Displaying 6 results from an estimated 6 matches for "eval_client".
2001 Mar 28
0
Problem with tcp_wrappers
...refuse(&req);
}
If username was not requierd for authorization (for example
you are refusing all connection from specific host) refuse will
return "sshd: refused connect from root at some.host.name".
This happend becouse user name is checked by eval_client()
from refuse() when the connection is allready closed by the:
close(sock_in);
close(sock_out);
Hopefully username and hostname informations are cached so it is easy
to fix it - it is enough to add:
eval_client(&req)
befor...
2000 Aug 24
0
patch for a few things
...ction from" and "Closing connection" log messages, had
them include the hostname as well, since that's generally more useful to
me than the ipaddr. The ipaddr is still included, though, for
completeness and security's sake. Also, when using libwrap, have it
call eval_client() to evaluate and return the hostname. I also added
the remote port to the "Closing" message, so that it could be correlated
to the original connection.
- also with sshd connection logging, I found that when using protocol2, it
seems the daemon frequently exits with fatal_clea...
2000 Oct 07
2
[PATCH]: Add tcp_wrappers protection to port forwarding
...init(&req, RQ_DAEMON, fwd, RQ_FILE, newsock, NULL);
+ fromhost(&req);
+ sigch = signal(SIGCHLD, SIG_DFL);
+ res = hosts_access(&req);
+ signal(SIGCHLD, sigch);
+ if (!res) {
+ packet_send_debug("refused forwarded connection from %.500s to local port %d.",
+ eval_client(&req), c->host_port);
+ error("forwarded connection from %.500s to local port %d refused.",
+ eval_client(&req), c->host_port);
+ shutdown(newsock, SHUT_RDWR);
+ close(newsock);
+ return;
+ }
+ }
+#endif /* LIBWRAP */
snprintf(buf, sizeof buf,...
2001 Nov 27
1
[PATCH] tcp-wrappers support extended to x11 forwards
...RAP noes not know about IPv6 */
+ {
+ struct request_info req;
+
+ request_init(&req, RQ_DAEMON, "sshdfwd-X11", RQ_FILE, newsock, 0);
+ fromhost(&req);
+
+ if (!hosts_access(&req)) {
+ syslog(deny_severity, "refused fwd-X11 connect from %s", eval_client(&req));
+ close(newsock);
+
+ return;
+ }
+ syslog(allow_severity, "fwd-X11 connect from %s", eval_client(&req));
+
+ }
+#endif /* LIBWRAP */
+
remote_ipaddr = get_peer_ipaddr(newsock);
remote_port = get_peer_port(newsock);
snprintf(buf, size...
2010 Dec 03
1
[PATCH] upsd tcp_wrappers parsing and logging
...(&req, RQ_DAEMON, progname, RQ_FILE, client->sock_fd, 0);
+ fromhost(&req);
if (!hosts_access(&req)) {
/* tcp-wrappers says access should be denied */
send_err(client, NUT_ERR_ACCESS_DENIED);
+ upslogx(deny_severity, "tcp_wrappers denied connection from %s", eval_client(&req));
return;
}
#endif /* HAVE_WRAP */
--
1.7.3.2
2002 Jun 25
7
[Bug 294] tcp wrapper access changed between 2.9.9p2 and 3.3p1
http://bugzilla.mindrot.org/show_bug.cgi?id=294
------- Additional Comments From ktaylor at daac.gsfc.nasa.gov 2002-06-26 00:53 -------
This is what's reported in the syslog from openssh-2.9.9p2 - with an ip address
range listed in hosts.allow
Jun 25 10:50:08 6D:server sshd[30123536]: Failed keyboard-interactive for
ktaylor from xxx.xxx.xxx.xxx port 40333 ssh2
Jun 25 10:50:13 6D:server