Displaying 20 results from an estimated 500 matches similar to: "OpenSSH vs AIX 4.3.3 => 5.1 utmp patch"
2000 May 15
1
AIX authenticate patches
Here are some patches to re-enable support for AIX's authenticate
routines. With them, ssh will honor locked & unlocked accounts, record
successful and unsuccessful logins, and deny accounts that are
prohibited to log in via the network. Tested with AIX 4.3.
It also includes a fix for handling SIGCHLD that may be needed for
other platforms (HP-UX 10.20, for example).
If I get the time
2003 Jul 05
0
[PATCH] Replace AIX loginmsg with generic Buffer loginmsg
Hi All.
I've decided to try to merge the -Portable parts of the password expiry
patch (see bug #14) that do not depend on the OpenBSD change in bug #463.
The attached patch is the first step in this process. It removes the
AIX-specific "char *aixloginmsg" and replaces it with a platform-neutral
"Buffer loginmsg". I think this is worth having in -Portable even if it
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
This is an attempt to simplify the AIX expiry-via-passwd stuff and make
it more generic. (There's actually a net reduction in #ifdefs).
Patch against CVS:
1) configure finds passwd.
2) sshd uses passwd during session if required.
3) sshd uses passwd for PAM change if privsep disabled.
4) sshd uses Buffers for expire and post-login messages (no longer AIX
specific).
5) password_change_required
2002 Aug 12
2
AIX authenticate()
Hi,
I just got a comment from one of my IBM support engineeres that there
is a problem with auth-passwd.c only calling authenticate() once. He
claims it should potentially be called several times, in case several
authetication methods are defined in /etc/security/user. F.ex.:
SYSTEM = "NIS and DCE"
Suggested (untested) patch should look like:
----------------- cut
2002 Jul 30
0
patch: disable credential forwarding after password auth.
Dear list,
since the order of authentication and AFS token/KRB TGT forwarding
changed (around 3.0), we have had problems with users accidentally
overwriting their credentials from a "password" login with forwarded
credentials. E.g. user A logs in as user B, but stays with the AFS
permissions of user A. A workaround is to use "-k" on these sessions,
but "it worked without
2002 Oct 13
1
[PATCH] AIX password expiration
Hi All.
With one eye on the do_pam_chauthtok() stuff I've merged contributions
by Pablo Sor and Mark Pitt into a patch against -current. I'm
interested in testers and suggestions for improvements.
The patch extends the loginrestrictions test to include expired
accounts (but unlike Mark's patch, doesn't log accounts with expired
passwords unless they're locked) and adds
2001 Nov 09
0
AIX lastlog change
Hi David,
I'm sure loginfailed(..) should be called immediately after
authenticate(..) returned an error. It is directly related
to an invalid password try. (Please see my attached mail from May 2001
to the list).
I'm not so sure when loginsuccess(..) should be called
(setting the loginfailed counter to zero):
Either
1) when somebody logs in successfully using all kinds
of valid
2002 Jan 30
0
[Bug 87] New: Last logon that gets reported upon login is the current login time
http://bugzilla.mindrot.org/show_bug.cgi?id=87
Summary: Last logon that gets reported upon login is the current
login time
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2001 Jan 03
0
AIX loginsuccess and aixloginmsg ?
Hi,
I noticed that the AIX specific loginsuccess call uses
char *aixloginmsg to retrieve login information. Later this message is
printed in session.c (around line 753). Loginsuccess mallocs space for
this message and according to the aix docs it's the responsibility of the
calling program to free this message.
I didn't notice any code in openssh that would free the aixloginmsg.
Can
2001 Sep 04
0
AIX Warning for expired password
Hi,
I have made a patch for AIX to report the number of days till a password
expire and to prompt for a new one.
This patch was made for openssh-SNAP-20010904.tar.gz (2.9p2) of the CVS
repository.
If you have any suggestion or question to submit, please cc to me,
I'm not in the list.
Bye
--
Pablo Sor
Departamento de Seguridad Informatica - AFIP
psor at afip.gov.ar, psor at ccc.uba.ar
2003 Jul 03
0
AIX cleanups: includes and arguments
Hi All.
