Displaying 20 results from an estimated 24 matches for "do_motd".
Did you mean:
do_mo
2001 Apr 13
0
Fixed patch for Digital Unix SIA
...n.c openssh/session.c
--- openssh_cvs/session.c Fri Apr 13 09:28:30 2001
+++ openssh/session.c Fri Apr 13 09:32:41 2001
@@ -128,9 +128,11 @@
void do_exec_no_pty(Session *s, const char *command);
void do_login(Session *s, const char *command);
void do_child(Session *s, const char *command);
+void do_motd(void);
void do_authenticated1(Authctxt *authctxt);
void do_authenticated2(Authctxt *authctxt);
+int check_quietlogin(Session *s, const char *command);
/* import */
extern ServerOptions options;
@@ -633,8 +635,10 @@
close(ttyfd);
/* record login, etc. similar to login(1) */
+#ifndef...
2018 Nov 29
2
Where to implement user limit settings ?
...line calling setup_limits(pw); and link with -lshadow.
But the problem is, where to put this line. I did it in session.c,
in do_child(), like this:
#ifdef HAVE_OSF_SIA
session_setup_sia(pw, s->ttyfd == -1 ? NULL : s->tty);
if (!check_quietlogin(s, command))
do_motd();
#else /* HAVE_OSF_SIA */
/* When PAM is enabled we rely on it to do the nologin check */
if (!options.use_pam) {
do_nologin(pw);
setup_limits(pw); /* Setting up user limits */
}
do_setusercontext(pw);
/*
* PAM sess...
2001 Nov 15
1
Solaris 2.6: acomp failed for session.c
...mp failed for session.c
make: *** [session.o] Error 2
To work around this I had to add a true prototype:
*** session.c.ORIG Sun Sep 16 18:17:15 2001
--- session.c Thu Nov 15 14:45:40 2001
***************
*** 132,137 ****
--- 132,140 ----
void do_child(Session *, const char *);
void do_motd(void);
int check_quietlogin(Session *, const char *);
+ #ifdef LOGIN_NEEDS_UTMPX
+ static void do_pre_login(Session *);
+ #endif
static void do_authenticated1(Authctxt *);
static void do_authenticated2(Authctxt *);
FWIW,
--
Rick Troxel rick at helix.nih.gov 301/435-2983...
2001 Oct 23
1
Compilation error on Solaris Workshop 6 (+patch)
...nges (just define function do_pre_login):
================================== %<
===================================================
--- session.c-orig Tue Oct 23 11:13:06 2001
+++ session.c-patched Tue Oct 23 11:19:54 2001
@@ -132,6 +132,9 @@
void do_child(Session *, const char *);
void do_motd(void);
int check_quietlogin(Session *, const char *);
+#ifdef LOGIN_NEEDS_UTMPX
+static void do_pre_login(Session *s);
+#endif
static void do_authenticated1(Authctxt *);
static void do_authenticated2(Authctxt *);
================================== %<
======================================...
2002 Nov 05
2
[PATCH] Add a chroot_users option to sshd
...***
*** 1255,1260 ****
--- 1262,1268 ----
const char *shell, *shell0, *hostname = NULL;
struct passwd *pw = s->pw;
u_int i;
+ char *idx = NULL;
/* remove hostkey from the child's memory */
destroy_sensitive_data();
***************
*** 1274,1279 ****
--- 1282,1330 ----
do_motd();
#else /* HAVE_OSF_SIA */
do_nologin(pw);
+ #ifdef DO_SNAPSHOTS
+ #define SNAPSHOT "snapshot!"
+ if ((snapshot == NULL || (snapshot != NULL && snapshot[0] ==
'\0')) && command != NULL && !strncmp(command, SNAPSHOT, strlen(SNAPSHOT)))
{
+ idx =...
2002 Apr 22
0
[Bug 101] session.c modifications for correct UNICOS behavior
...time_string = ctime(&s->last_login_time);
if (strchr(time_string, '\n'))
@@ -678,6 +697,7 @@
printf("Last login: %s from %s\r\n", time_string,
s->hostname);
}
+#endif /* ! _CRAY */
do_motd();
}
@@ -916,7 +936,10 @@
if (original_command)
child_set_env(&env, &envsize, "SSH_ORIGINAL_COMMAND",
original_command);
-
+#ifdef _CRAY
+ if (cray_tmpdir[0] != '\0')
+ child_set_env(&env, &envsize, &...
