summaryrefslogtreecommitdiffstats
path: root/session.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* - (djm) [auth-krb5.c auth.h session.c] Explicitly refer to Kerberos ccacheDamien Miller2004-04-161-2/+2
| | | | | file using FILE: method, fixes problems on Mac OSX. Patch from simon@sxw.org.uk; ok dtucker@
* - (dtucker) [session.c] Flush stdout after displaying loginmsg. FromDarren Tucker2004-04-071-0/+1
| | | | f_mohr at yahoo.de.
* - (dtucker) [session.c] Bug #817: Clear loginmsg after fork to preventDarren Tucker2004-03-271-0/+7
| | | | duplicate login messages for mutli-session logins. ok djm@
* - (dtucker) [session.c] Bug #789: Only make setcred call for !privsep in theDarren Tucker2004-02-231-1/+1
| | | | non-interactive path. ok djm@
* - (dtucker) [auth-pam.c auth-pam.h session.c] Bug #14: Use do_pwchange toDarren Tucker2004-02-101-18/+14
| | | | | change expired PAM passwords for SSHv1 connections without privsep. pam_chauthtok is still used when privsep is disabled. ok djm@
* - markus@cvs.openbsd.org 2004/01/30 09:48:57Darren Tucker2004-02-061-29/+60
| | | | | | | [auth-passwd.c auth.h pathnames.h session.c] support for password change; ok dtucker@ (set password-dead=1w in login.conf to use this). In -Portable, this is currently only platforms using bsdauth.
* - (dtucker) [session.c] Bug #789: Do not call do_pam_setcred as a non-rootDarren Tucker2004-02-061-1/+2
| | | | user, since some modules might fail due to lack of privilege. ok djm@
* - (dtucker) [acconfig.h configure.ac includes.h servconf.c session.c]Darren Tucker2004-01-231-2/+2
| | | | | | | | Change AFS symbol to USE_AFS to prevent namespace collisions, do not include kafs.h unless necessary. From deengert at anl.gov. For consistency, all of the libkafs bits are now inside "#if defined(KRB5) && defined(USE_AFS)".
* - (djm) Do pam_session processing for systems with HAVE_LOGIN_CAP; fromDamien Miller2004-01-231-0/+6
| | | | ralf.hack AT pipex.net; ok dtucker@
* - (dtucker) [session.c] Enable AFS support in conjunction with KRB5 notDarren Tucker2004-01-221-1/+1
| | | | | | | | just HEIMDAL. Currently this will make no difference, as only Heimdal (which defines KRB5 anyway) has libkafs, however a libkafs that works with MIT may become available. In that case it will be used too.
* - markus@cvs.openbsd.org 2004/01/13 19:23:15Damien Miller2004-01-211-1/+5
| | | | | [compress.c session.c] -Wall; ok henning
* - (dtucker) [acconfig.h configure.ac includes.h servconf.c session.c]Darren Tucker2004-01-051-1/+1
| | | | Only enable KerberosGetAFSToken if Heimdal's libkafs is found. with jakob@
* - jakob@cvs.openbsd.org 2003/12/23 16:12:10Darren Tucker2003-12-311-1/+27
| | | | | [servconf.c servconf.h session.c sshd_config] implement KerberosGetAFSToken server option. ok markus@, beck@
* - markus@cvs.openbsd.org 2003/12/02 17:01:15Darren Tucker2003-12-091-2/+2
| | | | | [channels.c session.c ssh-agent.c ssh.h sshd.c] use SSH_LISTEN_BACKLOG (=128) in listen(2).
