Displaying 20 results from an estimated 800 matches similar to: "Patches to report rsaref build and to call pam_setcred"
2000 Sep 13
2
auth-pam.c support for pam_chauthtok()
When we installed OpenSSH 2.1.1p4 on our Solaris systems, our users
noticed that it did not honor password expiration consistently with
other Solaris login services.
The patch below is against OpenSSH 2.2.0p1 and adds support for PAM
password changes on expiration via pam_chauthtok(). A brief summary of
changes:
auth-pam.c:
* change declaration of pamh to "static pam_handle_t *pamh",
1999 Nov 22
1
[s-x86] OpenSSH 1.2pre14 fails on pam_open_session() ...
On Mon, 22 Nov 1999, Philip Brown wrote:
> [ Marc G. Fournier writes ]
> > debug("PAM_retval(open_session) about to run");
> > pam_retval = pam_open_session((pam_handle_t *)pamh, 0);
>
> >
> > ===========================================
> >
> > so, its looking like I'm authenticated properly, but when trying to set up
> > the
2000 Oct 11
1
Expired passwords & PAM
Currently, OpenSSH prints the message:
"Warning: You password has expired, please change it now"
if the password has expired. It would be nice if the user could/had to
change password before continuing, like with Linux console login. I've
tried to make an patch, but it doesn't work. Ideas?
--- auth-pam.c.org Wed Oct 11 18:03:43 2000
+++ auth-pam.c Wed Oct 11 18:03:44
1999 Nov 22
0
OpenSSH 1.2pre14 fails on pam_open_session() ...
Anyone out there know more about PAM under Solaris 7/x86 then I do, that
can maybe tackle this, and/or suggestion a route to take to fix?
After doing some debugging, it looks like the problem is a seg fault at:
sshd.c:void pam_cleanup_proc(void *context)
===========================================
debug("PAM_retval(open_session) about to run");
pam_retval =
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
Hello,
appended is a patch that makes it possible to use PAM both for
password authentication and TIS (i.e. s/key or opie or any other
interactive challenge/response scheme). I have developed this starting
from the patch at http://www.debian.org/Bugs/db/61/61906.html on
Debian with openssh-2.1.1p4-3. After configuring ssh with
--with-pam-tis, there are two PAM services, "sshd" and
2002 Oct 21
0
[Bug 419] New: HP-UX PAM problems with 3.5p1
http://bugzilla.mindrot.org/show_bug.cgi?id=419
Summary: HP-UX PAM problems with 3.5p1
Product: Portable OpenSSH
Version: -current
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2002 Jul 16
2
HP-UX PAM with Trusted System patch
I'm fairly new to the list and new to submitting patches. Can someone
please verify the attached patch for running a HP-UX Trusted System with
PAM and OpenSSH 3.4p1? The problem seemed to be that pam couldn't verify
the user via __pamh after the call to permanently_set_uid in session.c.
So I called do_pam_session prior to the call and added a function
do_pam_set_tty in order to set the
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
Hi All.
Attached is a patch that implements password expiry with PAM and
privsep. It works by passing a descriptor to the tty to the monitor,
which sets up a child with that tty as stdin/stdout/stderr, then runs
chauthtok(). No setuid helpers.
I used some parts of Michael Steffens' patch (bugid #423) to make it
work on HP-UX.
It's still rough but it works. Tested on Solaris 8 and
2000 Mar 17
2
Problem with 1.2.3pre4 and RSAref
The following code snippet will not compile support for RSAref on NetBSD even
if it exists on the system (which breaks OpenSSL):
for WANTS_RSAREF in "" 1 ; do
if test -z "$WANTS_RSAREF" ; then
LIBS="$saved_LIBS -lcrypto"
else
LIBS="$saved_LIBS -lcrypto -lRSAglue
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
Hello All.
Attached is an update to my previous patch to make do_pam_chauthtok and
privsep play nicely together.
First, a question: does anybody care about these or the password
expiration patches?
Anyway, the "PRIVSEP(do_pam_hauthtok())" has been moved to just after
the pty has been allocated but before it's made the controlling tty.
This allows the child running chauthtok to
2000 May 31
0
openssh 2.1.0p3 w/ rsaref
Looks like the fixes to use OpenSSL with RSAnull break it for rsaref. I've
attached a patch that fixes it for me.