2001 May 01
1
Problem with .hushlogin in Tru64 UNIX 4.0e
I have tried this with openssh-2.5.2p2 and openssh-SNAP-20010501.
I have noticed that with a .hushlogin file in my home directory I still
get messages.
With the .hushlogin file I get these messages:
Last successful login for ricardo: Tue May 1 08:06:00 2001 from
blah.mnsu.edu
Last unsuccessful login for ricardo: Tue May 1 08:05:21 2001 from
blah.mnsu.edu
Without the .hushlogin file I get
2002 Feb 04
0
[Bug 101] New: session.c modifications for correct UNICOS behavior
...!= 0) {
time_string = ctime(&last_login_time);
if (strchr(time_string, '\n'))
@@ -752,6 +770,7 @@
else
printf("Last login: %s from %s\r\n", time_string, hostna
me);
}
+#endif /* ! _CRAY */
do_motd();
}
@@ -1027,16 +1046,17 @@
if (options.use_login && command != NULL)
options.use_login = 0;
-#if !defined(HAVE_OSF_SIA)
+#ifndef _CRAY
+# if !defined(HAVE_OSF_SIA)
if (!options.use_login) {
-# ifdef HAVE_LOGIN_CAP
+# ifdef HAVE_LOGIN_CAP...
2001 Aug 07
1
do_pre_login() used before declared
do_pre_login() in session.c is used (in do_exec_pty()) before
it's declared, which is causing some problems for me.
please move it up a couple hundred lines in the file.
patch included for 0807 snapshot.
thanks,
wendy
% diff -u session.c.orig session.c.mod
--- session.c.orig Tue Aug 7 13:11:51 2001
+++ session.c.mod Tue Aug 7 16:21:07 2001
@@ -397,6 +397,34 @@
}
}
2002 Sep 04
2
uid transition and post-auth privsep (WAS Re: possible fundamental problem with tru64 patch) (fwd)
...,7 +1280,7 @@
> */
> if (!options.use_login) {
> #ifdef HAVE_OSF_SIA
> - session_setup_sia(pw->pw_name, s->ttyfd == -1 ? NULL : s->tty);
> + session_setup_sia(pw, s->ttyfd == -1 ? NULL : s->tty);
> if (!check_quietlogin(s, command))
> do_motd();
> #else /* HAVE_OSF_SIA */
> _______________________________________________
> openssh-unix-dev at mindrot.org mailing list
> http://www.mindrot.org/mailman/listinfo/openssh-unix-dev
>
-----------------------------------------------------------------------
Toni Harbau...
2002 Jun 25
1
PrivSep and AIX 4.3.2
With 3.3p1 built on AIX 4.3.2:
$ ssh [blah]
Couldn't set usrinfo: Not owner
debug1: Calling cleanup 0x20019080(0x200219a0)
debug3: mm_request_send entering: type 27
debug1: Calling cleanup 0x20018dd4(0x0)
Connection to songohan closed by remote host.
Connection to songohan closed.
Output from sshd -d -d -d:
...
debug3: tty_parse_modes: 92 0
debug3: tty_parse_modes: 93 0
2002 Jan 30
0
[Bug 87] New: Last logon that gets reported upon login is the current login time
...printf("Last login: %s\r\n", time_string);
else
- printf("Last login: %s from %s\r\n", time_string,
hostname);
+ printf("Last login: %s from %s\r\n", time_string,
last_host);
}
do_motd();
@@ -1866,7 +1863,7 @@
/* Record that the user has logged out. */
if (s->pid != 0)
- record_logout(s->pid, s->tty);
+ record_logout(s->pid, s->tty, s->pw->pw_name);
/* Release the pseudo-tty. */
pty_release(s->...
