search for: match_hostname

Displaying 20 results from an estimated 22 matches for "match_hostname".

2007 Nov 11
0
Patch to sshd match
...(match_cfg_line_group(arg, line, user)) { + switch (match_cfg_line_group(arg, line, user, not)) { case -1: return -1; case 0: @@ -584,27 +602,30 @@ } else if (strcasecmp(attrib, "host") == 0) { if (!host) { result = 0; + not = 0; continue; } - if (match_hostname(host, arg, len) != 1) + if (match_hostname(host, arg, len) == not) result = 0; else - debug("connection from %.100s matched 'Host " - "%.100s' at line %d", host, arg, line); + debug("connection from %.100s matched '%sHost " +...
2003 Jul 05
2
Unhelpful error message when matching hosts in access list [PATCH]
...|| (strspn(s, ":0123456789ABCDEFabcdef") == len) +#endif + ); +} + static int access_match(char *list, char *addr, char *host) { char *tok; @@ -203,7 +218,9 @@ if (host) strlower(host); for (tok=strtok(list2," ,\t"); tok; tok=strtok(NULL," ,\t")) { - if (match_hostname(host, tok) || match_address(addr, tok)) { + if (match_hostname(host, tok) + || (likely_address(tok) + && match_address(addr, tok))) { free(list2); return 1; }
2006 Sep 25
2
Dovecot - postfix SASL
...atch_list_match: 67.183.127.210: no match Sep 25 04:53:30 hostyougood postfix/smtpd[17497]: match_list_match: c-67-183-127-210.hsd1.wa.comcast.net: no match Sep 25 04:53:30 hostyougood postfix/smtpd[17497]: match_list_match: 67.183.127.210: no match Sep 25 04:53:30 hostyougood postfix/smtpd[17497]: match_hostname: c-67-183-127-210.hsd1.wa.comcast.net ~? 127.0.0.0/8 Sep 25 04:53:30 hostyougood postfix/smtpd[17497]: match_hostaddr: 67.183.127.210 ~? 127.0.0.0/8 Sep 25 04:53:30 hostyougood postfix/smtpd[17497]: match_hostname: c-67-183-127-210.hsd1.wa.comcast.net ~? 205.252.250.12 Sep 25 04:53:30 hostyougood p...
2004 Feb 01
1
innetgr revised netgroup patch against 2.6.0
...or the user section but didn't find it in my 15 seconds of looking.. --- access.c 2003-07-30 16:12:27.000000000 +1000 +++ ../rsync-2.6.0-Linux/access.c 2004-02-01 23:21:12.000000000 +1100 @@ -22,10 +22,21 @@ */ #include "rsync.h" +#include <netdb.h> static int match_hostname(char *host, char *tok) { + char *netgroup; + + if(strlen(tok)>1){ + if(tok[0]=='@'){ + netgroup=tok+1; + if(innetgr(netgroup, host, NULL, NULL)){ + return(1); + } +...
2017 Mar 01
7
[Bug 2685] New: Case sensitive hostname matching
...ase insensitive Currently ssh (and possibly sshd) match hostnames in a case sensitive manner. While recognise there are reasons this can be desired behaviour, the comments in code (and the generally accepted property of hostnames being case-instensitive - RFC 4343) suggest otherwise. Comment for match_hostname() (in match.c) even mentions explicitly, that the hostname is expected to be lowercased, which it has been not, since the d56b44d2dfa093883a5c4e91be3f72d99946b170 + eb6d870a0ea8661299bb2ea8f013d3ace04e2024 commit combo. I have no clear position on what to do with originalhost matching, though I wo...
2011 Feb 21
2
Rejected mails
...ix/smtpd[1372]: generic_checks: name=reject_unauth_pipelining status=0 Feb 21 16:36:34 hostname postfix/smtpd[1372]: generic_checks: name=permit_mynetworks Feb 21 16:36:34 hostname postfix/smtpd[1372]: permit_mynetworks: gate1.mds.com.sg 203.126.130.157 Feb 21 16:36:34 hostname postfix/smtpd[1372]: match_hostname: gate1.mds.com.sg ~? 172.18.20.0/24 Feb 21 16:36:34 hostname postfix/smtpd[1372]: match_hostaddr: 203.126.130.157 ~? 172.18.20.0/24 Feb 21 16:36:34 hostname postfix/smtpd[1372]: match_hostname: gate1.mds.com.sg ~? 127.0.0.0/8 Feb 21 16:36:34 hostname postfix/smtpd[1372]: match_hostaddr: 203.126.130...
