Displaying 20 results from an estimated 1000 matches similar to: "[PATCH] Clean up failed login logging."
2003 Apr 03
0
[PATCH re-send]: Clean up logging of failed logins.
Hi All.
This is a re-send of a patch I submitted before 3.6p1.
As noted in a previous post, the logging of failed user logins is
somewhat spread out. This patch creates a record_failed_login()
function in sshlogin.c and moves the AIX and UNICOS code to it,
eliminating 3 #ifdefs from the main code. It also provides an obvious
place to add the code for any other platforms that support
2003 Jan 27
1
[PATCH] Creation of record_failed_login() in sshlogin.c
Hi All,
I've been poking around various parts of the auth code for a while.
Some platforms support failed login counters and it occurs to me that
there's as few too many instances of:
#ifdef [PLATFORM]
if (authenticated == 0 && strcmp(method, "password") == 0)
some_login_failure_func();
#endif
The attached patch creates a record_failed_login() function in
2003 Apr 27
3
[PATCH re-send]: Clean up logging of failed logins
sorry, Darren. Long over due comments.
[..]
>+/* Record a failed login attempt. */
>+void
>+record_failed_login(const char *user, const char *host, const char *ttyname)
>+{
>+#ifdef WITH_AIXAUTHENTICATE
>+ loginfailed(user, host, ttyname);
>+#endif
>+#ifdef _UNICOS
>+ cray_login_failure((char *)user, IA_UDBERR);
>+#endif /* _UNICOS */
>+}
I like the
2003 Jul 03
0
AIX cleanups: includes and arguments
Hi All.
First the questions:
Is there anything objectionable in this patch?
Is AUDIT_FAIL_AUTH appropriate for the "Reason" field?
Now the details: attached is a patch that changes some of the #includes
for AIX. It moves the AIX-specific includes to port-aix.h and adds
includes that contain the prototypes for many of the authentication
functions. The idea isto fix some warnings.
2002 Apr 22
0
[Bug 99] auth2.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=99
------- Additional Comments From wendyp at cray.com 2002-04-23 08:31 -------
updated for 22 april snapshot:
--- auth2.c.orig Mon Apr 22 14:29:54 2002
+++ auth2.c Mon Apr 22 14:31:19 2002
@@ -52,6 +52,10 @@
#include "match.h"
#include "monitor_wrap.h"
+#ifdef _CRAY
+#include <ia.h>
+#endif /* _CRAY */
+
2000 May 15
1
AIX authenticate patches
Here are some patches to re-enable support for AIX's authenticate
routines. With them, ssh will honor locked & unlocked accounts, record
successful and unsuccessful logins, and deny accounts that are
prohibited to log in via the network. Tested with AIX 4.3.
It also includes a fix for handling SIGCHLD that may be needed for
other platforms (HP-UX 10.20, for example).
If I get the time
2001 Feb 04
1
minor aix patch to auth1.c
--- auth1.c.orig Sat Feb 3 18:17:53 2001
Bringa AIX modes in line with latest changes to auth1.c
+++ auth1.c Sat Feb 3 18:19:15 2001
@@ -347,7 +347,7 @@
if (authctxt->failures++ > AUTH_FAIL_MAX) {
#ifdef WITH_AIXAUTHENTICATE
- loginfailed(user,get_canonical_hostname(),"ssh");
+
2002 Apr 10
1
openssh-3.1p1 on GNU/Hurd
Hi,
I've gone and ported the latest version of openssh, 3.1p1, to GNU/Hurd.
I've tried to learn from the other threads on this topic, but I still had
to get rid of MAXHOSTNAMELEN where I could.
James A. Morrison
diff -urN openssh-3.1p1.old/Makefile.in openssh-3.1p1/Makefile.in
--- openssh-3.1p1.old/Makefile.in Tue Feb 26 14:24:22 2002
+++ openssh-3.1p1/Makefile.in Tue Apr 9 16:16:49
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
This is an attempt to simplify the AIX expiry-via-passwd stuff and make
it more generic. (There's actually a net reduction in #ifdefs).
Patch against CVS:
1) configure finds passwd.
2) sshd uses passwd during session if required.
3) sshd uses passwd for PAM change if privsep disabled.
4) sshd uses Buffers for expire and post-login messages (no longer AIX
specific).
5) password_change_required
2000 Nov 30
1
Problem and Patch: Multiple keys in ssh.com V2 agent
Hello!
