Displaying 20 results from an estimated 23 matches for "utmp_len".
Did you mean:
tmp_len
2002 Apr 10
1
openssh-3.1p1 on GNU/Hurd
...(LD) -o $@ ssh-keyscan.o $(LDFLAGS) -lssh -lopenbsd-compat -lssh $(LIBS)
diff -urN openssh-3.1p1.old/canohost.c openssh-3.1p1/canohost.c
--- openssh-3.1p1.old/canohost.c Mon Mar 4 20:31:29 2002
+++ openssh-3.1p1/canohost.c Tue Apr 9 21:05:15 2002
@@ -284,9 +284,11 @@
get_remote_name_or_ip(u_int utmp_len, int verify_reverse_mapping)
{
static const char *remote = "";
- if (utmp_len > 0)
+ /* Assume that if utmp_len = -1 then there is no limit on the
+ hostname length */
+ if (utmp_len > 0 || utmp_len == -1)
remote = get_canonical_hostname(verify_reverse_mapping);
- if (utmp_len...
2008 Sep 24
0
utmp_len
In sshd.c:
/* record remote hostname or ip */
u_int utmp_len = MAXHOSTNAMELEN;
However, HOSTNAMELEN is almost certainly too long. Is there a reason
not to use UT_HOSTSIZE instead, as below?
Index: sshd.c
===================================================================
--- sshd.c (revision 182719)
+++ sshd.c (working copy)
@@ -72,6 +72,7 @@...
2000 Dec 27
1
patch to support hurd-i386.
...switch (opt) {
diff -Nur openssh-2.2.0p1-/sshd.c openssh-2.2.0p1/sshd.c
--- openssh-2.2.0p1-/sshd.c Tue Aug 29 02:05:50 2000
+++ openssh-2.2.0p1/sshd.c Sun Oct 29 16:44:50 2000
@@ -140,7 +140,7 @@
int session_id2_len = 0;
/* record remote hostname or ip */
-unsigned int utmp_len = MAXHOSTNAMELEN;
+unsigned int utmp_len = 256; /* bigger than LI_HOSTSIZE makes no sense */
/* Prototypes for various functions defined later in this file. */
void do_ssh1_kex();
--
Debian Developer and Quality Assurance Team Member
1024/26CC7853 31E6 A8CA 68FC 284F 7D16 63EC...
2001 Aug 07
1
do_pre_login() used before declared
...ct sockaddr *) & from, &fromlen) < 0) {
+ debug("getpeername: %.100s", strerror(errno));
+ fatal_cleanup();
+ }
+ }
+
+ record_utmp_only(pid, s->tty, s->pw->pw_name,
+ get_remote_name_or_ip(utmp_len, options.reverse_mapping_check),
+ (struct sockaddr *)&from);
+}
+#endif
+
/*
* This is called to fork and execute a command when we have no tty. This
* will call do_child from the child, and server_loop from the parent after
@@ -621,34 +649,6 @@
/* server_loop _...
2002 Mar 24
1
FreeBSD 4.x
..._ttyok(lc, s->tty)) {
(void)printf("Permission denied.\n");
log(
"LOGIN %.200s REFUSED (TTY) FROM %.200s ON TTY %.200s",
pw->pw_name, get_remote_name_or_ip(utmp_len,
options.verify_reverse_mapping), s->tty);
exit(254);
}
#endif /* HAVE_LOGIN_CAP */
2003 Apr 26
10
[Bug 549] Login Delay / Remove unwanted reverse map check
http://bugzilla.mindrot.org/show_bug.cgi?id=549
Summary: Login Delay / Remove unwanted reverse map check
Product: Portable OpenSSH
Version: 3.5p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2006 Jan 08
3
Allow --without-privsep build.
...itor.c~ 2005-07-17 08:53:31.000000000 +0100
+++ openssh-4.2p1/monitor.c 2006-01-07 18:40:42.000000000 +0000
@@ -69,6 +69,8 @@ RCSID("$OpenBSD: monitor.c,v 1.63 2005/0
static Gssctxt *gsscontext = NULL;
#endif
+#ifdef USE_PRIVSEP
+
/* Imports */
extern ServerOptions options;
extern u_int utmp_len;
@@ -1916,3 +1918,5 @@ mm_answer_gss_userok(int sock, Buffer *m
return (authenticated);
}
#endif /* GSSAPI */
+
+#endif /* USE_PRIVSEP */
--- openssh-4.2p1/monitor_mm.c~ 2004-10-06 14:15:44.000000000 +0100
+++ openssh-4.2p1/monitor_mm.c 2006-01-07 18:39:36.000000000 +0000
@@ -35,6 +35,8 @@ RCSI...
