similar to: [Bug 453] New: [PATCH] The SHELL env variable is set incorrectly, when shell is overridden from login.conf.

Displaying 20 results from an estimated 500 matches similar to: "[Bug 453] New: [PATCH] The SHELL env variable is set incorrectly, when shell is overridden from login.conf."

2002 Dec 09
1
[Bug 453] [PATCH] The SHELL env variable is set incorrectly, when shell is overridden from login.conf.
http://bugzilla.mindrot.org/show_bug.cgi?id=453 ------- Additional Comments From semen at online.sinor.ru 2002-12-09 22:50 ------- Created an attachment (id=184) --> (http://bugzilla.mindrot.org/attachment.cgi?id=184&action=view) The patch got mangled in the original bug report, here is the correct version. ------- You are receiving this mail because: ------- You are the assignee
2000 Feb 27
0
[PATCH] Fix login.conf, expiration, BSD compatibility in OpenSSH
This patch revive almost all login.conf and password/account expiration features, makes OpenSSH more FreeBSD login compatible and fix non-critical memory leak. Please review and commit. --- sshd.c.old Fri Feb 25 08:23:45 2000 +++ sshd.c Sun Feb 27 02:53:33 2000 @@ -37,9 +37,8 @@ #endif /* LIBWRAP */ #ifdef __FreeBSD__ -#include <libutil.h> -#include <syslog.h> #define LOGIN_CAP
2001 Oct 04
1
patch - forceshell
Attached is a simple patch which allows an auth param 'shell=' like 'command=' When specified, sshd will use this shell instead of the one in /etc/passwd or the default shell. This patch allows you can have some chrooted shell (actually any shell) associated with a specific key. You could do this with command=, but then the command given to ssh will be ignored, and scp will not
2000 Apr 15
0
patch in user validation code
I was encountering a strange message about "faked authloop for illegal user". It turned out the allowed_user function was disallowing passwd entries with a blank shell field, which is supposed to be equivalent to "/bin/sh". This patch is based on OpenSSH 1.2.3, and I have tested it on Slackware 7.0. --- sshd.old Wed Apr 12 23:47:04 2000 +++ sshd.c Thu Apr 13 00:35:54 2000
2000 Oct 07
0
OpenSSH changes for BSD/OS
The following are patches against openssh 2.1.1p4 to add support for the BSD_AUTH authentication mechanisms. It allows the use of non-challenge/response style mechanisms (which styles are allowed my be limited by appropriate auth-ssh entries in login.conf). The patches also add support for calling setusercontext for the appropriate class when called with a command (so that the PATH, limits,
2000 Sep 04
1
trivial patch to post overridden command into env
I am not 100% positive of the security implications of this, but I really can't see any potential for harm. If this patch is applied (I coded it against the now-current openssh-2.2.0p1), then if (a) the authorized_keys entry has command="whatever" to force a specific command, and also (b) the invoker specified some command on their ssh cmdline, then the invoked command will be
2015 Jan 21
4
way to set shell used for remote commands?
Good day - Please can OpenSSH provide some way of specifying which shell to use to execute commands on a host. For the account I need to use, the user's password shell is not acceptable, (a ten year old version of bash 3.0) and cannot be changed without weeks or months of burocracy , if at all. I built & installed the latest bash under that account, in the ~/bin directory, but SSH will
2000 Mar 31
0
[PATCH] empty shell in /etc/passwd
The Linux/Unix-port of OpenSSH-1.2.3 in sshd.c:allowed_user() denies Login to users with an empty shell-field in /etc/passwd. According to the docs this is wrong and an empty shell-field should default to /bin/sh. I'm sure that this is what was intended, because code and comment get it right in sshd.c:do_child(): * Get the shell from the password data. An empty shell field is
2000 Mar 31
1
[PATCH] Correction empty shell-field patch
Sorry - my previous patch was bad. Here is the corrected one. Cheers, Theo -------------- next part -------------- diff -Naur openssh-1.2.3-dist/sshd.c openssh-1.2.3/sshd.c --- openssh-1.2.3-dist/sshd.c Fri Mar 31 23:04:10 2000 +++ openssh-1.2.3/sshd.c Fri Mar 31 23:24:21 2000 @@ -1121,6 +1121,7 @@ struct stat st; struct group *grp; int i; + char*shell; #ifdef WITH_AIXAUTHENTICATE char
2020 Mar 18
2
Headsup on feature removal
