Displaying 18 results from an estimated 18 matches for "session_proctitl".
Did you mean:
session_proctitle
2002 Feb 12
1
openssh + pam errors (fwd)
...m errors
send this patch to openssh-unix-dev at mindrot.org
Damien Miller maintains the OpenSSH-portable tree, he'll know what to
do with it...
-d.
---
http://www.monkey.org/~dugsong/
--- old/session.c Sat Dec 1 18:37:08 2001
+++ session.c Tue Feb 12 00:03:37 2002
@@ -437,7 +437,6 @@
session_proctitle(s);
#if defined(USE_PAM)
- do_pam_session(s->pw->pw_name, NULL);
do_pam_setcred(1);
if (is_pam_password_change_required())
packet_disconnect("Password change required but no "
@@ -494,6 +493,9 @@
#endif /* USE_PIPES */
/* Do processing for the child (exec command etc)...
2001 Oct 23
2
PAM problem - sshd segfault on Solaris
...the
same code looks in 2.9p2 (which doesn't segfault).
I'll happily provide any information needed to help fix this. Thanks.
--- openssh/session.c.orig Mon Oct 22 22:42:46 2001
+++ openssh/session.c Mon Oct 22 22:43:31 2001
@@ -430,7 +430,7 @@ do_exec_no_pty(Session *s, const char *c
session_proctitle(s);
#if defined(USE_PAM)
- do_pam_session(s->pw->pw_name, NULL);
+/* do_pam_session(s->pw->pw_name, NULL); */
do_pam_setcred(1);
#endif /* USE_PAM */
2001 Jun 05
1
OpenSSH tmp cleanup
Hi,
I noticed that Markus has fixed the temporary file cleanup problems in
OpenSSH cvs. What files need patching for this ? I only noticed
changes in: session.c, channels.h and channels.c.
-Jarno
--
Jarno Huuskonen <Jarno.Huuskonen at uku.fi>
2001 Feb 22
0
Solaris and Latest snapshot (2001-02-21) (fwd)
...c
> ===================================================================
> RCS file: /var/cvs/openssh/session.c,v
> retrieving revision 1.80
> diff -u -r1.80 session.c
> --- session.c 2001/02/21 05:53:33 1.80
> +++ session.c 2001/02/21 16:28:40
> @@ -481,6 +481,10 @@
>
> session_proctitle(s);
>
> +#ifdef USE_PAM
> + do_pam_setcred();
> +#endif /* USE_PAM */
> +
> /* Fork the child. */
> if ((pid = fork()) == 0) {
> /* Child. Reinitialize the log since the pid has changed. */
> @@ -593,6 +597,11 @@
> ptyfd = s->ptyfd;
> ttyfd = s->tt...
2001 Jun 21
0
Patch for removing X11 fwding cookies
...ay);
+ pclose(f);
+ } else {
+ fprintf(stderr, "Could not run %s\n", cmd);
+ }
+ restore_uid();
+ }
session_pty_cleanup(s);
session_free(s);
session_proctitle(s);
***************
2001 Sep 28
0
openssh-2.9.9p2 session.c uses two undeclared void functions
...=============================
RCS file: session.c,v
retrieving revision 2.9.9.2
retrieving revision 2.9.9.2.0.1
diff -pu -r2.9.9.2 -r2.9.9.2.0.1
--- session.c 2001/09/16 22:17:15 2.9.9.2
+++ session.c 2001/09/28 18:17:11 2.9.9.2.0.1
@@ -126,6 +126,9 @@ static void session_pty_cleanup(void *);
void session_proctitle(Session *);
int session_setup_x11fwd(Session *);
void do_exec_pty(Session *, const char *);
+#ifdef LOGIN_NEEDS_UTMPX
+static void do_pre_login(Session *s);
+#endif
void do_exec_no_pty(Session *, const char *);
void do_exec(Session *, const char *);
void do_login(Session *, const char *);
@@...
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
..._terminate(void);
Index: session.c
===================================================================
RCS file: /cvs/openssh/session.c,v
retrieving revision 1.222
diff -u -r1.222 session.c
--- session.c 26 Sep 2002 00:38:50 -0000 1.222
+++ session.c 21 Dec 2002 11:39:07 -0000
@@ -454,7 +454,6 @@
session_proctitle(s);
#if defined(USE_PAM)
- do_pam_session(s->pw->pw_name, NULL);
do_pam_setcred(1);
if (is_pam_password_change_required())
packet_disconnect("Password change required but no "
@@ -581,7 +580,7 @@
ttyfd = s->ttyfd;
#if defined(USE_PAM)
- do_pam_session(s->pw->...