2001 Sep 28
0
openssh-2.9.9p2 session.c uses two undeclared void functions
...oid do_exec_pty(Session *, const char *);
+#ifdef LOGIN_NEEDS_UTMPX
+static void do_pre_login(Session *s);
+#endif
void do_exec_no_pty(Session *, const char *);
void do_exec(Session *, const char *);
void do_login(Session *, const char *);
@@ -147,6 +150,7 @@ extern int debug_flag;
extern u_int utmp_len;
extern int startup_pipe;
extern void destroy_sensitive_data(void);
+extern void record_utmp_only(pid_t, const char *, const char *, const char *, struct sockaddr *);
/* original command from peer. */
const char *original_command = NULL;
2002 Jan 30
0
[Bug 87] New: Last logon that gets reported upon login is the current login time
..._time = get_last_login_time(pw->pw_uid, pw->pw_name,
- hostname, sizeof(hostname));
- }
-
/* Record that there was a login on that tty from the remote host. */
record_login(pid, s->tty, pw->pw_name, pw->pw_uid,
get_remote_name_or_ip(utmp_len, options.reverse_mapping_check),
@@ -741,14 +738,14 @@
printf("%s\n", aixloginmsg);
#endif /* WITH_AIXAUTHENTICATE */
- if (options.print_lastlog && last_login_time != 0) {
- time_string = ctime(&last_login_time);
+ if (options.prin...
2002 Nov 24
1
[PATCH] PamServiceNameAppend
...======
RCS file: /cvs/openssh/auth-pam.c,v
retrieving revision 1.54
diff -u -w -u -w -b -p -r1.54 auth-pam.c
--- auth-pam.c 28 Jul 2002 20:24:08 -0000 1.54
+++ auth-pam.c 24 Nov 2002 18:43:41 -0000
@@ -378,10 +378,13 @@ void start_pam(const char *user)
extern ServerOptions options;
extern u_int utmp_len;
const char *rhost;
+ char buf[1024];
debug("Starting up PAM with username \"%.200s\"", user);
- pam_retval = pam_start(SSHD_PAM_SERVICE, user, &conv, &__pamh);
+ strlcpy(buf, SSHD_PAM_SERVICE, sizeof(buf));
+ strlcat(buf, options.pam_service_name_append, sizeof(...
2003 Oct 29
4
Fix for USE_POSIX_THREADS in auth-pam.c
...ic (possibly) and update state */
+ if (!sshpam_handle_lock_count && sshpam_handle_lock_ready) {
+ sshpam_handle_lock_ready = 0;
+ pthread_mutexattr_destroy(&lock_attr);
+ pthread_mutex_destroy(&sshpam_handle_lock);
+ }
+#endif
}
static int
@@ -296,30 +370,53 @@
extern u_int utmp_len;
extern char *__progname;
const char *pam_rhost, *pam_user;
+ pam_handle_t *sshpam_handle_holder;
+
+#ifdef USE_POSIX_THREADS
+ /* (Re)initialize our pthread structures if it's safe to do so. Only
+ * free them if they were previously initialized and they aren't
+ * currently in use....
2003 Jul 05
0
[PATCH] Replace AIX loginmsg with generic Buffer loginmsg
...===========================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/session.c,v
retrieving revision 1.238
diff -u -r1.238 session.c
--- session.c 3 Jun 2003 00:25:48 -0000 1.238
+++ session.c 5 Jul 2003 02:21:49 -0000
@@ -95,6 +95,7 @@
extern u_int utmp_len;
extern int startup_pipe;
extern void destroy_sensitive_data(void);
+extern Buffer loginmsg;
/* original command from peer. */
const char *original_command = NULL;
@@ -103,10 +104,6 @@
#define MAX_SESSIONS 10
Session sessions[MAX_SESSIONS];
-#ifdef WITH_AIXAUTHENTICATE
-char *aixloginmsg;...
