Displaying 20 results from an estimated 1000 matches similar to: "[Bug 98] auth1.c modifications for correct UNICOS behavior"
2003 Feb 28
0
[PATCH] Clean up failed login logging.
Hi All.
As noted in a previous post, the logging of failed user logins is
somewhat spread out. This patch creates a record_failed_login()
function in sshlogin.c and moves the AIX and UNICOS code to it,
eliminating 3 #ifdefs from the main code. It also provides an obvious
place to add the code for any other platforms that support this.
I've tested this on AIX 4.3.3. Wendy Palm was kind
2003 Apr 03
0
[PATCH re-send]: Clean up logging of failed logins.
Hi All.
This is a re-send of a patch I submitted before 3.6p1.
As noted in a previous post, the logging of failed user logins is
somewhat spread out. This patch creates a record_failed_login()
function in sshlogin.c and moves the AIX and UNICOS code to it,
eliminating 3 #ifdefs from the main code. It also provides an obvious
place to add the code for any other platforms that support
2002 Apr 22
0
[Bug 99] auth2.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=99
------- Additional Comments From wendyp at cray.com 2002-04-23 08:31 -------
updated for 22 april snapshot:
--- auth2.c.orig Mon Apr 22 14:29:54 2002
+++ auth2.c Mon Apr 22 14:31:19 2002
@@ -52,6 +52,10 @@
#include "match.h"
#include "monitor_wrap.h"
+#ifdef _CRAY
+#include <ia.h>
+#endif /* _CRAY */
+
2003 Jan 27
1
[PATCH] Creation of record_failed_login() in sshlogin.c
Hi All,
I've been poking around various parts of the auth code for a while.
Some platforms support failed login counters and it occurs to me that
there's as few too many instances of:
#ifdef [PLATFORM]
if (authenticated == 0 && strcmp(method, "password") == 0)
some_login_failure_func();
#endif
The attached patch creates a record_failed_login() function in
2003 Apr 27
3
[PATCH re-send]: Clean up logging of failed logins
sorry, Darren. Long over due comments.
[..]
>+/* Record a failed login attempt. */
>+void
>+record_failed_login(const char *user, const char *host, const char *ttyname)
>+{
>+#ifdef WITH_AIXAUTHENTICATE
>+ loginfailed(user, host, ttyname);
>+#endif
>+#ifdef _UNICOS
>+ cray_login_failure((char *)user, IA_UDBERR);
>+#endif /* _UNICOS */
>+}
I like the
2002 Jul 22
0
[Bug 98] auth1.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=98
wendyp at cray.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From wendyp at cray.com 2002-07-23 08:43
2002 Apr 22
0
[Bug 101] session.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=101
------- Additional Comments From wendyp at cray.com 2002-04-23 08:43 -------
updated patches for 22 april snapshot:
--- session.c.orig Mon Apr 22 14:36:13 2002
+++ session.c Mon Apr 22 16:31:15 2002
@@ -64,6 +64,10 @@
#define is_winnt (GetVersion() < 0x80000000)
#endif
+#ifdef _CRAY
+#include <tmpdir.h>
+#endif /*
2002 Feb 04
0
[Bug 101] New: session.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=101
Summary: session.c modifications for correct UNICOS behavior
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2002 Sep 23
19
Call for testing for 3.5 OpenSSH
OpenBSD tree is heading into a lock and this includes OpenSSH. So we are
winding up for a 3.5 release. If we can get people to test the current
snapshots and report any problems that would improve the odds that your
platform won't be broke for 3.5.
Issues I know off of right now.
1. I can't test NeXT. So I TRULY need someone in that community to test
for me. Last I heard there was
2001 Dec 18
2
[PATCH]: Fix potential security hole in Cygwin version
Hi,
the following patch fixes a potential security hole in the Cygwin
version of sshd.
If you're logging in to a Cygwin sshd with version 2 protocol using an
arbitrary user name which is not in /etc/passwd, the forked sshd which
is handling this connection crashes with a segmentation violation. The
client side encounters an immediate disconnect ("Connection reset by
peer").
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
Hello,
appended is a patch that makes it possible to use PAM both for
password authentication and TIS (i.e. s/key or opie or any other
interactive challenge/response scheme). I have developed this starting
from the patch at http://www.debian.org/Bugs/db/61/61906.html on
Debian with openssh-2.1.1p4-3. After configuring ssh with
--with-pam-tis, there are two PAM services, "sshd" and
2002 Apr 05
2
[Bug 96] bsd-cray.h modifications to allow correct UNICOS execution
http://bugzilla.mindrot.org/show_bug.cgi?id=96
------- Additional Comments From stevesk at pobox.com 2002-04-05 19:23 -------
the cray support is incomplete now, is that correct?
if so, what is needed to complete it?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Apr 22
0
[Bug 97] deattack.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=97
wendyp at cray.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From wendyp at cray.com 2002-04-23 08:39
2002 Jul 22
0
[Bug 96] bsd-cray.h modifications to allow correct UNICOS execution
http://bugzilla.mindrot.org/show_bug.cgi?id=96
wendyp at cray.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From wendyp at cray.com 2002-07-23 08:40
2002 Jul 22
0
[Bug 100] serverloop.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=100
wendyp at cray.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From wendyp at cray.com 2002-07-23 08:41
2002 Jul 22
0
[Bug 99] auth2.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=99
wendyp at cray.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From wendyp at cray.com 2002-07-23 08:45
2002 Jul 22
0
[Bug 101] session.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=101
wendyp at cray.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From wendyp at cray.com 2002-07-23 08:44
2001 May 23
1
[PATCH]: Drop the use of `check_nt_auth'.
Hi,
the following patch removes some of the Cygwin specific code from
OpenSSH.
Since Cygwin is able to change the user context on NT/W2K even without
a password since the new Cygwin version 1.3.2, there's no need anymore
to allow changing the user context only if the sshd user is the same
user as the one which logs in or when a password is given.
For that reason the whole function
2002 Apr 05
1
[Bug 100] serverloop.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=100
------- Additional Comments From mouring at eviladmin.org 2002-04-06 06:52 -------
The following code was committed to OpenSSH to catch some SysV issue. Does
this keep UNICOS happy?
while ((wait_pid = waitpid(-1, &wait_status, 0)) < 0)
if (errno != EINTR)
packet_disconnect("wait:
2002 Mar 27
0
[Bug 191] New: compilation faills in auth1.c:392 `pw' undeclared when USE_PAM is on
http://bugzilla.mindrot.org/show_bug.cgi?id=191
Summary: compilation faills in auth1.c:392 `pw' undeclared when
USE_PAM is on
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: critical
Priority: P2
Component: Miscellaneous