Displaying 20 results from an estimated 300 matches similar to: "test request: SCO with setluid() (i686-pc-sco3.2v5.0.7, possibly others)"
2001 Feb 21
2
SCO 5.0.5 setluid patch
I downloaded openssh-2.5.1p1 as soon as it was on the ftp servers just
to get the setluid patch. After compiling and installing on 5.0.5 I saw
that the luid still wasn't being set correctly whether sshd was run from
inetd or as a daemon from /etc/rc2.d/. I fiddled around and moved the
setluid() stuff up higher in session.c and now luid is now being set
correctly. I provided a regular diff
2002 Jun 25
3
BSD/OS with privsep
I need this for BSD/OS 4.2 + privsep
perhaps we should not call do_setusercontext() after
chroot().
--- sshd.c.orig Fri Jun 21 03:09:47 2002
+++ sshd.c Tue Jun 25 13:11:03 2002
@@ -548,21 +548,35 @@
/* Change our root directory*/
if (chroot(_PATH_PRIVSEP_CHROOT_DIR) == -1)
fatal("chroot(\"%s\"): %s", _PATH_PRIVSEP_CHROOT_DIR,
strerror(errno));
if
2001 Feb 08
5
Daily snapshots...
All,
How can I get at the daily snapshots?
When I go to the website, www.openssh.com, and follow the Linux
link to portable.html and then go to request the daily snapshot from
http://bass.directhit.com/openssh_snap/, I get prompted for a user id
and password. Needless to say, I ain't got.
That's real useful. Use to be, I could get the snapshots from
the ftp site. Then things
2002 Mar 12
2
sys/queue.h
removes HAVE_BOGUS_SYS_QUEUE_H and always use our queue.h. ok?
Index: acconfig.h
===================================================================
RCS file: /var/cvs/openssh/acconfig.h,v
retrieving revision 1.122
diff -u -r1.122 acconfig.h
--- acconfig.h 26 Feb 2002 16:40:49 -0000 1.122
+++ acconfig.h 12 Mar 2002 02:11:39 -0000
@@ -14,7 +14,6 @@
/* SCO workaround */
#undef
2001 Feb 27
1
small cleanup patch
configure.in: Open Server 5 doesn't need AC_DEFINE(BROKEN_SAVED_UIDS)
pathnames.h: add #ifndef _PATH_LS to fix
"src/pathnames.h", line 123: warning: macro redefined: _PATH_LS
--
Tim Rice Multitalents (707) 887-1469
tim at multitalents.net
-------------- next part --------------
--- openssh_cvs/configure.in.old Mon Feb 26 18:47:57 2001
+++ openssh_cvs/configure.in Mon Feb 26
2002 Apr 22
0
[Bug 224] New: configure.ac changes for crays
http://bugzilla.mindrot.org/show_bug.cgi?id=224
Summary: configure.ac changes for crays
Product: Portable OpenSSH
Version: 3.1p1
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: wendyp
2002 Apr 22
0
[Bug 224] configure.ac changes for crays
http://bugzilla.mindrot.org/show_bug.cgi?id=224
------- Additional Comments From wendyp at cray.com 2002-04-23 09:12 -------
sorry, slight error with that last patch.
try this instead (with 22 april snapshot):
--- configure.ac.orig Mon Apr 22 14:31:27 2002
+++ configure.ac Mon Apr 22 14:32:48 2002
@@ -236,12 +236,29 @@
AC_CHECK_FUNCS(getluid setluid)
MANTYPE=man
2003 Sep 05
2
3.6p1 bug on SCO OpenServer
SCO OpenServer 5.0.x
Openssh 3.6p1
loginrec.c writes incorrect data into the ut_id field of the utmp file.
This has been an issue since at least openssh 3.0.2 but I never bothered
to report it. For Openssh 3.6p1, defining WITH_ABBREV_NO_TTY corrects
the problem. Below is a brief patch to configure which does this. You
can observe the errant results in the "Line" column from the
2005 Sep 19
1
ssh hangs or gives Segmentation fault
Details of installation attached.
Effect: when I build and test (with full path names) ssh in the openssh...
directory, everything works fine. When I "install" it as per attached file
into a test-directory and run it from there, there are 2 phenomena:
either it just hangs, eating 96% of CPU
or it dies with a Segmentation fault (this is what happens most often)
Help needed
2001 Feb 20
1
_PATH_STDPATH and @bindir@
Sorry if this is stuff that's been talked about before. If it is, just
ignore me.