2004 Jun 01
1
Sending immediate PAM auth failure messages via kbd-int
Hi.
One thing that people seem to want to do with PAM is to deny a login
immediately without interacting but return a message to the user. (Some
platforms implement, eg, /etc/nologin via PAM this way.) Currently, sshd
will just deny the login and the user will not be told why.
Attached it a patch that return a keyboard-interactive packet with the
message in the "instruction"
2001 Apr 29
2
PATCH: UseLogin fix for 2.9p1 (w/improved last-login time)
...eof(from);
+ if (getpeername(packet_get_connection_in(),
+ (struct sockaddr *) & from, &fromlen) < 0) {
+ debug("getpeername: %.100s", strerror(errno));
+ fatal_cleanup();
+ }
+ }
+
+ record_utmp_only(pid, s->tty, s->pw->pw_name,
+ get_remote_name_or_ip(utmp_len, options.reverse_mapping_check),
+ (struct sockaddr *)&from);
+}
+#endif
+
/* administrative, login(1)-like work */
void
do_login(Session *s, const char *command)
@@ -1511,6 +1546,9 @@
/* Launch login(1). */
execl(LOGIN_PROGRAM, "login", "-h", hostname,
+#if...
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
...===========================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/session.c,v
retrieving revision 1.241
diff -u -r1.241 session.c
--- session.c 8 Jul 2003 12:59:59 -0000 1.241
+++ session.c 9 Jul 2003 02:02:53 -0000
@@ -95,7 +95,9 @@
extern u_int utmp_len;
extern int startup_pipe;
extern void destroy_sensitive_data(void);
+extern int password_change_required;
extern Buffer loginmsg;
+extern Buffer expiremsg;
/* original command from peer. */
const char *original_command = NULL;
@@ -461,6 +463,9 @@
"TTY available");
}
#end...
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
...===========================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/session.c,v
retrieving revision 1.241
diff -u -r1.241 session.c
--- session.c 8 Jul 2003 12:59:59 -0000 1.241
+++ session.c 9 Jul 2003 02:02:53 -0000
@@ -95,7 +95,9 @@
extern u_int utmp_len;
extern int startup_pipe;
extern void destroy_sensitive_data(void);
+extern int password_change_required;
extern Buffer loginmsg;
+extern Buffer expiremsg;
/* original command from peer. */
const char *original_command = NULL;
@@ -461,6 +463,9 @@
"TTY available");
}
#end...
2003 Oct 28
2
Privilege separation
...session.c Sat Oct 4 23:36:50 2003
@@ -692,7 +692,9 @@
}
/* Record that there was a login on that tty from the remote host. */
+#ifndef DISABLE_PRIVSEP
if (!use_privsep)
+#endif /* DISABLE_PRIVSEP */
record_login(pid, s->tty, pw->pw_name, pw->pw_uid,
get_remote_name_or_ip(utmp_len,
options.use_dns),
@@ -1668,7 +1670,9 @@
* time in case we call fatal() (e.g., the connection gets closed).
*/
fatal_add_cleanup(session_pty_cleanup, (void *)s);
+#ifndef DISABLE_PRIVSEP
if (!use_privsep)
+#endif /* DISABLE_PRIVSEP */
pty_setowner(s->pw, s->tty);
/* Se...
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up
a tunnel using ssh, e.g.:
ssh -f -o Tunnel=ethernet <server_ip> true
I was wondering if there's a way to subsequently acquire the names
of the local and remote tun/tap interfaces (e.g., using the default
"-w any:any") for subsequent automatic tunnel configuration, e.g.:
ip link set $TapDev up
ip link set
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...command, const char *realname)
{
char *time_string;
char hostname[MAXHOSTNAMELEN];
@@ -690,7 +690,7 @@
/* Record that there was a login on that tty from the remote
host. */
record_login(pid, s->tty, pw->pw_name, pw->pw_uid,
get_remote_name_or_ip(utmp_len,
options.verify_reverse_mapping),
- - (struct sockaddr *)&from);
+ (struct sockaddr *)&from, realname);
#ifdef USE_PAM
/*
@@ -1509,7 +1509,7 @@
}
static int
- -session_subsystem_req(Session *s)
+session_subsystem_req(Session *s, const char *realname)
{...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the