search for: login_alloc_entry

Displaying 15 results from an estimated 15 matches for "login_alloc_entry".

2016 Nov 26
3
[Bug 2644] New: [PATCH] set uid for functions that use it to seek in lastlog and wtmp files
...posix.ru at gmail.com Set uid for functions that use it to seek in lastlog and wtmp files: diff --git a/sshlogin.c b/sshlogin.c index cea3e76..0fcae4c 100644 --- a/sshlogin.c +++ b/sshlogin.c @@ -134,6 +134,7 @@ record_login(pid_t pid, const char *tty, const char *user, uid_t uid, li = login_alloc_entry(pid, user, host, tty); login_set_addr(li, addr, addrlen); + li->uid = uid; login_login(li); login_free_entry(li); } -- You are receiving this mail because: You are watching the assignee of the bug.
2001 Nov 20
0
PATCH: Fixing last/utmpx for Solaris
...sshlogin.c~ Tue May 8 16:33:06 2001 +++ sshlogin.c Mon Nov 19 12:08:34 2001 @@ -94,11 +94,11 @@ /* Records that the user has logged out. */ void -record_logout(pid_t pid, const char *ttyname) +record_logout(pid_t pid, const char *ttyname, const char *user) { struct logininfo *li; - li = login_alloc_entry(pid, NULL, NULL, ttyname); + li = login_alloc_entry(pid, user, NULL, ttyname); login_logout(li); login_free_entry(li); } --- sshlogin.h~ Wed Jul 4 00:46:58 2001 +++ sshlogin.h Mon Nov 19 12:08:34 2001 @@ -17,7 +17,7 @@ void record_login(pid_t, const char *, const char *, uid_t, cons...
2002 Jan 29
0
[Bug 84] New: last command provides incorrect information on Solaris 8
...shlogin.c~ Tue May 8 16:33:06 2001 +++ sshlogin.c Tue Jan 29 10:56:59 2002 @@ -94,11 +94,11 @@ /* Records that the user has logged out. */ void -record_logout(pid_t pid, const char *ttyname) +record_logout(pid_t pid, const char *ttyname, const char *user) { struct logininfo *li; - li = login_alloc_entry(pid, NULL, NULL, ttyname); + li = login_alloc_entry(pid, user, NULL, ttyname); login_logout(li); login_free_entry(li); } --- sshlogin.h~ Wed Jul 4 00:46:58 2001 +++ sshlogin.h Tue Jan 29 10:56:59 2002 @@ -17,7 +17,7 @@ void record_login(pid_t, const char *, const char *, uid_t, con...
2001 Nov 15
1
Patch for "last" providing incorrect information on Solaris 8
...ogin.c.orig Thu Nov 15 09:35:02 2001 +++ sshlogin.c Thu Nov 15 09:38:01 2001 @@ -94,11 +94,11 @@ /* Records that the user has logged out. */ void -record_logout(pid_t pid, const char *ttyname) +record_logout(pid_t pid, const char *ttyname, const char *user) { struct logininfo *li; - li = login_alloc_entry(pid, NULL, NULL, ttyname); + li = login_alloc_entry(pid, user, NULL, ttyname); login_logout(li); login_free_entry(li); } --- sshlogin.h.orig Thu Nov 15 09:35:02 2001 +++ sshlogin.h Thu Nov 15 09:38:01 2001 @@ -17,7 +17,7 @@ void record_login(pid_t, const char *, const char *, uid_t,...
2001 Jan 29
1
Solaris wtmpx patch
...ri Sep 15 19:29:09 2000 +++ openssh-2.3.0p1/login.c Fri Jan 26 15:48:26 2001 @@ -80,11 +80,11 @@ /* Records that the user has logged out. */ void -record_logout(pid_t pid, const char *ttyname) +record_logout(pid_t pid, const char *ttyname, const char *user) { struct logininfo *li; - li = login_alloc_entry(pid, NULL, NULL, ttyname); + li = login_alloc_entry(pid, user, NULL, ttyname); login_logout(li); login_free_entry(li); } diff -u -r openssh-2.3.0p1.orig/loginrec.c openssh-2.3.0p1/loginrec.c --- openssh-2.3.0p1.orig/loginrec.c Sat Sep 30 03:34:44 2000 +++ openssh-2.3.0p1/loginrec.c Tue Jan...
