Displaying 20 results from an estimated 5000 matches similar to: "MAIL on Solaris"
2001 Jun 21
0
Bug: OpenSSH (port.) daemon sets $MAIL incorrectly on Solaris (others?)
This bug may be specific to the portability releases of OpenSSH. It's
minor, but trivially corrected.
I'm observing it under:
* openssh-2.3.0p1 (openssl-0.9.6)
* compiled under Solaris 2.5.1
* running under Solaris 2.5.1 and Solaris 8
The relevant source code does not appear to have changed up to and
including openssh-2.9p2.
The bug is that the $MAIL environment variable
2001 Aug 13
1
[PATCH] Maildir support
Hi!
Here is a patch against openssh-2.9.p2 that adds support for Maildir style
mailboxes, the way which qmail prefers to store mails in.
The changes/additions are the following:
1) $MAIL env. variable is set to $HOME/Maildir if it exists, or else to
_PATH_MAIL/$USER.
2) Mail checking (the main purpose of this patch) is done by first checking
whether $MAIL is a regular file or directory. If
2001 Mar 29
3
Patches for OpenSSH 2.5.2p2: evaluate /etc/default/login, makefiles manpages
Dear developers of OpenSSH,
first of all I want to thank you for your excellent work on OpenSSH!
I have compiled OpenSSH 2.5.2p2 on Sun Solaris 2.6 and Sun Solaris 8
and discovered some problems.
The first is that OpenSSH doesn't evaluate the file /etc/default/login
which contains some flags and parameters for the login process.
On important parameter is the default value for PATH.
As we
2000 Feb 27
0
[PATCH] Fix login.conf, expiration, BSD compatibility in OpenSSH
This patch revive almost all login.conf and password/account expiration
features, makes OpenSSH more FreeBSD login compatible and fix non-critical
memory leak.
Please review and commit.
--- sshd.c.old Fri Feb 25 08:23:45 2000
+++ sshd.c Sun Feb 27 02:53:33 2000
@@ -37,9 +37,8 @@
#endif /* LIBWRAP */
#ifdef __FreeBSD__
-#include <libutil.h>
-#include <syslog.h>
#define LOGIN_CAP
2000 Oct 07
0
OpenSSH changes for BSD/OS
The following are patches against openssh 2.1.1p4 to add
support for the BSD_AUTH authentication mechanisms. It allows the
use of non-challenge/response style mechanisms (which styles are
allowed my be limited by appropriate auth-ssh entries in login.conf).
The patches also add support for calling setusercontext for the
appropriate class when called with a command (so that the PATH, limits,
2001 Feb 16
1
OpenSSH 2.3.0p1 port to BSDI BSD/OS
BSD/OS 4.2 comes with OpenSSH 2.1.1p4, patched to support BSDI's
authentication library. However, BSDI's patches have several
problems:
1. They don't run the approval phase, so they can allow users to login
who aren't supposed to be able to.
2. They don't patch configure to automatically detect the BSDI auth
system, so they're not ready to use in a general portable
2003 Jul 03
0
AIX cleanups: includes and arguments
Hi All.
First the questions:
Is there anything objectionable in this patch?
Is AUDIT_FAIL_AUTH appropriate for the "Reason" field?
Now the details: attached is a patch that changes some of the #includes
for AIX. It moves the AIX-specific includes to port-aix.h and adds
includes that contain the prototypes for many of the authentication
functions. The idea isto fix some warnings.
1999 Nov 22
0
Solaris 7 and sshd.c / HAVE_MAILLOCK_H
maillock.h defines MAILDIR, MAILDIR is needed in config.h, and config.h
needs to be included after maillock.h...
#ifdef HAVE_MAILLOCK_H
# include <maillock.h>
# include "config.h"
#endif
In order to get _PATH_MAILDIR defined properly...
Marc G. Fournier marc.fournier at acadiau.ca
Senior Systems Administrator Acadia
2000 Sep 13
2
auth-pam.c support for pam_chauthtok()
When we installed OpenSSH 2.1.1p4 on our Solaris systems, our users
noticed that it did not honor password expiration consistently with
other Solaris login services.
The patch below is against OpenSSH 2.2.0p1 and adds support for PAM
password changes on expiration via pam_chauthtok(). A brief summary of
changes:
auth-pam.c:
* change declaration of pamh to "static pam_handle_t *pamh",
1999 Nov 23
2
Fixes for Solaris
Attached is a small patch that should fix most of the problems
reported.
