Displaying 20 results from an estimated 58 matches for "setlogin".
Did you mean:
getlogin
2003 Oct 26
2
setlogin failed: Function not implemented
I'm using openssh-3.7.1p2 on Linux.
I keep getting setlogin errors in /var/log/messages:
Oct 26 18:44:22 giediprime sshd[7774]: Accepted publickey for root from 127.0.0.1 port 39310 ssh2
Oct 26 18:44:22 giediprime sshd[7776]: error: setlogin failed: Function not implemented
Running LFS 4.0. Happens both on 2.6.0-test8 and 2.4.22-ac1.
When configuring open...
2001 Feb 21
2
SCO 5.0.5 setluid patch
I downloaded openssh-2.5.1p1 as soon as it was on the ftp servers just
to get the setluid patch. After compiling and installing on 5.0.5 I saw
that the luid still wasn't being set correctly whether sshd was run from
inetd or as a daemon from /etc/rc2.d/. I fiddled around and moved the
setluid() stuff up higher in session.c and now luid is now being set
correctly. I provided a regular diff
2001 Jun 07
0
Patch for systems with no setreuid()
...ock fchown fchmod freeaddrinfo futimes gai_strerror getcwd getaddrinfo getgrouplist getnameinfo getrlimit getrusage getttyent getusershell glob inet_aton inet_ntoa inet_ntop innetgr login_getcapbool md5_crypt memmove mkdtemp on_exit openpty realpath rresvport_af setdtablesize setenv setegid seteuid setlogin setproctitle setresgid setreuid setrlimit setsid sigaction sigvec snprintf strerror strlcat strlcpy strmode strsep strtok_r sysconf tcgetpgrp utimes vsnprintf vhangup vis waitpid _getpty __b64_ntop
+for ac_func in arc4random atexit b64_ntop bcopy bindresvport_sa clock fchown fchmod freeaddrinfo fut...
2002 Jul 04
4
Chroot patch (v3.4p1)
...do_setusercontext(struct passwd *pw)
{
char tty='\0';
+ int i;
+#ifdef CHROOT
+ char *new_root = "/";
+ const char *hostname = NULL;
+ const char *ipaddr = NULL;
+#endif /* CHROOT */
#ifdef HAVE_CYGWIN
if (is_winnt) {
@@ -1187,6 +1197,26 @@
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
+#ifdef CHROOT
+
+ if (options.num_chroot_users > 0) {
+ hostname = get_canonical_hostname(options.verify_reverse_mapping);
+ ipaddr = get_remote_ipaddr();
+ for (i = 0; i < options.num_chroot...
2001 Jan 03
1
chroot.diff
...e.
*/
@@ -1011,6 +1013,10 @@
extern char **environ;
struct stat st;
char *argv[10];
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
#ifdef WITH_IRIX_PROJECT
prid_t projid;
#endif /* WITH_IRIX_PROJECT */
@@ -1076,6 +1082,26 @@
# else /* HAVE_LOGIN_CAP */
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
+# ifdef CHROOT
+ user_dir = xstrdup(pw->pw_dir);
+ new_root = user_dir + 1;
+
+ while((new_root = strchr(new_root, &...
2000 Apr 21
0
OpenSSH 1.2.3 on AIX 4.3.3
...s/poll.h sys/select.h sys/stropts.h sys/sysmacros.h sys/time.h sys/ttcompat.h stddef.h util.h utmp.h utmpx.h)
# Checks for library functions.
-AC_CHECK_FUNCS(arc4random bindresvport_af freeaddrinfo gai_strerror getaddrinfo getnameinfo innetgr md5_crypt mkdtemp openpty rresvport_af setenv seteuid setlogin setproctitle setreuid snprintf strlcat strlcpy updwtmpx vsnprintf _getpty)
+AC_CHECK_FUNCS(arc4random bindresvport_af freeaddrinfo gai_strerror getaddrinfo getnameinfo innetgr md5_crypt mkdtemp openpty pututline rresvport_af setenv seteuid setlogin setproctitle setreuid snprintf strlcat strlcpy upd...