I'm curious to know why Portable OpenSSH doesn't include @bindir@ in
the _PATH_STDPATH. This would save most installers of portable OpenSSH
from having to --with-default-path=$PREFIX/bin in order to ensure that
scp will work properly. This would also, I imagine, save quite a lot
of hassle for
2001 Feb 12
3
add scp path to _PATH_STDPATH
what do you think about this patch to add the path to scp to
_PATH_STDPATH? is there a better or cleaner way to do this? i'm hoping
to ward off 'scp doesn't work' questions for the next release.
i did *not* add this to a --with-default-path path, because if a user
specifies that, they should control its value completely.
Index: Makefile.in
2007 Sep 10
1
4.7p1 password auth broken on SCO OSR6
openssh 4.7p1
SCO OSR6
Password authentication is non-functional. This seems dependent on
USE_LIBIAF which further depends on HAVE_LIBIAF (in defines.h), but
there is no longer any code in configure to define the latter. Building
with HAVE_LIBIAF defined enables password authentication, but only for
non-long (<9 char) passwords, even though UNIXWARE_LONG_PASSWORDS seems
to be defined. I
2001 Mar 15
1
News from AIX
Hi,
News from the "AIX is different than the rest of the world" department...
AIX has something similar to setluid() on SCO, just that it uses text
strings (similar to setenv()) and calls it "usrinfo". I've appended
the man page below.
Under normal conditions, well-behaved applications use ttyname(),
logname() and getuid() get the relevant informations, but today
2001 Feb 22
11
Lets try this push again.. 2.5.1p2 bugs left.
Things that are still outstanding:
1) Solaris/Redhat/HPUX session.c patch. I've not seen a ya or na on
Kevin's pam patch from the Solaris group.
2) Odd Redhat/Debian scp/ssh issues. .. I'm baffled, and I can't
replicate the bug. Nor have I seen anything remotely like it reported.
3) SCO.. Is it happy yet for compiling? =)
Completed:
1) mdoc2man.pl .. Commited into
2003 Dec 30
8
[Bug 651] SCO 3.2v4.2 and OpenSSH 3.7.1p1 --> connection hangs and does not close (ssh2 only)
http://bugzilla.mindrot.org/show_bug.cgi?id=651
------- Additional Comments From vikashb at comparexafrica.co.za 2003-12-30 16:39 -------
tried openssh-SNAP-20031223
does not compile:
(cd openbsd-compat && make)
gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.. -I. -I./..
-I/usr/local/ssl/include -Dftruncate=chsize -I/usr/local/include
-DHAVE_CONFIG_H -c
2002 Sep 11
1
tru64 sia: move call of session_setup_sia() to do_setusercontext(), letting grantpty() and friends handle pty perms
Hi-
Under privsep, I experimented with moving the session_setup_sia() out of
do_child() and into do_setusercontext(), which is where the uids/gids are set
to the final execution user. The call is made with a NULL tty, and this
is functional provided that any later pty allocation uses grantpty() to
set the device permissions. Logging in with this method shows that a utmp
entry does get made for
2018 Nov 29
2
Where to implement user limit settings ?
Hello,
I'm trying to implement setting of user limits (ulimit) in sshd. I'm
not using PAM so I need it in the sshd itself. The task is very simple -
just to put one line calling setup_limits(pw); and link with -lshadow.
But the problem is, where to put this line. I did it in session.c,
in do_child(), like this:
#ifdef HAVE_OSF_SIA
session_setup_sia(pw, s->ttyfd == -1 ? NULL
2006 Apr 27
0
bug in OpenSSH_4.3p2: pam_open_session() called but not close for root users
For root sessions pam_open_session is called, but not pam_close_session.
sshd behavior is broken for root logins because if pam session
is run from the child, close is never called due to exec:
on open
since use_privsep is not set, parent calls do_exec_pty(),
which does not open session. then, it skips calling do_setusercontext(),
so it does not open session.
child calls
2004 Aug 23
8
[Bug 918] ssh_gssapi_storecreds called to late to be usable by PAM in sesion.c
http://bugzilla.mindrot.org/show_bug.cgi?id=918
Summary: ssh_gssapi_storecreds called to late to be usable by PAM
in sesion.c
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: PAM support
AssignedTo:
2003 Jan 09
1
[PATCH] Allow multiple accounts on Windows 9x/Me
Hi,
the following patch by Pierre A. Humblet <Pierre.Humblet at ieee.org>
allows to use more than one uid on 9x/Me boxes which is currently
blocked due to the behaviour of Cygwin's security code. After this
patch is applied to sshd, we can safely change the affected code in
Cygwin.
Thanks,
Corinna
Index: session.c
===================================================================