2006 Apr 27
0
bug in OpenSSH_4.3p2: pam_open_session() called but not close for root users
....org/cgi-bin/bugreport.cgi?bug=132681
and
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=150968
possible patch for first solution:
Index: session.c
===================================================================
--- session.c (revision 15)
+++ session.c (working copy)
@@ -394,8 +394,10 @@
session_proctitle(s);
#if defined(USE_PAM)
- if (options.use_pam && !use_privsep)
+ if (options.use_pam && !use_privsep) {
+ do_pam_session();
do_pam_setcred(1);
+ }
#endif /* USE_PAM */
/* Fork the child. */
@@ -531,8 +533,10 @@
#if defined(USE_PAM)
if (options.use_pam) {
do_pam_s...
2002 Oct 21
0
[Bug 419] New: HP-UX PAM problems with 3.5p1
...);
void do_pam_setcred(int init);
void print_pam_messages(void);
int is_pam_password_change_required(void);
diff -u -r openssh-3.5p1/session.c openssh-3.5p1a/session.c
--- openssh-3.5p1/session.c Thu Sep 26 02:38:50 2002
+++ openssh-3.5p1a/session.c Wed Oct 16 15:01:40 2002
@@ -454,7 +454,6 @@
session_proctitle(s);
#if defined(USE_PAM)
- do_pam_session(s->pw->pw_name, NULL);
do_pam_setcred(1);
if (is_pam_password_change_required())
packet_disconnect("Password change required but no "
@@ -581,7 +580,7 @@
ttyfd = s->ttyfd;
#if defined(USE_PAM)
- do_pam_session(s->pw->...
2001 Apr 04
1
Solaris UseLogin problems
...SUN_CODEBASE)
+ AC_DEFINE(LOGIN_NEEDS_UTMPX)
+ AC_DEFINE(LOGIN_NEEDS_TERM)
# hardwire lastlog location (can't detect it on some versions)
conf_lastlog_location="/var/adm/lastlog"
AC_MSG_CHECKING(for obsolete utmp and wtmp in solaris2.x)
Index: session.c
@@ -126,6 +126,7 @@
void session_proctitle(Session *s);
void do_exec_pty(Session *s, const char *command, struct passwd * pw);
void do_exec_no_pty(Session *s, const char *command, struct passwd * pw);
+void call_record_login(Session *s);
void do_login(Session *s, const char *command);
void do_child(Session *s, const char *command);
@@...
2001 Sep 06
1
lastlog on Solaris with PAM (patch included)
...rrect last login times on Solaris with PAM. See comments for details.
diff -ur openssh-2.9p2.dist/session.c openssh-2.9p2/session.c
Index: openssh-2.9p2/session.c
--- openssh-2.9p2.dist/session.c Sat Jun 16 23:40:51 2001
+++ openssh-2.9p2/session.c Thu Sep 6 11:48:04 2001
@@ -456,10 +456,6 @@
session_proctitle(s);
-#if defined(USE_PAM)
- do_pam_setcred(1);
-#endif /* USE_PAM */
-
/* Fork the child. */
if ((pid = fork()) == 0) {
/* Child. Reinitialize the log since the pid has changed. */
@@ -509,6 +505,13 @@
perror("dup2 stderr");
#endif /* USE_PIPES */
+#if defined(USE_PAM)
+...
2002 Jul 16
2
HP-UX PAM with Trusted System patch
..._pam_messages(void);
int is_pam_password_change_required(void);
Only in openssh-3.4p1-dw: auth-pam.h.orig
diff -u -r openssh-3.4p1/session.c openssh-3.4p1-dw/session.c
--- openssh-3.4p1/session.c Wed Jun 26 08:51:06 2002
+++ openssh-3.4p1-dw/session.c Tue Jul 16 07:54:06 2002
@@ -461,7 +461,6 @@
session_proctitle(s);
#if defined(USE_PAM)
- do_pam_session(s->pw->pw_name, NULL);
do_pam_setcred(1);
if (is_pam_password_change_required())
packet_disconnect("Password change required but no "
@@ -579,7 +578,7 @@
ttyfd = s->ttyfd;
#if defined(USE_PAM)
- do_pam_session(s->pw->...
