Displaying 20 results from an estimated 120 matches similar to: "Building Openssh-3.6.1p2 with Darren Tucker's AIX Password Expiry patch"
2002 Nov 20
0
[PATCH #9] Password expiration via /bin/passwd.
This is an attempt to simplify the AIX expiry-via-passwd stuff and make
it more generic. (There's actually a net reduction in #ifdefs).
Patch against CVS:
1) configure finds passwd.
2) sshd uses passwd during session if required.
3) sshd uses passwd for PAM change if privsep disabled.
4) sshd uses Buffers for expire and post-login messages (no longer AIX
specific).
5) password_change_required
2009 Oct 19
1
Random Forest - partial dependence plot
Hi everybody,
I used random forest regression to explain the patterns of species
richness and a bunch of climate variables (e.g. Temperature,
precipitation, etc.) All are continuos variables. My results are
really interesting and my model explained 96,7% of the variance.
Now I am trying to take advantage of the importance variable
function and depicts the observed patterns using partial
2003 Jan 09
7
[Bug 14] Can't change expired /etc/shadow password without PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=14
------- Additional Comments From dtucker at zip.com.au 2003-01-09 23:17 -------
Created an attachment (id=199)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=199&action=view)
Implement password change via /bin/passwd in session.
openssh-passexpire10.patch:
* Implementes shadow and AIX password expiry.
* Adds general expire_message
2003 Jun 25
2
openssh-3.6.1p2-passexpire20.patch prevents /etc/nologin disp lay on AIX
Courtesy follow up back to the unix-dev list (mainly for those like me who
searched the archives)
Thanks to the very swift response of Darren, a patched auth.c did the trick
Patch enclosed below (apply after the p20)
I'm guessing he'll either update p20 or issue p21 soon.
Many thanks
Andrew
--- auth.c.orig 2003-06-25 23:14:16.000000000 +1000
+++ auth.c 2003-06-25
2003 May 13
2
SSH FTP Directories
I am making a SSH FTP client implementation, and I have run into a problem
with directory listings. Some servers (e.g. Solaris) place * at the end of
executable filenames, and when a directory listing is done, these are in
the listing. As the * character is a valid filename character in UNIX, I
need a way to determine if its indeed just an executable file, or if its
actually part of the
2003 Jun 25
2
openssh-3.6.1p2-passexpire20.patch prevents /etc/nologin display on AIX
Hi there,
I have just compiled up 3.6.1p2 both with and without Darren Tuckers
passexpire patch.
However, with the patch applied /etc/nologin isn't displayed to users (on
AIX 5.1 / PSSP)
The patched vesion seems to fail with "illegal user" - some parts of a debug
3 log...
debug1: userauth-request for user ade45 service ssh-connection method none
debug1: attempt 0 failures 0
2002 Oct 13
1
[PATCH] AIX password expiration
Hi All.
With one eye on the do_pam_chauthtok() stuff I've merged contributions
by Pablo Sor and Mark Pitt into a patch against -current. I'm
interested in testers and suggestions for improvements.
The patch extends the loginrestrictions test to include expired
accounts (but unlike Mark's patch, doesn't log accounts with expired
passwords unless they're locked) and adds
2003 Jul 05
0
[PATCH] Replace AIX loginmsg with generic Buffer loginmsg
Hi All.
I've decided to try to merge the -Portable parts of the password expiry
patch (see bug #14) that do not depend on the OpenBSD change in bug #463.
The attached patch is the first step in this process. It removes the
AIX-specific "char *aixloginmsg" and replaces it with a platform-neutral
"Buffer loginmsg". I think this is worth having in -Portable even if it
2004 Jun 16
0
Make AIX login message handling consistent.
Hi.
There's a couple of minor problems with the way port-aix.c handles the
messages returned by AIX's authentication routines. I think we handle
the native ones OK, but third-party modules might behave differently.
It tests OK for me, I would appreciate testing by anyone using AIX (esp.
anyone using something other than the standard password auth modules).
a) The message from a
2004 Aug 06
1
Darren's Out: 6/18 - 6/23
I will be gone from June 18th through the 23rd, and will be returning email when I return.
Thanks,
Darren
--- >8 ----
List archives: http://www.xiph.org/archives/
icecast project homepage: http://www.icecast.org/
To unsubscribe from this list, send a message to 'icecast-request@xiph.org'
containing only the word 'unsubscribe' in the body. No subject is needed.
Unsubscribe
2003 Jun 10
2
SecurID authentication for 3.6.1p2 with privsep
Hello all,
I have made SecurID authentication for OpenSSH 3.6.1p2.
