Displaying 20 results from an estimated 1000 matches similar to: "AIX lastlog change?"
2000 May 15
1
AIX authenticate patches
Here are some patches to re-enable support for AIX's authenticate
routines. With them, ssh will honor locked & unlocked accounts, record
successful and unsuccessful logins, and deny accounts that are
prohibited to log in via the network. Tested with AIX 4.3.
It also includes a fix for handling SIGCHLD that may be needed for
other platforms (HP-UX 10.20, for example).
If I get the time
2000 Oct 24
3
openssh-SNAP-20001016
Using openssh-SNAP-20001016 all of our problems with hanging connections
have gone away (woohoo!), and it seems to be working flawlessly, but I am
seeing messages like this in syslog:
Oct 24 16:57:48 dhumb301 sshd[17752]: error: channel 0: internal error: we
do not read, but chan_read_failed for istate 8
Oct 24 16:57:59 dhumb301 sshd[17771]: error: select: Bad file descriptor
Oct 24 16:58:30
2000 Jan 19
3
AIX openssh patches
I have a few patches for AIX. The patchfile is attached below. The patch
has been tested on AIX4.2 and AIX4.3. The patch is on openssh-1.2.1pre25,
with openssl-0.94, using RSAref.
1) authenticate support - this function allows the system to determine
authentification. Whatever the system allows for login, authenticate
will too. It doesn't matter whether it is AFS, DFS, SecureID, local.
2002 Oct 13
1
[PATCH] AIX password expiration
Hi All.
With one eye on the do_pam_chauthtok() stuff I've merged contributions
by Pablo Sor and Mark Pitt into a patch against -current. I'm
interested in testers and suggestions for improvements.
The patch extends the loginrestrictions test to include expired
accounts (but unlike Mark's patch, doesn't log accounts with expired
passwords unless they're locked) and adds
2002 Mar 14
0
OpenSSH vs AIX 4.3.3 => 5.1 utmp patch
The patch below follows changes in AIX utmp handling made between AIX 4.3.3
and 5.1. With it, utmp entries are properly recorded again.
The patch applies to OpenSSH 3.1p1, and seems to work fine. The co-worker
who sent me the patch hasn't tested backwards compatibility on AIX 4.3.3
systems.
Richard
-------
*** openssh-2.9.9p2/auth-passwd.c.org Tue Jul 3 23:21:15 2001
---
2001 Dec 26
3
auth*.c
Folks,
During testing, we found a couple of issues with openssh3.0.2p1:
1. In userauth_finish() in auth2.c (as well as in do_authloop in auth1.c),
the foll. check:
if (authctxt->failures++ > AUTH_FAIL_MAX)
is never satisfied and thus packet_disconnect() never gets called. I
suspect the code just drops out of the dispatch_run function list instead.
This should be an == instead of >.
2003 Oct 28
4
AIX patch for openssh-3.7.1p2
There are a couple of bugs in the openssh-3.7.1p2. The aix_setauthdb
function does not work with other types of authentication such as AFS/DFS.
The loginfailed test in configure is not correct. Also, AIX can use the
wtmp logging which I added in configure. Attached is the patch.
Thanks,
Matt Richards
-------------- next part --------------
*** openssh-3.7.1p2/openbsd-compat/port-aix.c Mon Jul 14
2000 Jun 12
1
AIX and 2.1.1p1
The new login code works fine with AIX 4.3. Two nits, though. If
--disable-lastlog is defined, the code still tries to slog through wtmp
to determine the last login time. Is this a bug or a feature? If a
feature, change the DISABLE_LASTLOG test below to WITH_AIXAUTHENTICATE.
Also, a small typo in configure.in, plus an AIX tweak.
--- configure.in.orig Thu Jun 8 21:58:35 2000
+++ configure.in Mon
2002 Feb 14
1
3.0.2p1: all sshd processes owned by root
Hi,
I installed 3.0.2p1 on our Solaris 8 systems this week (new to ssh),
and when I look at the process list for sshd, I see:
root 14547 1 0 10:35:29 ? 0:00 /opt/openssh/sbin/sshd
root 14548 14547 0 10:35:36 ? 0:01 /opt/openssh/sbin/sshd
Process 14547 is the deamon listening on port 22, but process 14548 is
my connection from elsewhere. I consider it a design
2001 Feb 04
1
minor aix patch to auth1.c
--- auth1.c.orig Sat Feb 3 18:17:53 2001
Bringa AIX modes in line with latest changes to auth1.c
+++ auth1.c Sat Feb 3 18:19:15 2001
@@ -347,7 +347,7 @@
if (authctxt->failures++ > AUTH_FAIL_MAX) {
#ifdef WITH_AIXAUTHENTICATE
- loginfailed(user,get_canonical_hostname(),"ssh");
+
2002 Aug 12
2
AIX authenticate()
Hi,
I just got a comment from one of my IBM support engineeres that there
is a problem with auth-passwd.c only calling authenticate() once. He
claims it should potentially be called several times, in case several
authetication methods are defined in /etc/security/user. F.ex.:
SYSTEM = "NIS and DCE"
Suggested (untested) patch should look like:
----------------- cut
2001 Apr 26
2
Functionality bug (possibly) in openssh on AIX 4.3 (fwd)
Has anyone else running AIX tried this patch? I'm looking for feedback
if it should be applied before we release 2.9p1.