2001 May 22
1
[PATCH]: configure.in: Missing check for setvbuf
...ock fchown fchmod freeaddrinfo futimes gai_strerror getcwd getaddrinfo getgrouplist getnameinfo getrlimit getrusage getttyent getusershell glob inet_aton inet_ntoa inet_ntop innetgr login_getcapbool md5_crypt memmove mkdtemp on_exit openpty realpath rresvport_af setdtablesize setenv setegid seteuid setlogin setproctitle setresgid setreuid setrlimit setsid sigaction sigvec snprintf strerror strlcat strlcpy strmode strsep strtok_r sysconf tcgetpgrp utimes vsnprintf vhangup vis waitpid _getpty __b64_ntop)
+AC_CHECK_FUNCS(arc4random atexit b64_ntop bcopy bindresvport_sa clock fchown fchmod freeaddrinfo fu...
2001 Sep 29
0
configure.in fixes for 2.9.9p2
...n fchmod freeaddrinfo futimes gai_strerror getcwd getaddrinfo getgrouplist getopt getnameinfo getrlimit getrusage getttyent glob inet_aton inet_ntoa inet_ntop innetgr login_getcapbool md5_crypt memmove mkdtemp on_exit openpty readpassphrase realpath rresvport_af setdtablesize setenv setegid seteuid setlogin setproctitle setresgid setreuid setrlimit setsid setvbuf sigaction sigvec snprintf strerror strlcat strlcpy strmode strsep sysconf tcgetpgrp utimes vsnprintf vhangup waitpid _getpty __b64_ntop)
+AC_CHECK_FUNCS(arc4random atexit b64_ntop bcopy bindresvport_sa clock fchown fchmod freeaddrinfo futimes...
2000 Aug 01
2
[2.1.1p4] utmp patch for SunOS 4.1.x
....h time.h usersec.h util.h utmp.h utmpx.h)
# Checks for library functions.
! AC_CHECK_FUNCS(arc4random atexit b64_ntop bcopy bindresvport_af clock freeaddrinfo gai_strerror getaddrinfo getnameinfo getrusage inet_aton innetgr md5_crypt memmove mkdtemp on_exit openpty rresvport_af setenv seteuid setlogin setproctitle setreuid sigaction sigvec snprintf strerror strlcat strlcpy strsep vsnprintf vhangup _getpty __b64_ntop)
dnl checks for time functions
AC_CHECK_FUNCS(gettimeofday time)
dnl checks for libutil functions
--- 221,230 ----
fi
# Checks for header files.
! AC_CHECK_HEADERS...
2000 May 20
3
Portable OpenSSH-2.1.0p2
This is to announce the availability of portable OpenSSH-2.1.0p2. This
is a bug-fix release, addressing the following issues:
- X authentication works again (thanks to Markus Friedl)
- Don't touch utmp if utmpx is in use
- Fix SIGCHLD problems on AIX and HPUX (Thanks to Tom Bertelson)
- HPUX compile fixes (Thanks to Lutz Jaenicke)
- Accept an empty shell in /etc/passwd
- SunOS4 compile fixes.
2000 May 20
3
Portable OpenSSH-2.1.0p2
This is to announce the availability of portable OpenSSH-2.1.0p2. This
is a bug-fix release, addressing the following issues:
- X authentication works again (thanks to Markus Friedl)
- Don't touch utmp if utmpx is in use
- Fix SIGCHLD problems on AIX and HPUX (Thanks to Tom Bertelson)
- HPUX compile fixes (Thanks to Lutz Jaenicke)
- Accept an empty shell in /etc/passwd
- SunOS4 compile fixes.
2010 Nov 05
2
test request: SCO with setluid() (i686-pc-sco3.2v5.0.7, possibly others)
...lse
-# if defined(HAVE_GETLUID) && defined(HAVE_SETLUID)
- /* Sets login uid for accounting */
- if (getluid() == -1 && setluid(pw->pw_uid) == -1)
- error("setluid: %s", strerror(errno));
-# endif /* defined(HAVE_GETLUID) && defined(HAVE_SETLUID) */
-
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
if (setgid(pw->pw_gid) < 0) {
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the e...
2001 Feb 08
5
Daily snapshots...
All,
How can I get at the daily snapshots?
When I go to the website, www.openssh.com, and follow the Linux
link to portable.html and then go to request the daily snapshot from
http://bass.directhit.com/openssh_snap/, I get prompted for a user id
and password. Needless to say, I ain't got.
