, innetgr, LIBS="-lrpc -lyp -lrpc $LIBS" , , -lyp -lrpc)
fi
fi
+
+case "$host" in
+*-*-cygwin*)
+ # Check if linking agains pcre is requested, otherwise use
+ # regex lib o...
2001 Feb 20
1
_PATH_STDPATH and @bindir@
Sorry if this is stuff that's been talked about before. If it is, just
ignore me.
I'm curious to know why Portable OpenSSH doesn't include @bindir@ in
the _PATH_STDPATH. This would save most installers of portable OpenSSH
from having to --with-default-path=$PREFIX/bin in order to ensure that
scp will work properly. This would also, I imagine, save quite a lot
of hassle for
2002 Jun 24
1
remove --with-rsh
...ot;
RANLIB=true
no_dev_ptmx=1
AC_DEFINE(BROKEN_SYS_TERMIO_H)
@@ -264,7 +263,6 @@
LDFLAGS="$LDFLAGS -L/usr/local/lib"
LIBS="$LIBS -lprot -lx -ltinfo -lm"
no_dev_ptmx=1
- rsh_path="/usr/bin/rcmd"
AC_DEFINE(USE_PIPES)
AC_DEFINE(HAVE_SECUREWARE)
AC_DEFINE(DISABLE_SHADOW)
@@ -1790,17 +1788,6 @@
LIBS="$LIBS $KLIBS $K5LIBS"
# Looking for programs, paths and files
-AC_ARG_WITH(rsh,
- [ --with-rsh=PATH Specify path to remote shell program ],
- [
- if test "x$withval" != "$no" ; then
- rsh_path=$withval
- fi
- ],
- [
- AC_...
2000 Sep 08
4
PATCH: HPUX trusted system password checking
Dear developers,
The HPUX 10.20 trusted system hack doesn't work yet as intended.
I have adapted the auth-passwd.c file to make it work.
Please find a context diff file attached to this file. This diff is
against the latest OpenSSH 2.2.0p1 released Sept 2, 2000.
Also on HPUX 10.20, xauth is not found at the standard location.
Perhaps this standard location could be changed automagically
2001 Jan 03
1
chroot.diff
...-2.3.0p1-chroot/acconfig.h Wed Jan 3 19:23:48 2001
@@ -199,6 +199,9 @@
/* Define if you want to allow MD5 passwords */
#undef HAVE_MD5_PASSWORDS
+/* Define if you want to use chrooting when a magic token is found */
+#undef CHROOT
+
/* Define if you want to disable shadow passwords */
#undef DISABLE_SHADOW
Only in openssh-2.3.0p1-chroot/: acconfig.h~
diff -u openssh-2.3.0p1/config.h.in openssh-2.3.0p1-chroot/config.h.in
--- openssh-2.3.0p1/config.h.in Mon Nov 6 03:25:18 2000
+++ openssh-2.3.0p1-chroot/config.h.in Wed Jan 3 19:23:48 2001
@@ -198,6 +198,9 @@
/* Define if you want to allow MD5 pass...
2001 Feb 12
3
add scp path to _PATH_STDPATH
what do you think about this patch to add the path to scp to
_PATH_STDPATH? is there a better or cleaner way to do this? i'm hoping
to ward off 'scp doesn't work' questions for the next release.
i did *not* add this to a --with-default-path path, because if a user
specifies that, they should control its value completely.
Index: Makefile.in
2001 Mar 14
3
OpenSSH 2.3.0p1: HP-UX 11.00 64-bit
I have encountered a problem with using OpenSSH 2.3.0p1 on 64-bit HP-UX
11.00 systems. This bug does not exhibit itself on any 32-bit HP-UX
11.00 or HP-UX 10.20 systems that I have built 2.3.0p1 on. OpenSSH
2.3.0p1 was built with HPs ANSI C compiler with OpenSSL 0.9.6 and zlib
1.1.3.
The problem is with the call to vhangup(2) in sshd when interactive
sessions are started. The problem does not
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
...allowed to log in via ssh. If user is listed
@@ -75,21 +81,22 @@
const char *hostname = NULL, *ipaddr = NULL;
char *shell;
int i;
-#ifdef WITH_AIXAUTHENTICATE
- char *loginmsg;
-#endif /* WITH_AIXAUTHENTICATE */
#if !defined(USE_PAM) && defined(HAVE_SHADOW_H) && \
!defined(DISABLE_SHADOW) && defined(HAS_SHADOW_EXPIRE)
struct spwd *spw;
+#endif
/* Shouldn't be called if pw is NULL, but better safe than sorry... */
if (!pw || !pw->pw_name)
return 0;
+ buffer_init(&expire_message);
+#if !defined(USE_PAM) && defined(HAVE_SHADOW_H) && \
+...
2000 Dec 27
3
OpenSSH 2.4.0 patch call..
I spoke with Markus before Christmas (I hope all your holidays were better
then mine.. But that's another topic. Car are evil.=) and he would like
to release 2.4.0 in the very near future.
Is there any undisputed patches still out not applied to the current
portable CVS tree? (BTW, I just applied the getrlimit patch from
Corinna.)
- Ben
2001 Feb 27
1
small cleanup patch
..._PATH_LS
--
Tim Rice Multitalents (707) 887-1469
tim at multitalents.net
-------------- next part --------------
--- openssh_cvs/configure.in.old Mon Feb 26 18:47:57 2001
+++ openssh_cvs/configure.in Mon Feb 26 18:50:28 2001
@@ -257,7 +257,6 @@
AC_DEFINE(HAVE_SCO_PROTECTED_PW)
AC_DEFINE(DISABLE_SHADOW)
AC_DEFINE(HAVE_BOGUS_SYS_QUEUE_H)
- AC_DEFINE(BROKEN_SAVED_UIDS)
AC_CHECK_FUNCS(getluid setluid)
;;
*-dec-osf*)
--- openssh_cvs/pathnames.h.old Sat Feb 10 19:39:35 2001
+++ openssh_cvs/pathnames.h Mon Feb 26 19:08:19 2001
@@ -120,7 +120,9 @@
#ifndef _PATH_SFTP_SERVER
#define _PATH_SFTP_SE...
2003 Sep 08
2
Variable declarations in xcrypt.c
...ieving revision 1.4
diff -u -p -r1.4 xcrypt.c
--- openbsd-compat/xcrypt.c 6 Sep 2003 23:43:42 -0000 1.4
+++ openbsd-compat/xcrypt.c 8 Sep 2003 06:52:26 -0000
@@ -96,18 +96,25 @@ shadow_pw(struct passwd *pw)
pw_password = spw->sp_pwdp;
# endif
# if defined(HAVE_GETPWANAM) && !defined(DISABLE_SHADOW)
- struct passwd_adjunct *spw;
- if (issecure() && (spw = getpwanam(pw->pw_name)) != NULL)
- pw_password = spw->pwa_passwd;
+ if (issecure()) {
+ struct passwd_adjunct *spw;
+
+ if (spw = getpwanam(pw->pw_name) != NULL)
+ pw_password = spw->pwa_passwd;
+ }
# elif defined(H...
2003 Sep 24
12
SSHD 3.7.1p2 on HP-UX
I have used SSHD from openssh-3.7.1p1 on HP-UX 11:11. It works
correctly and the entry in the logfile is:
Sep 24 07:01:20 garm sshd[6625]: Accepted password for japs from
192.38.97.131 port 2463
Next I have upgraded to openssh-3.7.1p2 and restarted SSHD. It does not
accept the password any more and the entries in the logfile are:
Sep 24 12:21:38 garm sshd[19542]: User japs not allowed because