I recently discoverd a problem with ssh.com's ssh-agent2 and OpenSSH:
If I have more than one key in my agent, then the agent tries to
authenticicate me with every one of them at the OpenSSH server; but none
of them is a valid key for that server. The Problem is that the Server
increments the authctxt->attempt at every of that tries. So even if you
want to login with a password at
2002 Mar 14
0
OpenSSH vs AIX 4.3.3 => 5.1 utmp patch
The patch below follows changes in AIX utmp handling made between AIX 4.3.3
and 5.1. With it, utmp entries are properly recorded again.
The patch applies to OpenSSH 3.1p1, and seems to work fine. The co-worker
who sent me the patch hasn't tested backwards compatibility on AIX 4.3.3
systems.
Richard
-------
*** openssh-2.9.9p2/auth-passwd.c.org Tue Jul 3 23:21:15 2001
---
2003 Jul 05
0
[PATCH] Replace AIX loginmsg with generic Buffer loginmsg
Hi All.
I've decided to try to merge the -Portable parts of the password expiry
patch (see bug #14) that do not depend on the OpenBSD change in bug #463.
The attached patch is the first step in this process. It removes the
AIX-specific "char *aixloginmsg" and replaces it with a platform-neutral
"Buffer loginmsg". I think this is worth having in -Portable even if it
2003 May 06
1
compilation problems AIX 5.2
I am having difficulties compiling openssh3.6p2 under
AIX 5.2. I grabbed the latest from the contrib
section from openssh.com, applied passexpire19.patch
successfully and configure --prefix=/opt/freeware/
--with xauth=/usr/bin/X11/xauth. i get the following
@ the end of the make:
In file included from auth.c:41:
/usr/include/usersec.h:656: warning: `struct aud_rec'
declared inside parameter
2002 Apr 22
0
[Bug 98] auth1.c modifications for correct UNICOS behavior
http://bugzilla.mindrot.org/show_bug.cgi?id=98
------- Additional Comments From wendyp at cray.com 2002-04-23 08:41 -------
updated patch for 22 april snapshot:
--- auth1.c.orig Mon Apr 22 14:28:12 2002
+++ auth1.c Mon Apr 22 14:29:48 2002
@@ -26,6 +26,9 @@
#include "session.h"
#include "uidswap.h"
#include "monitor_wrap.h"
+#ifdef _CRAY
+#include
2016 Dec 18
4
Extend logging of openssh-server - e.g. plaintext password
Dear list members,
I want to extend the logging of the openssh-server, so it also logs the entered passwords in plaintext, and yes I know that this is a security issue, but relax, Password Authentication is disabled. ;)
The logging is only used for collecting data on my honeypots.
After digging through the source, I?ve found a file called ?auth.c"
auth.c:
#ifdef CUSTOM_FAILED_LOGIN
if
2000 Jan 19
3
AIX openssh patches
I have a few patches for AIX. The patchfile is attached below. The patch
has been tested on AIX4.2 and AIX4.3. The patch is on openssh-1.2.1pre25,
with openssl-0.94, using RSAref.
1) authenticate support - this function allows the system to determine
authentification. Whatever the system allows for login, authenticate
will too. It doesn't matter whether it is AFS, DFS, SecureID, local.
2001 Apr 29
2
PATCH: UseLogin fix for 2.9p1 (w/improved last-login time)
Attached is the latest version of my UseLogin patch that makes
"UseLogin true" work on Solaris and UNICOS. As usual, I have provided
configure.in changes that set the appropriate defines for Solaris, but
I have not provided the configure.in changes for UNICOS (since they
would be incomplete, and Wendy is working on this).
This version fixes a problem with the last-login time always
2003 Oct 28
4
AIX patch for openssh-3.7.1p2
There are a couple of bugs in the openssh-3.7.1p2. The aix_setauthdb
function does not work with other types of authentication such as AFS/DFS.
The loginfailed test in configure is not correct. Also, AIX can use the
wtmp logging which I added in configure. Attached is the patch.
Thanks,
Matt Richards
-------------- next part --------------
*** openssh-3.7.1p2/openbsd-compat/port-aix.c Mon Jul 14
2001 Nov 09
0
AIX lastlog change
Hi David,
I'm sure loginfailed(..) should be called immediately after
authenticate(..) returned an error. It is directly related
to an invalid password try. (Please see my attached mail from May 2001
to the list).
I'm not so sure when loginsuccess(..) should be called
(setting the loginfailed counter to zero):
Either
1) when somebody logs in successfully using all kinds
of valid
2001 Dec 26
3
auth*.c
Folks,
During testing, we found a couple of issues with openssh3.0.2p1:
1. In userauth_finish() in auth2.c (as well as in do_authloop in auth1.c),
the foll. check:
if (authctxt->failures++ > AUTH_FAIL_MAX)
is never satisfied and thus packet_disconnect() never gets called. I
suspect the code just drops out of the dispatch_run function list instead.
This should be an == instead of >.