Displaying 7 results from an estimated 7 matches for "ia_udberr".
2003 Jan 27
1
[PATCH] Creation of record_failed_login() in sshlogin.c
...ieving revision 1.78
diff -u -r1.78 auth1.c
--- auth1.c 23 Jan 2003 06:41:20 -0000 1.78
+++ auth1.c 27 Jan 2003 10:51:39 -0000
@@ -311,8 +311,6 @@
authctxt->user);
#ifdef _UNICOS
- if (type == SSH_CMSG_AUTH_PASSWORD && !authenticated)
- cray_login_failure(authctxt->user, IA_UDBERR);
if (authenticated && cray_access_denied(authctxt->user)) {
authenticated = 0;
fatal("Access denied for user %s.",authctxt->user);
Index: auth2.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/ope...
2003 Feb 28
0
[PATCH] Clean up failed login logging.
...ieving revision 1.79
diff -u -r1.79 auth1.c
--- auth1.c 24 Feb 2003 00:59:27 -0000 1.79
+++ auth1.c 25 Feb 2003 09:45:10 -0000
@@ -311,8 +311,6 @@
authctxt->user);
#ifdef _UNICOS
- if (type == SSH_CMSG_AUTH_PASSWORD && !authenticated)
- cray_login_failure(authctxt->user, IA_UDBERR);
if (authenticated && cray_access_denied(authctxt->user)) {
authenticated = 0;
fatal("Access denied for user %s.",authctxt->user);
Index: auth2.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/ope...
2003 Apr 03
0
[PATCH re-send]: Clean up logging of failed logins.
...ieving revision 1.79
diff -u -r1.79 auth1.c
--- auth1.c 24 Feb 2003 00:59:27 -0000 1.79
+++ auth1.c 25 Feb 2003 09:45:10 -0000
@@ -311,8 +311,6 @@
authctxt->user);
#ifdef _UNICOS
- if (type == SSH_CMSG_AUTH_PASSWORD && !authenticated)
- cray_login_failure(authctxt->user, IA_UDBERR);
if (authenticated && cray_access_denied(authctxt->user)) {
authenticated = 0;
fatal("Access denied for user %s.",authctxt->user);
Index: auth2.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/ope...
2003 Apr 27
3
[PATCH re-send]: Clean up logging of failed logins
....]
>+/* Record a failed login attempt. */
>+void
>+record_failed_login(const char *user, const char *host, const char *ttyname)
>+{
>+#ifdef WITH_AIXAUTHENTICATE
>+ loginfailed(user, host, ttyname);
>+#endif
>+#ifdef _UNICOS
>+ cray_login_failure((char *)user, IA_UDBERR);
>+#endif /* _UNICOS */
>+}
I like the patch idea, but I'd like to skip the whole 'chained function
calls'. Plus it avoids closely packed #ifdef/#endifs.
Just rename cray_login_failure() and loginfailed() to
record_failed_login(), and change the #ifdef WITH_AIXAUTHENTICATE to...
2002 Apr 22
0
[Bug 99] auth2.c modifications for correct UNICOS behavior
...quot;);
@@ -271,6 +282,10 @@
#endif /* WITH_AIXAUTHENTICATE */
packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
}
+#ifdef _CRAY
+ if (strcmp(method, "password") == 0)
+ cray_login_failure(authctxt->user, IA_UDBERR);
+#endif /* _CRAY */
methods = authmethods_get();
packet_start(SSH2_MSG_USERAUTH_FAILURE);
packet_put_cstring(methods);
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Apr 22
0
[Bug 98] auth1.c modifications for correct UNICOS behavior
...ted)
fatal("INTERNAL ERROR: authenticated invalid user %s",
authctxt->user);
+
+#ifdef _CRAY
+ if (type == SSH_CMSG_AUTH_PASSWORD && !authenticated) {
+ cray_login_failure(authctxt->user, IA_UDBERR);
+ }
+ if (authenticated && cray_access_denied(authctxt->user)) {
+ authenticated = 0;
+ fatal("Access denied for user %s.",authctxt->user);
+ }
+#endif /* _CRAY */
#ifdef HAVE_CYGWIN...
2002 Sep 23
19
Call for testing for 3.5 OpenSSH
OpenBSD tree is heading into a lock and this includes OpenSSH. So we are
winding up for a 3.5 release. If we can get people to test the current
snapshots and report any problems that would improve the odds that your
platform won't be broke for 3.5.
Issues I know off of right now.
1. I can't test NeXT. So I TRULY need someone in that community to test
for me. Last I heard there was