Displaying 8 results from an estimated 8 matches for "print_motd".
2001 Mar 03
0
[PATCH] PrintLastLog option
...- <chip at valinux.com>
"We have no fuel on board, plus or minus 8 kilograms." -- NEAR tech
-------------- next part --------------
Index: servconf.h
--- servconf.h.prev
+++ servconf.h Thu Feb 22 20:59:45 2001
@@ -52,4 +52,5 @@
* for RhostsRsaAuth */
int print_motd; /* If true, print /etc/motd. */
+ int print_lastlog; /* If true, print lastlog */
int check_mail; /* If true, check for new mail. */
int x11_forwarding; /* If true, permit inet (spoofing) X11 fwd. */
Index: servconf.c
--- servconf.c.prev
+++ servconf.c Thu Feb 22 20:59:45 2001
@@ -56,...
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2000 Nov 14
0
2.3.0p1, Solaris 7 and last login (fwd)
...DIRTY_PATCH
if (last_login_time != 0) {
time_string = ctime(&last_login_time);
if (strchr(time_string, '\n'))
***************
*** 760,765 ****
--- 796,803 ----
else
printf("Last login: %s from %s\r\n", time_string, hostname);
}
+ #endif
+
if (options.print_motd) {
#ifdef HAVE_LOGIN_CAP
f = fopen(login_getcapstr(lc, "welcome", "/etc/motd",
2001 Apr 13
0
Fixed patch for Digital Unix SIA
...check_quietlogin(s, command))
return;
#ifdef USE_PAM
@@ -758,6 +754,19 @@
else
printf("Last login: %s from %s\r\n", time_string, hostname);
}
+
+ do_motd();
+}
+
+/*
+ * Display the message of the day.
+ */
+void
+do_motd(void)
+{
+ FILE *f;
+ char buf[256];
+
if (options.print_motd) {
#ifdef HAVE_LOGIN_CAP
f = fopen(login_getcapstr(lc, "welcome", "/etc/motd",
@@ -1023,7 +1032,7 @@
if (options.use_login && command != NULL)
options.use_login = 0;
-#ifndef USE_PAM /* pam_nologin handles this */
+#if !defined(USE_PAM) && !defined(HAV...
2004 Apr 07
2
Requiring multiple auth mechanisms
I looked around for a while, but couldn't find any code for requiring multiple
authentication mechanisms in openssh. So I wrote an implemention.
I thought at first I should change the PasswordAuthentication,
PubkeyAuthentication, etc. keywords to allow no/yes/required. But there's some
funky stuff in auth2.c with respect to keyboard interactive auth that would make
this kind of
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2001 Oct 09
1
TISviaPAM patch
Here is a patch that does TIS auth via PAM. It's controlled by a switch
in the sshd_config. You'd use it by having a PAM module that sets
PAM_PROMPT_ECHO_ON. eg, you could use it with pam_skey or pam_smxs.
The patch is against the 2.9.9p2 distribution.
I'm not on the list, a reply if this patch is accepted would be great.
(But not required, I know some folks have a distaste for
2001 Mar 13
0
[PATCH] openssh 2.5.1p2 TIS authserv support
...51,6 +588,12 @@
case sChallengeResponseAuthentication:
intptr = &options->challenge_reponse_authentication;
goto parse_flag;
+
+#ifdef TIS_AUTH
+ case sAuthservAddress:
+ add_authserv_addr(options, &cp);
+ break;
+#endif
case sPrintMotd:
intptr = &options->print_motd;
diff -urN openssh-2.5.1p2/servconf.h openssh-2.5.1p2-tis/servconf.h
--- openssh-2.5.1p2/servconf.h Thu Feb 15 04:08:27 2001
+++ openssh-2.5.1p2-tis/servconf.h Fri Mar 9 10:59:50 2001
@@ -90,6 +91,9 @@
* authentication. */
int kbd_interactive_authentication; /* If true, permit */
i...