2019 Mar 28
2
dovecot mailing list stopped delivering mail
...dna01 postfix/smtpd[66648]: match_list_match: talvi.dovecot.org: no match Mar 28 10:57:42 dna01 postfix/smtpd[66648]: match_list_match: 94.237.25.159: no match Mar 28 10:57:42 dna01 postfix/smtpd[66648]: smtp_stream_setup: maxtime=300 enable_deadline=0 Mar 28 10:57:42 dna01 postfix/smtpd[66648]: match_hostname: smtpd_client_event_limit_exceptions: talvi.dovecot.org ~? 192.168.3.0/24 Mar 28 10:57:42 dna01 postfix/smtpd[66648]: match_hostaddr: smtpd_client_event_limit_exceptions: 94.237.25.159 ~? 192.168.3.0/24 Mar 28 10:57:42 dna01 postfix/smtpd[66648]: match_hostname: smtpd_client_event_limit_exceptio...
2017 Mar 03
2
case sensitive hostname matching
...dfa093883a5c4e91be3f72d99946b170 and eb6d870a0ea8661299bb2ea8f013d3ace04e2024). Given that hostnames are ususally interpreted in a case insensitive way (and the code actually expects the input to be lowercased anyway) it might be good to perform the comparisons as such. We can either make sure match_hostname() receives a lowercased string indeed or perform the lowercasing there (carefully as not to introduce side effects). One question is, whether *any* hostname matching should be case insensitive or whether originalhost is better left alone (I can think of reasons for case sensitive matching there...
2019 Mar 28
0
dovecot mailing list stopped delivering mail
...match_list_match: > talvi.dovecot.org: no match > Mar 28 10:57:42 dna01 postfix/smtpd[66648]: match_list_match: > 94.237.25.159: no match > Mar 28 10:57:42 dna01 postfix/smtpd[66648]: smtp_stream_setup: > maxtime=300 enable_deadline=0 > Mar 28 10:57:42 dna01 postfix/smtpd[66648]: match_hostname: > smtpd_client_event_limit_exceptions: talvi.dovecot.org ~? 192.168.3.0/24 > Mar 28 10:57:42 dna01 postfix/smtpd[66648]: match_hostaddr: > smtpd_client_event_limit_exceptions: 94.237.25.159 ~? 192.168.3.0/24 > Mar 28 10:57:42 dna01 postfix/smtpd[66648]: match_hostname: > smtpd_clien...
2000 Feb 27
0
[PATCH] Fix login.conf, expiration, BSD compatibility in OpenSSH
...e()); } + +#ifdef LOGIN_CAP + lc = login_getpwclass(pw); + if (lc == NULL) + lc = login_getclassbyname(NULL, pw); + from_host = get_canonical_hostname(); + from_ip = get_remote_ipaddr(); + + denied = 0; + if ((hosts = login_getcapstr(lc, "host.deny", NULL, NULL)) != NULL) { + denied = match_hostname(from_host, hosts, strlen(hosts)); + if (!denied) + denied = match_hostname(from_ip, hosts, strlen(hosts)); + } + if (!denied && + (hosts = login_getcapstr(lc, "host.allow", NULL, NULL)) != NULL) { + denied = !match_hostname(from_host, hosts, strlen(hosts)); + if (denied)...
2003 Mar 04
0
hashing known_hosts
...hostfile.c Mon Mar 3 17:28:25 2003 @@ -135,8 +135,13 @@ check_host_in_hostfile(const char *filen ; /* Check if the host name matches. */ +#ifdef HASH_KNOWN_HOSTS + if (match_hashed_hostname(host, cp, (u_int) (cp2 - cp)) != 1) + continue; +#else if (match_hostname(host, cp, (u_int) (cp2 - cp)) != 1) continue; +#endif /* Got a match. Skip host name. */ cp = cp2; diff -u -p openssh-3.4p1/match.c openssh-3.4p1-hash/match.c --- openssh-3.4p1/match.c Mon Mar 4 20:42:43 2002 +++ openssh-3.4p1-hash/match.c Mon Mar 3 17:32:17 2003 @@ -176,6 +176,14 @@...
2012 Dec 27
4
Help Getting Postfix relaying via Gmail
...:587, delay=23, delays=20/0.04/3.3/0, dsn=4.7.0, status=deferred (SASL authentication failed; cannot authenticate to server smtp.gmail.com[173.194.79.108]: no mechanism available) Dec 27 23:15:40 hbc postfix/smtp[2605]: flush_add: site gmail.com id 8DEB1410B3 Dec 27 23:15:40 hbc postfix/smtp[2605]: match_hostname: gmail.com ~? hbc.hillcrest.org.nz Dec 27 23:15:40 hbc postfix/smtp[2605]: match_hostname: gmail.com ~? localhost.hillcrest.org.nz Dec 27 23:15:40 hbc postfix/smtp[2605]: match_hostname: gmail.com ~? localhost Dec 27 23:15:40 hbc postfix/smtp[2605]: match_list_match: gmail.com: no match Dec 27 23:1...
