Displaying 10 results from an estimated 10 matches for "sp_inact".
2000 Jul 02
1
A error in auth.c of openssh-2.1.1p2 port on systems with a mixture of shadowed and non-shadowed passwords and Japanese Translations.
Hi.
I have found a error of
openssh-2.1.1p2 port on systems
with a mixture of shadowed and non-shadowed passwords.
I reported a same type of error to Mr. Miller
when openssh-1.2.1pre23 was released.
On our systems,
our local machines have shadowed /etc/passwd (and /etc/shadow)
and our NIS server distributes non-shadowed password
of general users.
We have to use
2000 Sep 02
1
A bug in openssh-2.2.0-p1
...o PAM
is installed/used. It uses MD5 passwords and shadow with account expiration feature.
In handling of the latter, a probable bug was found. In auth.c, allowed_user(), there is a
code at the line 73, saying
...
/* Check password expiry */
if ((spw->sp_lstchg > 0) && (spw->sp_inact > 0) &&
(days > (spw->sp_lstchg + spw->sp_inact)))
return 0;
}
...
In my opinion, this is wrong. sp_inact tells how long the account may remain inactive until it is
locked, measured from the last login time. It is set to 30 days for all users on my system.
To add the dat...
2002 Apr 26
1
expire checks
i'm working on this. this is what i have now. sp_inact is not handled
consistently across shadow platforms, so i'm going to not address that
right now. the following is the predecessor to bug14.
what is the timeframe for 3.2.1p1? markus suggested a few more weeks.
Index: auth.c
===================================================================...
1998 Oct 07
1
Re: sshd and PAM [summary]
-----BEGIN PGP SIGNED MESSAGE-----
Hi,
I''ve got several replies, thank you for them. Let me summarize:
o Many people say there is a PAMified version of ssh available at
ftp://ftp.replay.com/pub/crypto/redhat/SRPMS (the source)
ftp://ftp.replay.com/pub/crypto/redhat/i386 (Intel binaries)
(there are analogous paths for the other architectures). The packages
are made by Jan
2012 Jan 03
3
Passwords apparently stopped working.
I encountered a couple of strange events with respect to
password authentication this morning. Two of our staff
were unable to login onto several systems using their
usual passwords. Both users had last logged in on these
hosts using their accounts and passwords on Friday past.
The two accounts could not log on to any of the servers
for which they had access and the message log on each
showed
1998 Oct 29
0
Digest.
...ure from Steve Kann
* <stevek@SteveK.COM>.
*
+ * Revision 1.42a 1997/06/06 18:40:00 jonchen
+ * Added support for PAM
+ *
* Revision 1.42 1997/04/23 00:05:35 kivinen
* Added ifdefs around password expiration and inactivity checks,
* because some systems dont have sp_expire and sp_inact fields.
@@ -525,6 +528,14 @@
char *ticket = "none\0";
#endif /* KERBEROS */
+#ifdef HAVE_PAM
+#include <security/pam_appl.h>
+struct pam_handle_t *pamh=NULL;
+char *pampasswd=NULL;
+int retval;
+int origretval;
+#endif /* HAVE_PAM */
+
/* Server configuration options. */
Serve...
2002 Jan 29
21
locked account accessable via pubkey auth
maybe this is a silly question ;-) But why is it possible to login on a
machine with a locked account (passwd -l ) via pubkey-authentication
(authorized_keys) ?
I use OpenSSH3.01p1on Solaris8 with PAM support so I thought this should not
happen.
If this is the normal behaviour and built in intentionally what would be the
easiest way to lock an account without deleting the users authorized_keys ?
2001 Jul 16
0
No subject
....h> specified in #include directive. (noinclfile)
#include <shadow.h>
-^
configure: failed program was:
#line 7970 "configure"
#include "confdefs.h"
#include <sys/types.h>
#include <shadow.h>
struct spwd sp;
int main() {
sp.sp_expire = sp.sp_lstchg = sp.sp_inact = 0;
; return 0; }
configure:8080: cc -o conftest -g -I/usr/local/ssl/include -L/usr/local/ssl/lib conftest.c -lz -lsecurity -ldb -lm -laud -lutil -lcrypto 1>&5
configure:8137: checking if we need to convert IPv4 in IPv6-mapped addresses
configure:8189: checking whether to install ssh a...
2000 Aug 26
0
New chroot patch, for 2.1.1p4
...hecking if the systems has expire shadow information" >&5
cat > conftest.$ac_ext <<EOF
-#line 5721 "configure"
+#line 5741 "configure"
#include "confdefs.h"
#include <sys/types.h>
@@ -5728,7 +5748,7 @@
sp.sp_expire = sp.sp_lstchg = sp.sp_inact = 0;
; return 0; }
EOF
-if { (eval echo configure:5732: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
+if { (eval echo configure:5752: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
rm -rf conftest*
sp_expire_available=yes...
2000 Oct 04
0
2.2.0p1 chroot patch
...hecking if the systems has expire shadow information" >&5
cat > conftest.$ac_ext <<EOF
-#line 5938 "configure"
+#line 5958 "configure"
#include "confdefs.h"
#include <sys/types.h>
@@ -5945,7 +5965,7 @@
sp.sp_expire = sp.sp_lstchg = sp.sp_inact = 0;
; return 0; }
EOF
-if { (eval echo configure:5949: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
+if { (eval echo configure:5969: \"$ac_compile\") 1>&5; (eval $ac_compile) 2>&5; }; then
rm -rf conftest*
sp_expire_available=yes...