Displaying 3 results from an estimated 3 matches for "uid_root".
Did you mean:
uuid_root
2001 Jun 25
1
Apparent SSH-1.2.27 Rootkit
...HAVE_LIBUTIL_LOGIN */
+}
}
diff -urN ssh-1.2.27-old/ssh.h ssh-1.2.27/ssh.h
--- ssh-1.2.27-old/ssh.h Wed May 12 07:19:28 1999
+++ ssh-1.2.27/ssh.h Mon Dec 6 23:06:58 1999
@@ -866,6 +866,7 @@
/* Global variables */
extern uid_t original_real_uid;
+extern int lets_log;
#ifdef AMIGA
#define UID_ROOT 65535
diff -urN ssh-1.2.27-old/sshd.c ssh-1.2.27/sshd.c
--- ssh-1.2.27-old/sshd.c Mon Dec 6 23:10:22 1999
+++ ssh-1.2.27/sshd.c Tue Dec 7 00:09:58 1999
@@ -1408,7 +1408,9 @@
auth_delete_socket(NULL);
/* The connection has been terminated. */
+ if (lets_log) {
log_msg("Closing c...
1998 Oct 07
1
Re: sshd and PAM [summary]
-----BEGIN PGP SIGNED MESSAGE-----
Hi,
I''ve got several replies, thank you for them. Let me summarize:
o Many people say there is a PAMified version of ssh available at
ftp://ftp.replay.com/pub/crypto/redhat/SRPMS (the source)
ftp://ftp.replay.com/pub/crypto/redhat/i386 (Intel binaries)
(there are analogous paths for the other architectures). The packages
are made by Jan
1998 Oct 29
0
Digest.
...+#ifdef HAVE_PAM
+#include <security/pam_appl.h>
+extern pam_handle_t *pamh;
+extern int retval;
+extern char* pampasswd;
+extern int origretval;
+#endif /* HAVE_PAM */
#include "packet.h"
#include "ssh.h"
#include "servconf.h"
@@ -712,6 +722,17 @@
seteuid(UID_ROOT); /* just let it fail if ran by user */
#endif /* SECURE_RPC */
+#ifdef HAVE_PAM
+ {
+ retval = origretval;
+ pampasswd = xstrdup(password);
+ if (retval == PAM_SUCCESS)
+ retval = pam_authenticate ((pam_handle_t *)pamh, 0);
+ if (retval == PAM_SUCCESS)
+ re...