I am adding a recommendation to use GNU make to the INSTALL
document.
Regards,
Damien
--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
-------------- next part --------------
Index:
2022 Nov 05
1
[PATCH] Class-imposed login restrictions
From: Yuichiro Naito <naito.yuichiro at gmail.com>
If the following functions are available,
add an additional check if users are allowed to login imposed by login class.
* auth_hostok(3)
* auth_timeok(3)
These functions are implemented on FreeBSD.
---
>From GitHub pull request https://github.com/openssh/openssh-portable/pull/262
auth.c | 18 ++++++++++++++++++
configure.ac |
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
This is an attempt to simplify the AIX expiry-via-passwd stuff and make
it more generic. (There's actually a net reduction in #ifdefs).
Patch against CVS:
1) configure finds passwd.
2) sshd uses passwd during session if required.
3) sshd uses passwd for PAM change if privsep disabled.
4) sshd uses Buffers for expire and post-login messages (no longer AIX
specific).
5) password_change_required
1999 Dec 21
0
Problem with UTMP recording
Hello to all!
I have problem with OpenSSH 1.2.1pre18 on Linux (kernel 2.2.13,
distribution Slackware 4.0). When someone login using ssh, there is no way
to see his presentance with some 'standard' tools (finger, who, w,
users...). Of course, his proccesses are in ps, and so. I've tried to see
/etc/utmp using vi, and there is some entry, but maybe invalid, or
something.
When I enable
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
Hello,
appended is a patch that makes it possible to use PAM both for
password authentication and TIS (i.e. s/key or opie or any other
interactive challenge/response scheme). I have developed this starting
from the patch at http://www.debian.org/Bugs/db/61/61906.html on
Debian with openssh-2.1.1p4-3. After configuring ssh with
--with-pam-tis, there are two PAM services, "sshd" and
2002 Oct 21
0
[Bug 419] New: HP-UX PAM problems with 3.5p1
http://bugzilla.mindrot.org/show_bug.cgi?id=419
Summary: HP-UX PAM problems with 3.5p1
Product: Portable OpenSSH
Version: -current
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2009 Jan 17
2
DierckxSpline segfault
I've just encountered a segfault when using DierckxSpline::percur
function. Below is the minimal example which triggers the error:
---
library(DierckxSpline)
x <- 1:10
y <- rep(0, 10)
pspline <- percur(x, y)
---
*** caught segfault ***
address (nil), cause 'memory not mapped'
Traceback:
1: .Fortran("percur", iopt = as.integer(iopt), m = as.integer(m),
x =
2002 Mar 24
1
FreeBSD 4.x
On FreeBSD 4.x with HAVE_LOGIN_CAP defined the OpenSSH daemon doesn't properly follow standards.
As stated in man 5 login.conf and the process followed by /usr/bin/login,
"The ttys.allow and ttys.deny entries contain a comma-separated list of
tty devices (without the /dev/ prefix) that a user in a class may use to
access the system, and/or a list of ttygroups (See getttyent(3)
2002 Jul 16
2
HP-UX PAM with Trusted System patch
I'm fairly new to the list and new to submitting patches. Can someone
please verify the attached patch for running a HP-UX Trusted System with
PAM and OpenSSH 3.4p1? The problem seemed to be that pam couldn't verify
the user via __pamh after the call to permanently_set_uid in session.c.
So I called do_pam_session prior to the call and added a function
do_pam_set_tty in order to set the
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
Hi All.
Attached is a patch that implements password expiry with PAM and
privsep. It works by passing a descriptor to the tty to the monitor,
which sets up a child with that tty as stdin/stdout/stderr, then runs
chauthtok(). No setuid helpers.
I used some parts of Michael Steffens' patch (bugid #423) to make it
work on HP-UX.
It's still rough but it works. Tested on Solaris 8 and
2001 Apr 06
3
$MAIL surprise
I got email yesterday from a user who had run 'from' and got the message
"No mail in /home/stevev/$USER" (where $USER was that person's
username). At first I thought he had pilfered my .bashrc, but on
further investigation I discovered that my home directory path had been
compiled in to sshd, because the configuration tests assume that the
directory part of $MAIL is the