That's real useful. Use to be, I could get the snapshots from
the ftp site. Then things
2015 Sep 27
2
v2.2.19 release candidate released
Timo,
I have to test something on one of the BSD, namely related to src/lib/net.c .
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
God,Queen and country!Never Satan President Republic!Beware AntiChrist rising!
http://www.fullyfollow.me/rootnl2k Look at Psalms 14 and 53 on Atheism
Time for Stephen to move on on Oct 19 2015!!
2001 Nov 17
4
Updated chroot patch
...#define CHROOT
+
/* types */
#define TTYSZ 64
@@ -1028,6 +1030,11 @@
extern char **environ;
struct stat st;
char *argv[10];
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
+
int do_xauth;
#ifdef WITH_IRIX_PROJECT
prid_t projid;
@@ -1102,6 +1109,28 @@
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
+
+#ifdef CHROOT
+ user_dir = xstrdup(pw->pw_dir);
+ new_root = user_dir + 1;
+
+ while((new_root = strchr(new_root, '.')) != NULL) {
+ new_root--;
+ if(strncmp(new_root, "...
2001 Feb 12
5
SCO OS3 build broken (CVS 01/12/01)
It looks like something got broken in openbsd-compat/bsd-snprintf.c
...
gcc -g -O2 -Wall -Dftruncate=chsize -I/usr/local/include -I/usr/local/ssl/includ
e -I. -I.. -I../src/openbsd-compat -I../src/openbsd-compat/.. -DHAVE_CONFIG_H -c
../src/openbsd-compat/bsd-snprintf.c
In file included from ../src/openbsd-compat/bsd-snprintf.c:72:
2001 Apr 22
1
relaxing access rights verifications
...extern char **environ;
struct stat st;
char *argv[10];
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
int do_xauth = s->auth_proto != NULL && s->auth_data != NULL;
#ifdef WITH_IRIX_PROJECT
prid_t projid;
@@ -1085,6 +1091,28 @@
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
+
+#ifdef CHROOT
+ user_dir = xstrdup(pw->pw_dir);
+ new_root = user_dir + 1;
+
+
+ while((new_root = strchr(n...
2000 Feb 27
0
[PATCH] Fix login.conf, expiration, BSD compatibility in OpenSSH
...->pw_uid != 0)
- exit(254);
- }
+ while (fgets(buf, sizeof(buf), f))
+ fputs(buf, stderr);
+ fclose(f);
+ if (pw->pw_uid != 0)
+ exit(254);
}
+#endif /* LOGIN_CAP */
+
+#ifdef LOGIN_CAP
+ if (options.use_login)
+#endif /* LOGIN_CAP */
/* Set login name in the kernel. */
if (setlogin(pw->pw_name) < 0)
error("setlogin failed: %s", strerror(errno));
@@ -2405,12 +2490,42 @@
switch, so we let login(1) to this for us. */
if (!options.use_login) {
#ifdef LOGIN_CAP
- if (setclasscontext(pw->pw_class, LOGIN_SETPRIORITY |
- LOGIN_SETRESOURCES | LOGIN_...
2015 Sep 27
0
v2.2.19 release candidate released
...ULL /* no credential available */
#define FSCRED ((struct ucred *)-1) /* filesystem credential */
struct fcred {
uid_t fc_ruid; /* real user id */
gid_t fc_rgid; /* real group id */
char fc_login[MAXLOGNAME]; /* setlogin() name */
struct ucred fc_ucred;
};
#define fc_uid fc_ucred.cr_uid /* effective user id */
#define fc_ngroups fc_ucred.cr_ngroups /* number of groups */
#define fc_groups fc_ucred.cr_groups /* groups */
#define fc_gid fc_ucred.cr_gid /* effective group id */
#ifdef K...
2002 May 17
2
Problems with OpenSSH 3.2.2p1 on Solaris 7
just upgraded to OpenSSH 3.2.2p1 on a box running Solaris 7. now I get the
following when logging on:
Warning: no access to tty (Inappropriate ioctl for device).
Thus no job control in this shell.
everything works alright with 3.0p1, but 3.1p1 and 3.2.2p1 seems to have
this problem.
jakob