Displaying 15 results from an estimated 15 matches for "login_alloc_entri".
Did you mean:
login_alloc_entry
2016 Nov 26
3
[Bug 2644] New: [PATCH] set uid for functions that use it to seek in lastlog and wtmp files
https://bugzilla.mindrot.org/show_bug.cgi?id=2644
Bug ID: 2644
Summary: [PATCH] set uid for functions that use it to seek in
lastlog and wtmp files
Product: Portable OpenSSH
Version: 7.2p2
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2001 Nov 20
0
PATCH: Fixing last/utmpx for Solaris
In case it is any help, here is the patch against openssh-3.0.1p1 that
corrects the problem with last reporting on Solaris that I sent to the
list a week or so ago against 3.0p1. There was no conversation about this
aside from Rip Loomis' comment about including it to support BSM auditing
- does this present a problem for other OSes to include the ut_name field
in the utmpx entry? Should this
2002 Jan 29
0
[Bug 84] New: last command provides incorrect information on Solaris 8
http://bugzilla.mindrot.org/show_bug.cgi?id=84
Summary: last command provides incorrect information on Solaris 8
Product: Portable OpenSSH
Version: -current
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
2001 Nov 15
1
Patch for "last" providing incorrect information on Solaris 8
I have put together a simple set of diffs that corrects the problem
described by Steven Fishback <sfishback at interpath.net> on 10-30 on this
list regarding incorrect information reported by last on Solaris. The
patches merely pass along the username in the utmpx record for a logout.
Is there any reason why this would be a problem with other OSes? If not,
maybe this could be rolled into the
2001 Jan 29
1
Solaris wtmpx patch
Hi,
Solaris (tested with 2.6) needs a username in the logout record in the wtmpx
file. Currently openssh (version 2.3.0p1) leaves the username (utmpx.ut_user)
empty in logout records, which leads to conflicting results from the last
command. Example:
# last -5 siegert
siegert pts/186 stikine.ucs.sfu. Mon Jan 15 14:26 still logged in
siegert pts/105 stikine.ucs.sfu. Mon Jan 15
2003 Jul 06
10
[Bug 585] sshd core dumping on IRIX 6.5.18 with VerifyReverseMapping enabled
http://bugzilla.mindrot.org/show_bug.cgi?id=585
------- Additional Comments From dtucker at zip.com.au 2003-07-07 00:32 -------
dmalloc (http://dmalloc.com/) claims to work on IRIX. It's likely to increase
the CPU and memory load, though.
I've built with dmalloc on Linux thusly:
LDFLAGS=-ldmalloc ./configure && make
eval `dmalloc -l /path/to/log high`
./sshd [options]
2002 Aug 19
1
sshd doesn't log hostname into utmp correctly [resend]
Hi,
Though I sent this message before, I didn't get any response. So, I
send this message, again.
This problem is occur when the connection is form IPv6, and IPv4 is
not affected.
openssh-3.4p1 doesn't handle actual size of struct sockaddr correctly,
and does copy it as long as just size of struct sockaddr. So, sshd
deesn't log hostname into utmp correctly. Here is a patch to fix
2002 Dec 29
0
[Bug 460] New: ut_addr_v6 not used
http://bugzilla.mindrot.org/show_bug.cgi?id=460
Summary: ut_addr_v6 not used
Product: Portable OpenSSH
Version: 3.5p1
Platform: All
URL: http://bugs.debian.org/167867
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at
2003 May 22
1
sshd crashing on IRIX (3.6.1p1)
Occasionally, we're noticing that sshd is core dumping on our IRIX
6.5.18f machine.
The only time we've really noticed it is when users are logging in with
putty from offsite (although I'm not really sure it's a client issue).
The user manages to log in, sshd apparently core dumps, but the user is
not logged out, the privilege separated user is still running their own
2003 Jan 27
1
[PATCH] Creation of record_failed_login() in sshlogin.c
Hi All,
I've been poking around various parts of the auth code for a while.
Some platforms support failed login counters and it occurs to me that
there's as few too many instances of:
#ifdef [PLATFORM]
if (authenticated == 0 && strcmp(method, "password") == 0)
some_login_failure_func();
#endif
The attached patch creates a record_failed_login() function in
2009 Feb 04
1
SSH PAM authentication/login with a new user DB (through NSS)
Hello,
I'm a novice system programmer and I need some knowledge about how
sshd/PAM/NSS work together. The email may be long and unclear, but I
would greatly appreciate if any one could give me some info. TIA.
I'm developing a new authentication module for Linux login service. I'm
like a novice developer in this area, so I had to study this and that. I
started with PAM naively,
2007 Jan 17
0
login_get_lastlog - nss enviornment - works in shell env, doesn't work when sshd calls it.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello to every one!
Maybe this is not exactly the right place,
but I don't know where to ask, so...
I have a FreeBSD-6-STABLE machine,
setuped with custom nss lib which reads from pgsql database.
It seems to be working just fine except
that I can't login trought ssh, when trying the normal method.
When I do
$>ssh host.com tcsh
I get
2001 Apr 29
2
PATCH: UseLogin fix for 2.9p1 (w/improved last-login time)
Attached is the latest version of my UseLogin patch that makes
"UseLogin true" work on Solaris and UNICOS. As usual, I have provided
configure.in changes that set the appropriate defines for Solaris, but
I have not provided the configure.in changes for UNICOS (since they
would be incomplete, and Wendy is working on this).
This version fixes a problem with the last-login time always
2003 Jun 03
15
[Bug 585] sshd core dumping on IRIX 6.5.18 with VerifyReverseMapping enabled
http://bugzilla.mindrot.org/show_bug.cgi?id=585
Summary: sshd core dumping on IRIX 6.5.18 with
VerifyReverseMapping enabled
Product: Portable OpenSSH
Version: -current
Platform: MIPS
OS/Version: IRIX
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo:
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Greetings,
I am not sure if this is the correct place to ask these question,
if I am at the wrong place please advise.
I am currently working on some modifications to openssh
which record the users rsa/dsa identity comment file to
a log file when the user logs in (password authentication
is disabled).
The ssh1 portion of the modification works