- Ben
---------- Forwarded message ----------
Date: Tue, 24 Apr 2001 17:22:02 -0800 (AKDT)
From: mikem at alaska.net
To: openssh-unix-dev at mindrot.org
Subject: Functionality bug (possibly) in openssh on AIX 4.3
Hi Folks,
While compiling and testing openssh-2.5.2p2 on
2001 Oct 23
2
PAM problem - sshd segfault on Solaris
I'm using OpenSSH-2.9.9p2 on Solaris 8 sparc64. 2.9p2 worked fine, but
2.9.9p2+ is giving me trouble with one thing - sshd segfaults if I try to
connect and execute a command, such as "ssh machine ls". Otherwise it
works great. sshd will fork, and the child process segfaults.
CVS snapshot does the same thing.
I've narrowed this down somewhat. It will only happen if you use
2003 Apr 27
3
[PATCH re-send]: Clean up logging of failed logins
sorry, Darren. Long over due comments.
[..]
>+/* Record a failed login attempt. */
>+void
>+record_failed_login(const char *user, const char *host, const char *ttyname)
>+{
>+#ifdef WITH_AIXAUTHENTICATE
>+ loginfailed(user, host, ttyname);
>+#endif
>+#ifdef _UNICOS
>+ cray_login_failure((char *)user, IA_UDBERR);
>+#endif /* _UNICOS */
>+}
I like the
2001 Jan 03
0
AIX loginsuccess and aixloginmsg ?
Hi,
I noticed that the AIX specific loginsuccess call uses
char *aixloginmsg to retrieve login information. Later this message is
printed in session.c (around line 753). Loginsuccess mallocs space for
this message and according to the aix docs it's the responsibility of the
calling program to free this message.
I didn't notice any code in openssh that would free the aixloginmsg.
Can
2001 Nov 05
2
Security - ssh allows unintended access on AIX
Under AIX there are three security settings:
expires = a fixed date at which an account is no longer valid
maxage= weeks before a password expires
maxexpires=max weeks during which a password can be changed by a user after
expiration AFTER WHICH ACCESS IS NOT ALLOWED
Beauty of maxage with expires is, that no manual intervention is required
to block inactive users.
With maxage=5 and expires=1 an
2001 Nov 09
0
AIX lastlog change
Hi David,
I'm sure loginfailed(..) should be called immediately after
authenticate(..) returned an error. It is directly related
to an invalid password try. (Please see my attached mail from May 2001
to the list).
I'm not so sure when loginsuccess(..) should be called
(setting the loginfailed counter to zero):
Either
1) when somebody logs in successfully using all kinds
of valid
2003 Jul 05
0
[PATCH] Replace AIX loginmsg with generic Buffer loginmsg
Hi All.
I've decided to try to merge the -Portable parts of the password expiry
patch (see bug #14) that do not depend on the OpenBSD change in bug #463.
The attached patch is the first step in this process. It removes the
AIX-specific "char *aixloginmsg" and replaces it with a platform-neutral
"Buffer loginmsg". I think this is worth having in -Portable even if it
2003 May 06
1
compilation problems AIX 5.2
I am having difficulties compiling openssh3.6p2 under
AIX 5.2. I grabbed the latest from the contrib
section from openssh.com, applied passexpire19.patch
successfully and configure --prefix=/opt/freeware/
--with xauth=/usr/bin/X11/xauth. i get the following
@ the end of the make:
In file included from auth.c:41:
/usr/include/usersec.h:656: warning: `struct aud_rec'
declared inside parameter
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
This is an attempt to simplify the AIX expiry-via-passwd stuff and make
it more generic. (There's actually a net reduction in #ifdefs).
Patch against CVS:
1) configure finds passwd.
2) sshd uses passwd during session if required.
3) sshd uses passwd for PAM change if privsep disabled.
4) sshd uses Buffers for expire and post-login messages (no longer AIX
specific).
5) password_change_required