Displaying 6 results from an estimated 6 matches for "login_setall".
2002 Jun 25
3
BSD/OS with privsep
...+1154,26 @@
{
#ifdef HAVE_CYGWIN
if (is_winnt) {
#else /* HAVE_CYGWIN */
if (getuid() == 0 || geteuid() == 0) {
#endif /* HAVE_CYGWIN */
#ifdef HAVE_SETPCRED
setpcred(pw->pw_name);
#endif /* HAVE_SETPCRED */
#ifdef HAVE_LOGIN_CAP
- if (setusercontext(lc, pw, pw->pw_uid,
- (LOGIN_SETALL & ~LOGIN_SETPATH)) < 0) {
+ int flags = LOGIN_SETALL & ~LOGIN_SETPATH;
+#ifdef __bsdi__
+ if (getpid() != getpgrp())
+ flags &= ~LOGIN_SETLOGIN;
+#endif
+ if (setusercontext(lc, pw, pw->pw_uid, flags) < 0) {
perror("unable to set user context");
exit(1);...
2001 Jul 20
0
Updated chroot patch
...2;
+
+ if(chroot(user_dir) != 0)
+ fatal("Couldn't chroot to user directory %s", user_dir);
+
+ pw->pw_dir = new_root;
+ break;
+ }
+ new_root += 2;
+ }
+# endif /* DOT_CHROOT */
# ifdef HAVE_LOGIN_CAP
if (setusercontext(lc, pw, pw->pw_uid,
(LOGIN_SETALL & ~LOGIN_SETPATH)) < 0) {
-----------------------------< cut here >-------------------------------
--
Civilisation: where they cut down the trees and name streets after them.
2003 Sep 23
1
3.7.1p1 appears to break pam session.
...be run for LOGIN_CAP systems too!
- */
- if (options.use_pam) {
- do_pam_session();
- do_pam_setcred(0);
- }
-# endif /* USE_PAM */
if (setusercontext(lc, pw, pw->pw_uid,
(LOGIN_SETALL & ~LOGIN_SETPATH)) < 0) {
perror("unable to set user context");
2000 Oct 07
0
OpenSSH changes for BSD/OS
...992,1002 ----
if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid)
fatal("Failed to set uids to %d.", (int) pw->pw_uid);
#endif /* HAVE_OSF_SIA */
+ #else /* HAVE_SETUSERCONTEXT*/
+ lc = login_getclass(pw->pw_class);
+ if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETALL) < 0)
+ fatal("setusercontext failed.");
+ #endif /* HAVE_SETUSERCONTEXT */
}
/*
* Get the shell from the password data. An empty shell field is
***************
*** 1013,1019 ****
--- 1026,1038 ----
child_set_env(&env, &envsize, "USER", pw->pw_nam...
2000 Feb 27
0
[PATCH] Fix login.conf, expiration, BSD compatibility in OpenSSH
...child_set_env(&env, &envsize, "MAIL", buf);
+
+ if (getenv("TZ"))
+ child_set_env(&env, &envsize, "TZ", getenv("TZ"));
+
+ /* Save parent environment */
+ tmpenv = environ;
+ environ = env;
+
+ if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETALL) < 0)
+ fatal("setusercontext failed: %s", strerror(errno));
+
+ /* Restore parent environment */
+ env = environ;
+ environ = tmpenv;
+
+ for (envsize = 0; env[envsize] != NULL; ++envsize)
+ ;
+ envsize = (envsize < 100) ? 100 : envsize + 16;
+ env = xrealloc(env, envsize...
2002 Jul 04
4
Chroot patch (v3.4p1)
The following is a patch I've been working on to support a "ChrootUser"
option in the sshd_config file.
I was looking for a way to offer sftp access and at the same time restict
interactive shell access. This patch is a necessary first step (IMO).
It applies clean with 'patch -l'.
Also attached is a shell script that helps to build a chrooted home dir on
a RedHat 7.2