2001 Sep 28
0
openssh-2.9.9p2 subscript violation problems with ctype macros
...ther than isdigit(X), as it's faster on most modern hosts (a subtract and a compare, rather than a reference through memory and then a test). 2001-09-28 Paul Eggert <eggert at twinsun.com> * canohost.c (get_remote_hostname): Don't pass negative chars to ctype macros. * match.c (match_hostname): Likewise. * openbsd-compat/base64.c (b64_ntop): Likewise. * openbsd-compat/inet_aton.c (inet_aton): Likewise. * openbsd-compat/mktemp.c (_gettemp): Likewise. * openbsd-compat/readpassphrase.c (readpassphrase): Likewise. * scp.c (sink): Likewise. * sshconnect.c (sshconnect.c): Likewise. ===...
2012 Dec 27
3
[PATCH] hostfile: list known names (if any) for new hostkeys
...izeof(line), &linenum) == 0) { cp = line; @@ -269,11 +266,11 @@ load_hostkeys(struct hostkeys *hostkeys, const char *host, const char *path) for (cp2 = cp; *cp2 && *cp2 != ' ' && *cp2 != '\t'; cp2++) ; - /* Check if the host name matches. */ - if (match_hostname(host, cp, (u_int) (cp2 - cp)) != 1) { + /* Check if the host name matches if we're looking for a host. */ + if (lookup_host && match_hostname(lookup_host, cp, (u_int) (cp2 - cp)) != 1) { if (*cp != HASH_DELIM) continue; - hashed_host = host_hash(host, cp, (u_int) (cp2 - cp)...
2004 Jan 31
1
netgroups patch for rsync 2.6.0
...his into prod .. but with any luck someone else may have done that for me.. :) --- access.c 2003-07-30 16:12:27.000000000 +1000 +++ ../rsync-2.6.0-Linux/access.c 2004-01-31 23:15:37.000000000 +1100 @@ -22,10 +22,31 @@ */ #include "rsync.h" +#include <netdb.h> static int match_hostname(char *host, char *tok) { + char netgroup[512]; + char *machinep; + char *userp; + char *domainp; + + if(strlen(tok)){ + if(tok[0]=='@'){ + strcpy(netgroup, ""); + sscanf(tok, "@%s", netgroup); + setnetgrent(netgroup); + while(getnetgrent(&machinep, &use...
2019 Feb 22
3
[PATCH 2/2] Cygwin: implement case-insensitive Unicode user and group name matching
On Wed, 20 Feb 2019 at 23:54, Corinna Vinschen <vinschen at redhat.com> wrote: > The previous revert enabled case-insensitive user names again. This > patch implements the case-insensitive user and group name matching. > To allow Unicode chars, implement the matcher using wchar_t chars in > Cygwin-specific code. Keep the generic code changes as small as possible. > Cygwin:
2002 May 07
0
Fixing exclude/exclude wildcard handling
...b/mdfour.o \ +LIBOBJ=lib/wildmat.o lib/compat.o lib/snprintf.o lib/mdfour.o \ lib/permstring.o \ @LIBOBJS@ ZLIBOBJ=zlib/deflate.o zlib/infblock.o zlib/infcodes.o zlib/inffast.o \ Index: access.c --- access.c 2002/04/11 02:25:53 1.5 +++ access.c 2002/05/08 04:19:50 @@ -27,7 +27,7 @@ static int match_hostname(char *host, char *tok) { if (!host || !*host) return 0; - return (fnmatch(tok, host, 0) == 0); + return wildmat(host, tok); } Index: authenticate.c --- authenticate.c 2002/01/24 02:33:45 1.19 +++ authenticate.c 2002/05/08 04:19:50 @@ -239,7 +239,7 @@ if (!users) return NULL; for (tok=...
2006 Mar 29
7
sshd config parser
Hi All. For various reasons, we're currently looking at extending (or even overhauling) the config parser used for sshd_config. Right now the syntax I'm looking at is a cumulative "Match" keyword that matches when all of the specified criteria are met. This would be similar the the Host directive used in ssh_config, although it's still limiting (eg you can't easily
1999 Nov 22
3
status of openssh for solaris?
In message <19991122110826.A23851 at wdawson-sun.sbs.siemens.com>, Willard Dawson writes: >I just tried to compile, this time with openssh-1.2pre14, openssl-0.9.4 >and egd-0.6. I get considerably further along, but still not completely >compiled. Here are the last bits: > >gcc -g -O2 -Wall -I/usr/local/ssl/include -DETCDIR=\"/usr/local/etc\" -DSSH_PR
2019 Feb 22
2
[PATCH 2/2] Cygwin: implement case-insensitive Unicode user and group name matching
...he diff --git a/match.h b/match.h index 852b1a5cb164..d98b0cb87719 100644 --- a/match.h +++ b/match.h @@ -16,6 +16,7 @@ int match_pattern(const char *, const char *); int match_pattern_list(const char *, const char *, int); +int match_usergroup_pattern_list(const char *, const char *); int match_hostname(const char *, const char *); int match_host_and_ip(const char *, const char *, const char *); int match_user(const char *, const char *, const char *, const char *); diff --git a/openbsd-compat/bsd-cygwin_util.c b/openbsd-compat/bsd-cygwin_util.c index f721fca9d998..1e4cdc9280d4 100644 --- a/op...