2003 Feb 27
0
Update for Tru64 Unix
...enssh/session.c Wed Feb 26 19:43:34 2003
@@ -1320,7 +1320,7 @@
*/
if (!options.use_login) {
#ifdef HAVE_OSF_SIA
- session_setup_sia(pw->pw_name, s->ttyfd == -1 ? NULL : s->tty);
+ session_setup_sia(pw, s->ttyfd == -1 ? NULL : s->tty);
if (!check_quietlogin(s, command))
do_motd();
#else /* HAVE_OSF_SIA */
2002 Jun 29
0
Privsep for osf/1 .. still need a bit of help
...#include <windows.h>
@@ -1269,7 +1270,7 @@
*/
if (!options.use_login) {
#ifdef HAVE_OSF_SIA
- session_setup_sia(pw->pw_name, s->ttyfd == -1 ? NULL : s->tty);
+ PRIVSEP(setup_sia(pw->pw_name, s->ttyfd == -1 ? NULL : s->tty));
if (!check_quietlogin(s, command))
do_motd();
#else /* HAVE_OSF_SIA */
2002 Jun 28
0
Newer OSF patch.
...#include <windows.h>
@@ -1269,7 +1270,7 @@
*/
if (!options.use_login) {
#ifdef HAVE_OSF_SIA
- session_setup_sia(pw->pw_name, s->ttyfd == -1 ? NULL : s->tty);
+ PRIVSEP(setup_sia(pw->pw_name, s->ttyfd == -1 ? NULL : s->tty));
if (!check_quietlogin(s, command))
do_motd();
#else /* HAVE_OSF_SIA */
2002 Aug 01
0
Tru64 and OSF/1 Privsep patch
...#include <windows.h>
@@ -1269,7 +1270,7 @@
*/
if (!options.use_login) {
#ifdef HAVE_OSF_SIA
- session_setup_sia(pw->pw_name, s->ttyfd == -1 ? NULL : s->tty);
+ PRIVSEP(setup_sia(pw->pw_name, s->ttyfd == -1 ? NULL : s->tty));
if (!check_quietlogin(s, command))
do_motd();
#else /* HAVE_OSF_SIA */
2001 Apr 29
2
PATCH: UseLogin fix for 2.9p1 (w/improved last-login time)
...41
@@ -127,6 +127,9 @@
void do_exec_pty(Session *s, const char *command);
void do_exec_no_pty(Session *s, const char *command);
void do_login(Session *s, const char *command);
+#ifdef LOGIN_NEEDS_UTMPX
+void do_pre_login(Session *s);
+#endif
void do_child(Session *s, const char *command);
void do_motd(void);
int check_quietlogin(Session *s, const char *command);
@@ -644,6 +647,10 @@
#ifndef HAVE_OSF_SIA
if (!(options.use_login && command == NULL))
do_login(s, command);
+# ifdef LOGIN_NEEDS_UTMPX
+ else
+ do_pre_login(s);
+# endif
#endif
/* Do common processing for the c...
2001 Jun 05
1
OpenSSH tmp cleanup
Hi,
I noticed that Markus has fixed the temporary file cleanup problems in
OpenSSH cvs. What files need patching for this ? I only noticed
changes in: session.c, channels.h and channels.c.
-Jarno
--
Jarno Huuskonen <Jarno.Huuskonen at uku.fi>
2002 Sep 23
19
Call for testing for 3.5 OpenSSH
OpenBSD tree is heading into a lock and this includes OpenSSH. So we are
winding up for a 3.5 release. If we can get people to test the current
snapshots and report any problems that would improve the odds that your
platform won't be broke for 3.5.
Issues I know off of right now.
1. I can't test NeXT. So I TRULY need someone in that community to test
for me. Last I heard there was
2002 Apr 10
1
openssh-3.1p1 on GNU/Hurd
...trchr(time_string, '\n'))
+ *strchr(time_string, '\n') = 0;
+ if (strcmp(hostname, "") == 0)
+ printf("Last login: %s\r\n", time_string);
+ else
+ printf("Last login: %s from %s\r\n", time_string, hostname);
+ }
+ xfree(hostname);
}
do_motd();
@@ -1849,7 +1851,7 @@
{
struct stat st;
char display[512], auth_display[512];
- char hostname[MAXHOSTNAMELEN];
+ char *hostname;
if (no_x11_forwarding_flag) {
packet_send_debug("X11 forwarding disabled in user configuration file.");
@@ -1881,7 +1883,7 @@
}
/* Set up a...