2003 Jul 06
10
[Bug 585] sshd core dumping on IRIX 6.5.18 with VerifyReverseMapping enabled
http://bugzilla.mindrot.org/show_bug.cgi?id=585 ------- Additional Comments From dtucker at zip.com.au 2003-07-07 00:32 ------- dmalloc (http://dmalloc.com/) claims to work on IRIX. It's likely to increase the CPU and memory load, though. I've built with dmalloc on Linux thusly: LDFLAGS=-ldmalloc ./configure && make eval `dmalloc -l /path/to/log high` ./sshd [options]
2002 Aug 19
1
sshd doesn't log hostname into utmp correctly [resend]
Hi, Though I sent this message before, I didn't get any response. So, I send this message, again. This problem is occur when the connection is form IPv6, and IPv4 is not affected. openssh-3.4p1 doesn't handle actual size of struct sockaddr correctly, and does copy it as long as just size of struct sockaddr. So, sshd deesn't log hostname into utmp correctly. Here is a patch to fix
2002 Dec 29
0
[Bug 460] New: ut_addr_v6 not used
...g("getpeername: %.100s", strerror(errno)); diff -ruN t/openssh-3.5p1/sshlogin.c openssh-3.5p1/sshlogin.c --- t/openssh-3.5p1/sshlogin.c 2002-09-04 08:45:11.000000000 +0200 +++ openssh-3.5p1/sshlogin.c 2002-11-05 13:12:25.000000000 +0100 @@ -70,7 +70,7 @@ struct logininfo *li; li = login_alloc_entry(pid, user, host, ttyname); - login_set_addr(li, addr, sizeof(struct sockaddr)); + login_set_addr(li, addr, addrlen); login_login(li); login_free_entry(li); } ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2003 May 22
1
sshd crashing on IRIX (3.6.1p1)
...xfb240e0] 3 _malloc(0x0, 0x101520d8, 0x0, 0x6d642e63, 0x6d642e60, 0x1, 0x10166958, 0x0) ["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":186, 0xfb23f4c] 4 xmalloc(size = 608) ["/usr/local/src/security/openssh-3.6.1p1/xmalloc.c":28, 0x10065934] 5 login_alloc_entry(pid = 13759, username = 0x101520d8 = "user", hostname = 0x101522a8 = "offsite.address.com", line = 0x1014a22c = "/dev/ttyq7") ["/usr/local/src/security/openssh-3.6.1p1/loginrec.c":325, 0x10048aa0] 6 record_login(pid = 13759, ttyname = 0x1014a22c = &quo...
2003 Jan 27
1
[PATCH] Creation of record_failed_login() in sshlogin.c
...login.c 27 Jan 2003 11:47:18 -0000 @@ -42,6 +42,7 @@ RCSID("$OpenBSD: sshlogin.c,v 1.5 2002/08/29 15:57:25 stevesk Exp $"); #include "loginrec.h" +#include "log.h" /* * Returns the time when the user last logged in. Returns 0 if the @@ -98,4 +99,20 @@ li = login_alloc_entry(pid, user, NULL, ttyname); login_logout(li); login_free_entry(li); +} + + +/* Record a failed login attempt. */ +void +record_failed_login(const char *user, const char *host, const char *ttyname) +{ + debug3("%s user %s host %s tty %s", __func__, user, host, ttyname); + +#ifdef WITH...
2009 Feb 04
1
SSH PAM authentication/login with a new user DB (through NSS)
...: debug1: do_cleanup Feb 3 14:54:11 dharma sshd[7863]: debug1: do_cleanup Feb 3 14:54:11 dharma sshd[7863]: debug1: PAM: cleanup Feb 3 14:54:11 dharma sshd[7863]: debug3: PAM: sshpam_thread_cleanup entering ... It looks like login_init_entry()'s username parameter (which is passed through login_alloc_entry(), record_login(), and do_login(), where the passwd struct is assigned s->pw of the Session parameter s), and this passwd struct is somehow different (blank?) from the one filled earlier by my NSS module at the time of authentication. I tried to analyze the sshd source code as much as possib...
2007 Jan 17
0
login_get_lastlog - nss enviornment - works in shell env, doesn't work when sshd calls it.
...9;ll * use time_t's value as tv_sec and set tv_usec to 0 */ unsigned int tv_sec; unsigned int tv_usec; union login_netinfo hostaddr; /* caller's host address(es) */ }; /* struct logininfo */ /* construct a new login entry */ struct logininfo *login_alloc_entry(int pid, const char *username, const char *hostname, const char *line); /* lastlog *entry* functions fill out a logininfo */ struct logininfo *login_get_lastlog(struct logininfo *li, const int uid); int main() { int uid=1010; struct passwd *pw; struct logininfo...
2001 Apr 29
2
PATCH: UseLogin fix for 2.9p1 (w/improved last-login time)
...login.c 2001/03/26 05:32:17 1.3 +++ sshlogin.c 2001/04/29 18:12:41 @@ -77,6 +77,20 @@ login_free_entry(li); } +#ifdef LOGIN_NEEDS_UTMPX +void +record_utmp_only(pid_t pid, const char *ttyname, const char *user, + const char *host, struct sockaddr * addr) +{ + struct logininfo *li; + + li = login_alloc_entry(pid, user, host, ttyname); + login_set_addr(li, addr, sizeof(struct sockaddr)); + login_utmp_only(li); + login_free_entry(li); +} +#endif + /* Records that the user has logged out. */ void Index: sshlogin.h --- sshlogin.h 2001/03/05 03:53:03 1.2 +++ sshlogin.h 2001/04/29 18:12:41 @@ -31,6 +3...
2003 Jun 03
15
[Bug 585] sshd core dumping on IRIX 6.5.18 with VerifyReverseMapping enabled
http://bugzilla.mindrot.org/show_bug.cgi?id=585 Summary: sshd core dumping on IRIX 6.5.18 with VerifyReverseMapping enabled Product: Portable OpenSSH Version: -current Platform: MIPS OS/Version: IRIX Status: NEW Severity: major Priority: P2 Component: sshd AssignedTo:
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...onst char *ttyname, const char *user, uid_t uid, - - const char *host, struct sockaddr * addr) + const char *host, struct sockaddr * addr, const char *realname) { struct logininfo *li; + char filename[80], line[132]; + char *cp; + time_t Now; + struct tm *tp; + int fd; li = login_alloc_entry(pid, user, host, ttyname); login_set_addr(li, addr, sizeof(struct sockaddr)); login_login(li); login_free_entry(li); + + /* We will create a separate file in "/usr/adm/sshd" for each user + ** who logs in. The filename will be the same as the ttyname. The + ** file will cont...