Hi Aki and Remo, switch from vpopmail driver to SQL driver (if you are using vpopmail with mysql as backend) is very simple. First you need to setup the right query for vpopmail database: # cat /etc/dovecot/dovecot-sql.conf.ext ### Vpopmail driver = mysql connect = host=192.168.1.2 dbname=vpopmail user=vpopmail password=Vp0pM4iL default_pass_scheme = MD5-CRYPT ### Query to get a list of all
2014 Aug 14
0
Problem with enabling /etc/default(s)/login on Cygwin
Hi, below is a patch which simply removes a Cygwin-specific piece of code from OpenSSH. Input from a system admin educated me how useful this option could be on Cygwin as well. However, way back when the call to read_etc_default_login got disabled on Cygwin hardcoded in session.c, rather than just setting --disable-etc-default-login when building the Cygwin version of OpenSSH. So, here's
2001 Jun 18
2
Patch for changing expired passwords
The primary purpose of the attached patches is for portable OpenSSH to support changing expired passwords as specified in shadow password files. To support that, I did a couple enhancements to the base OpenBSD OpenSSH code. They are: 1. Consolidated the handling of "forced_command" into a do_exec() function in session.c. These were being handled inconsistently and allocated
2010 Jun 07
1
Patch for legend.position={left,top,bottom} in ggplot2
Hi Hadley and everyone, here's a patch for ggplot2 that fixes the behavior of opts(legend.position={left,top,bottom}). If you try the following code in an unmodified ggplot2 options(warn = -1) suppressPackageStartupMessages(library("ggplot2")) data <- data.frame( x = c(1, 2, 3, 4, 5, 6), y = c(2, 3, 4, 3, 4, 5), colour = c(TRUE, TRUE, TRUE, FALSE, FALSE, FALSE))
2001 Feb 28
2
[PATCH]: auth.c (pwcopy): Copy pw_gecos field when build for Cygwin
Hi, the attached patch is very important for Cygwin. I don't know how I could have missed that for months now :-( I hope this can be included in 2.5.1p2. The pw_gecos field in Cygwin's /etc/passwd contains Windows specific authentication informations which let NT domain users logon to a machine without the need to inform the logon server (sshd in our case) about the name of the NT
2009 Mar 13
2
New to list, got a quota question
Hello folks - I'm running dovecot on top of qmail/vpopmail/mysql, serving up about 2500 mailboxes. Everything is running very smooth and fast.... I recently upgraded dovecot to 1.1, so I'm trying to implement some extra features like IMAP quotas. I'm using the sql passdb, with the following config: driver = mysql connect = host=/var/lib/mysql/mysql.sock user=username
2007 Jun 12
1
vpopmail quota
Hi, I'd like the vpopmail user database to return the quota settings for users, instead of having to rely on the validity of the maildirsize files. It doesn't look like this is currently possible. Would simply adding a auth_stream_reply_add call for "quota" with a suitable value in vpopmail_lookup be sufficient to make this work? (the quota can be read from the pw_shell
2001 Jan 03
1
chroot.diff
Hi there, everyone; I've had a few requests for an updated version of my chroot patch. (the version found in contrib is outdated) So, here it goes, updated to 2.3.0p1; "chroot.diff" is a plain diff for session.c (apply, compile and go). "chroot+configure.diff" is the same patch, plus an option to "configure" for enabling/disabling chroot support (./configure
2004 Apr 08
1
openssh-3.8p1 fails to set TZ environment variable bug
Found on while running on IRIX 6.5.22f, sshd from openssh-3.8p1 nukes its envrionment in main(), causing sshd to loose track of the TZ environment variable passed to it by the system. This means that inside do_setup_env(), the call to getenv("TZ") will never succeed, despite the fact that this variable should have a value.
2002 Sep 04
4
Determining Local IP Address within .profile
Hi ! I haven't found an easy solution to determine the local IP to which the remote SSH client is connected to the local SSHD. We use MC/Serviceguard which can create many Interfaces where a remote client could connect and we like to know within .profile which interface the client has connected to. I've looked at the sourcecode and maybe the following could do something I described :
1998 Apr 12
0
Long file name support for smbclient
smbclient can create GNU tar files with long file names, but cannot restore them. The included patch will rectify this. This patch is against 1.9.18.p4. -Rob -- Rob Riggs Devil's Thumb Entertainment Network Administrator Boulder, CO - (303) 938-1200 rob@DevilsThumb.COM http://www.DevilsThumb.COM/~rob "The notion of errors is