First the questions:
Is there anything objectionable in this patch?
Is AUDIT_FAIL_AUTH appropriate for the "Reason" field?
Now the details: attached is a patch that changes some of the #includes
for AIX. It moves the AIX-specific includes to port-aix.h and adds
includes that contain the prototypes for many of the authentication
functions. The idea isto fix some warnings.
2000 Jan 19
3
AIX openssh patches
I have a few patches for AIX. The patchfile is attached below. The patch
has been tested on AIX4.2 and AIX4.3. The patch is on openssh-1.2.1pre25,
with openssl-0.94, using RSAref.
1) authenticate support - this function allows the system to determine
authentification. Whatever the system allows for login, authenticate
will too. It doesn't matter whether it is AFS, DFS, SecureID, local.
2001 Dec 19
0
Patch for DU SIA auth
Hello. The following is a patch against OpenSSH 3.0.2p1 to fix OpenSSH's
handling of Tru64 SIA authentication. The main changes are to make the
SIAENTITY a global variable (so that it remains persistent across function
calls), initialization only happens once, the session is only released
once. This makes SIA modules that require authentication in order to
perform certain actions during the
2002 Apr 22
0
[Bug 101] session.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=101
------- Additional Comments From wendyp at cray.com 2002-04-23 08:43 -------
updated patches for 22 april snapshot:
--- session.c.orig Mon Apr 22 14:36:13 2002
+++ session.c Mon Apr 22 16:31:15 2002
@@ -64,6 +64,10 @@
#define is_winnt (GetVersion() < 0x80000000)
#endif
+#ifdef _CRAY
+#include <tmpdir.h>
+#endif /*
2001 Feb 22
1
Problem with OpenSSH 2.3.0p1/2.5.1p1 and AIX
We have come across a problem with OpenSSH 2.3.0p1 (and still in
2.5.1p1) which affect authentication on an AIX 4.3 system.
The code in auth-passwd.c at line 168 reads:
#ifdef WITH_AIXAUTHENTICATE
return (authenticate(pw->pw_name,password,&reenter,&authmsg) == 0);
#endif
however, the AIX manual page for "authenticate" states:
"The authenticate subroutine maintains
2002 Feb 04
0
[Bug 101] New: session.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=101
Summary: session.c modifications for correct UNICOS behavior
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2001 Nov 08
2
logging of root logins
On Thu, Nov 08, 2001 at 01:59:25PM +0100, Arthur de Jong wrote:
> root and warthur both have user id 0. Sorry, I should have made that
> clearer. They both have different passwords and rsa keys and I would like
> to be able to make the distinction in the logs. Currently ssh only logs
> that a ROOT user has logged in, not which one.
hm, i don't think uid sharing is a standard unix
2012 Nov 21
1
remote connection to an Oracle database - using RODBC - RMySQL..?
Dear users,
I can access an database oracle database using sql developer. This was done by importing an xml file that contains the login details - username, password and specifies that it uses the KERBEROS_AUTHENTICATION.
I'm trying to connect R - so that it can access this database - do sql queries and convert the resulting tables into dataframes.
I am a novice in SQL and database access
2000 Nov 14
0
2.3.0p1, Solaris 7 and last login (fwd)
--
| ``We've all heard that a million monkeys banging on | Damien Miller -
| a million typewriters will eventually reproduce the | <djm at mindrot.org>
| works of Shakespeare. Now, thanks to the Internet, /
| we know this is not true.'' - Robert Wilensky UCB / http://www.mindrot.org
---------- Forwarded message ----------
Date: Tue, 14 Nov 2000 16:33:18 +0100
From: System
2001 Aug 07
1
do_pre_login() used before declared
do_pre_login() in session.c is used (in do_exec_pty()) before
it's declared, which is causing some problems for me.
please move it up a couple hundred lines in the file.
patch included for 0807 snapshot.
thanks,
wendy
% diff -u session.c.orig session.c.mod
--- session.c.orig Tue Aug 7 13:11:51 2001
+++ session.c.mod Tue Aug 7 16:21:07 2001
@@ -397,6 +397,34 @@
}
}