This patch was totaly rewritten, so please test it before use.
Kbd-int authentication is now integrated into challenge response
auth.
Privsep is now fully suported.
PS: What do you think of selective access to the individual
authentications, similar to AllowGroups/DenyGroups or maybe
AllowUsers/DenyUsers ?
Vaclav Tomec
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
Hi All.
Attached is a patch which adds AIX native password expiry support to
sshd. It will only apply to -current and is a subset of the patch I have
been working on in the last few months (see bug #14 [1]). It contains
code by Pablo Sor, Mark Pitt and Zdenek Tlusty and fixes for bugs reported
by many others (see [2] for a full list).
It adds a do_tty_change_password function that execs
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
Hi All.
Attached is a patch introduces password expiry handling for AIX (other
platforms to follow). It is more or less the same as the previous patch
but has been updated to reflect recent changes to auth-passwd.c
I'm wondering if the AIX parts of auth.c should be moved to port-aix.c
and if the generic password change functions (currently at the end of
auth-passwd.c) belong in a separate
2003 Aug 18
2
SFTP Logging in openssh-3.6.1p2
Hello,
I try to log the file transferts, connections, errors on sftp server
with openssh-3.6.1p2. I have seen some patches, but not for this release.
Is it possible to put the logging facility in the standard code ?
Where can I find the patch for the last version ?
Thanks for your help and your good work.
Dominique
2007 Sep 21
0
openssh-4.7p1 & RemoteForward to openssh-3.6.1p2 Disconnecting: Bad, packet length
Hi,
I've just upgraded to openssh-4.7p1 on my gentoo box, and I've noticed a incompatibility with openssh-3.6.1p2 running on a redhat AS3 server.
If I ssh from my openssh-4.7_p1 client to the openssh-3.6.1p2 server, and RemoteForward a port, the ssh connection closes if I try to send more than roughly 300K through the tunneled port. The problem isn't present when I use openssh-4.6p1
2007 Sep 20
0
openssh-4.7p1 & RemoteForward to openssh-3.6.1p2 Disconnecting: Bad packet length
Hi,
I've just upgraded to openssh-4.7p1 on my gentoo box, and I've noticed a incompatibility with openssh-3.6.1p2 running on a redhat AS3 server.
If I ssh from my openssh-4.7_p1 client to the openssh-3.6.1p2 server, and RemoteForward a port, the ssh connection closes if I try to send more than roughly 300K through the tunneled port. The problem isn't present when I use openssh-4.6p1
2003 May 07
1
3.6.1p2, Spurious PAM failure messages WITH "PermitEmptyPasswords no", and a (micro) fix
Hi,
after installing 3.6.1p2 I noticed spurious PAM login failures
even with PermitEmptyPasswords set to "no":
sshd(pam_unix)[1740]: authentication failure; logname=XXX uid=0 euid=0
tty=NODEVssh ruser= rhost=localhost user=XXX
After looking at the code I noticed the following in the portability p2
patch:
+++ openssh-3.6.1p2/auth-passwd.c 2003-04-29 19:12:08.000000000 +1000
2003 May 17
1
[Bug 569] Problem compiling openssh 3.6.1p2
http://bugzilla.mindrot.org/show_bug.cgi?id=569
Summary: Problem compiling openssh 3.6.1p2
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2003 Jul 10
1
OpenSSH 3.6.1p2 +UnixWare 7.1.1 +SSH2 + PasswordAuthentication no + PermitEmptyPasswords yes (followup)
Greetings,
Problem : Openssh3.6.1p2 on UnixWare 7.1.1 allows access to passwordless
account without a valid key when sshd_config has PasswordAuthentication no
+ PermitEmptyPasswords yes
Attempts:
Installed maintence pack3 and recompiled both OpenSSH and OpenSSL (0.9.7b)
with native c compiler.
Recompiled both OpenSSH and OpenSSL (0.9.7b) with gcc (2.95.2).
Still the same problem.
Looking at
2003 May 04
1
openssh-3.6.1p2 hpux-10.20
Compilation of openssh-3.6.1p2 on hpux-10.20 stops with ..
(cd openbsd-compat && make)
gcc -O2 -mpa-risc-2-0 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.. -I. -I./.. -I/opt/openssl/include -I ./INCLUDES -D_HPUX_SOURCE -D_XOPEN_SOURCE -D_XOPEN_SOURCE_EXTENDED=1 -DHAVE_CONFIG_H -c bsd-arc4random.c
In file included from ../openbsd-compat/openbsd-compat.h:35,
from