2002 Feb 12
1
SSH Client Hangs after logging in to SSHD
I'm not a ssh expert and I don't know if the log is good or bad, but I too am
running OpenSHH under OpenServer. I find that after I connect, the return key
has no effect unless I first type:
stty sane <Ctrl>j
If you've hit <ENTER> before that you must first press <Ctrl>j a couple of times
to clean out the buffer. After I type the above command, everything
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
...rminate(void);
Index: session.c
===================================================================
RCS file: /cvs/openssh/session.c,v
retrieving revision 1.222
diff -u -u -r1.222 session.c
--- session.c 26 Sep 2002 00:38:50 -0000 1.222
+++ session.c 10 Dec 2002 12:34:13 -0000
@@ -454,7 +454,6 @@
session_proctitle(s);
#if defined(USE_PAM)
- do_pam_session(s->pw->pw_name, NULL);
do_pam_setcred(1);
if (is_pam_password_change_required())
packet_disconnect("Password change required but no "
@@ -581,7 +580,7 @@
ttyfd = s->ttyfd;
#if defined(USE_PAM)
- do_pam_session(s->pw->...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...xt *, const char *realname);
#endif
diff -ru openssh-3.1p1/session.c openssh-3.1p1-mods/session.c
- --- openssh-3.1p1/session.c Thu May 9 12:18:34 2002
+++ openssh-3.1p1-mods/session.c Thu May 9 12:20:03 2002
@@ -98,10 +98,10 @@
static void session_pty_cleanup(void *);
void session_proctitle(Session *);
int session_setup_x11fwd(Session *);
- -void do_exec_pty(Session *, const char *);
+void do_exec_pty(Session *, const char *, const char *realname);
void do_exec_no_pty(Session *, const char *);
- -void do_exec(Session *, const char *);
- -void do_login(Session *, const...
2001 Jul 11
0
Solaris 2.6: Undefined symbol seed_rng
...g 3)
session.c: In function `session_close_by_pid':
session.c:1962: warning: int format, pid_t arg (arg 2)
session.c: In function `session_close_by_channel':
session.c:1986: warning: int format, pid_t arg (arg 3)
session.c:1994: warning: int format, pid_t arg (arg 2)
session.c: In function `session_proctitle':
session.c:2023: warning: implicit declaration of function `setproctitle'
gcc -I/opt/local/zlib-1.1.2/include -Wall -I. -I. -I/home/eedalf/include -I/usr/local/include -DETCDIR=\"/home/eedalf/etc\" -D_PATH_SSH_PROGRAM=\"/home/eedalf/bin/ssh\" -D_PATH_SSH_ASKPASS_DEF...
2001 Jun 18
2
Patch for changing expired passwords
...t;
#endif
+ /* set when password has expired */
+ extern int forced_passwd_change;
+
typedef struct Authctxt Authctxt;
struct Authctxt {
int success;
*** session.c.O Mon Jun 18 14:50:25 2001
--- session.c Mon Jun 18 14:50:29 2001
***************
*** 126,131 ****
--- 126,132 ----
void session_proctitle(Session *s);
void do_exec_pty(Session *s, const char *command);
void do_exec_no_pty(Session *s, const char *command);
+ void do_exec(Session *s, const char *command);
void do_login(Session *s, const char *command);
#ifdef LOGIN_NEEDS_UTMPX
void do_pre_login(Session *s);
***************
*...
2003 Aug 10
9
updated gssapi diff
...ssion.c 10 Aug 2003 14:06:53 -0000 1.1.1.2
+++ session.c 10 Aug 2003 14:25:01 -0000 1.4
@@ -58,6 +58,10 @@
#include "session.h"
#include "monitor_wrap.h"
+#ifdef GSSAPI
+#include "ssh-gss.h"
+#endif
+
/* func */
Session *session_new(void);
@@ -409,6 +413,12 @@
session_proctitle(s);
+#ifdef GSSAPI
+ temporarily_use_uid(s->pw);
+ ssh_gssapi_storecreds();
+ restore_uid();
+#endif
+
/* Fork the child. */
if ((pid = fork()) == 0) {
fatal_remove_all_cleanups();
@@ -517,6 +527,12 @@
ptyfd = s->ptyfd;
ttyfd = s->ttyfd;
+#ifdef GSSAPI
+ temporarily_use_uid(s...