Cheers,
Nalin
-------------- next part --------------
--- openssh-2.1.0p3/configure.in Wed May 31 08:56:52 2000
+++ openssh-2.1.0p3/configure.in Wed May 31 09:03:49 2000
@@ -231,7 +231,27 @@
[
found_crypto=1
break;
- ], []
+ ],
+ [
+ LIBS="$saved_LIBS
2002 Jun 26
3
pam session as root
Beyond any more general questions of whether pam sessions *should* be
run as root, is there an immediate security concern with moving the
pam_open_session (and pam_setcred) stuff to the parent (root) process?
(E.g., via the patch below.)
--
Mike Stone
diff -u -r1.4 auth-pam.c
--- auth-pam.c 25 Jun 2002 00:45:33 -0000 1.4
+++ auth-pam.c 25 Jun 2002 20:33:41 -0000
@@ -286,6 +286,8 @@
2001 Aug 28
1
OpenSSHd barfs upon reauthentication: PAM, Solaris 8
We've been having trouble with OpenSSH 2.9p2, running on Solaris 8
(a domain of an E10k), with PAM authentication turned on. It
intermittently crashes with signal 11 (seg fault) after the password
is entered, after the MOTD is displayed, but before control is passed
over to the login shell. I eventually managed to persuade sshd's child
process to consistently crash, upon entry of an
2001 Feb 10
1
[PATCH] Tell PAM about remote host earlier
I was browsing the OpenSSH sources (which are very readable, thankyou
very much) and noticed that PAM was only being told what host the user
is logging in from for account processing - not for password
processing. As I can see no reason not to put this in start_pam this is
exactly what I have done - and attached a patch to this effect.
This allows PAM to fill in rhost= in its audit messages
2000 May 14
0
OpenSSH 2.1.0+OpenSSL 0.9.5a+RSAref 2.0 trouble
Hello.
I have been having trouble configuring the source code for the
abovementioned. I have to use RSARef as I'm a resident of the USA, so I
can avoid patent violation.
The configure script fails to see the OpenSSL+RSAref mix on three
different platforms, including the following:
FreeBSD 4.0-STABLE (Which has its own port, but I wanted to try it there
to see if I could reliably reproduce
2000 Mar 13
2
rsaref test
Is it true that configure tests for the existence of librsaref.a, and
if it finds it, it assumes that that rsaref is supposed to be used---*even
if openssl was not built with rsaref support* ?
Mate
2000 Jul 14
2
Still a problem with openssh and rsaref
I have openssl linked against rsaref and rsaref libraries are in my path
but for some reason openssh now fails on SSLeay / OpenSSL tests.
checking for OpenSSL directory... configure: error: Could not find working SSLeay / OpenSSL libraries, please install
and config.log shows:
configure:2795: gcc -o conftest -g -O2 -Wall -I/opt/openssl/include
-L/opt/openssl/lib -L/opt/openssl conftest.c -ldl
2004 May 18
2
pam_setcred fails for "USE_POSIX_THREADS + non-root users + PrivSep yes"
Hello,
We use USE_POSIX_THREADS in our HP-UX build of OpenSSH. When we connect a
non-root user with PAM [pam-kerberos] then I get the following error.
debug3: PAM: opening session
debug1: PAM: reinitializing credentials
PAM: pam_setcred(): Failure setting user credentials
This is particularly for non-root users with PrivSep YES. When I connect to
a root user with PrivSep YES or to a non-root
1999 Dec 04
2
confusion over RSAref vul w/OpenSS[HL]
Howdy,
The string of notices on BugTraq about RSAref being vulnerable to
overflows has me concerned. After trying to sort through all the
messages, I can't figure out whether I need to update OpenSSL (a
check of their website indicates no new patches), OpenSSH, both, or
neither. I am aware there is no known exploit for it yet.
I could be a bad boy and just run all
2000 Mar 07
2
rsaref usage
First, when I tried to start sshd, I got the message
Starting sshd: ssh-keygen: no RSA support in libssl and libcrypto.
See ssl(8).
sshd: no RSA support in libssl and libcrypto -- exiting. See ssl(8)
no RSA support in libssl and libcrypto -- exiting. See ssl(8)
So I thought I have to recompile openssl with rsaref flag to config.
When I did that, I got compilation error (this is version 0.9.5