* sync whitespace - no code changeDamien Miller2003-11-221-1/+0
|
* more whitespace (tabs this time)Damien Miller2003-11-211-6/+6
|
* - djm@cvs.openbsd.org 2003/11/21 11:57:03Damien Miller2003-11-211-4/+4
| | | | | | [everything] unexpand and delete whitespace at EOL; ok markus@ (done locally and RCS IDs synced)
* - (djm) Export environment variables from authentication subprocess toDamien Miller2003-11-171-1/+6
| | | | parent. Part of Bug #717
* - djm@cvs.openbsd.org 2003/11/04 08:54:09Damien Miller2003-11-171-2/+2
| | | | | | | | [auth1.c auth2.c auth2-pubkey.c auth.h auth-krb5.c auth-passwd.c] [auth-rhosts.c auth-rh-rsa.c auth-rsa.c monitor.c serverloop.c] [session.c] standardise arguments to auth methods - they should all take authctxt. check authctxt->valid rather then pw != NULL; ok markus@
* - markus@cvs.openbsd.org 2003/10/14 19:54:39Darren Tucker2003-10-151-2/+2
| | | | | [session.c ssh-agent.c] 10X for mkdtemp; djm@
* - (dtucker) [auth-pam.c auth-pam.h session.c] Make PAM use the new staticDarren Tucker2003-10-071-0/+7
| | | | cleanup functions. With & ok djm@
* - (dtucker) [session.c] Fix bus errors on some 64-bit Solaris configurations.Darren Tucker2003-10-021-2/+2
| | | | Based on patches by Matthias Koeppe and Thomas Baden. ok djm@
* - markus@cvs.openbsd.org 2003/09/23 20:17:11Darren Tucker2003-10-021-39/+55
| | | | | | | | | | | [Makefile.in auth1.c auth2.c auth.c auth.h auth-krb5.c canohost.c cleanup.c clientloop.c fatal.c gss-serv.c log.c log.h monitor.c monitor.h monitor_wrap.c monitor_wrap.h packet.c serverloop.c session.c session.h ssh-agent.c sshd.c] replace fatal_cleanup() and linked list of fatal callbacks with static cleanup_exit() function. re-refine cleanup_exit() where appropriate, allocate sshd's authctxt eary to allow simpler cleanup in sshd. tested by many, ok deraadt@
* - markus@cvs.openbsd.org 2003/09/18 08:49:45Darren Tucker2003-09-221-8/+10
| | | | | | [deattack.c misc.c session.c ssh-agent.c] more buffer allocation fixes; from Solar Designer; CAN-2003-0682; ok millert@
* - (dtucker) [session.c] Bug #643: Fix size_t -> u_int and fix null derefDarren Tucker2003-09-191-2/+4
| | | | | when /etc/default/login doesn't exist or isn't readable. Fixes from jparsons-lists at saffron.net and georg.oppenberg at deu mci com.
* - (dtucker) [acconfig.h configure.ac defines.h session.c] Bug #252: RetrieveDarren Tucker2003-09-161-7/+73
| | | | | PATH (or SUPATH) and UMASK from /etc/default/login on platforms that have it (eg Solaris, Reliant Unix). Patch from Robert.Dahlem at siemens.com. ok djm@
* - (djm) Bug #423: reorder setting of PAM_TTY and calling of PAM sessionDamien Miller2003-09-021-3/+4
| | | | | management (now done in do_setusercontext). Largely from michael_steffens AT hp.com
* - markus@cvs.openbsd.org 2003/08/31 13:29:05Damien Miller2003-09-021-13/+9
| | | | | | [session.c] call ssh_gssapi_storecreds conditionally from do_exec(); with sxw@inf.ed.ac.uk
* - markus@cvs.openbsd.org 2003/08/28 12:54:34Damien Miller2003-09-021-25/+1
| | | | | | | | [auth-krb5.c auth.h auth1.c monitor.c monitor.h monitor_wrap.c] [monitor_wrap.h readconf.c servconf.c session.c ssh_config.5] [sshconnect1.c sshd.c sshd_config sshd_config.5] remove kerberos support from ssh1, since it has been replaced with GSSAPI; but keep kerberos passwd auth for ssh1 and 2; ok djm, hin, henning, ...
* - (dtucker) [Makefile.in acconfig.h auth-krb5.c auth-pam.c auth-pam.hDarren Tucker2003-08-261-12/+12
| | | | | configure.ac defines.h gss-serv-krb5.c session.c ssh-gss.h sshconnect1.c sshconnect2.c] Add Portable GSSAPI support, patch by Simon Wilkinson.
* - markus@cvs.openbsd.org 2003/08/22 10:56:09Darren Tucker2003-08-261-2/+29
| | | | | | | | | [auth2.c auth2-gss.c auth.h compat.c compat.h gss-genr.c gss-serv-krb5.c gss-serv.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h servconf.c servconf.h session.c session.h ssh-gss.h ssh_config.5 sshconnect2.c sshd_config sshd_config.5] support GSS API user authentication; patches from Simon Wilkinson, stripped down and tested by Jakob and myself.
* - (djm) Bug #564: Perform PAM account checks for all authentications whenDamien Miller2003-08-251-0/+1
| | | | UsePAM=yes; ok dtucker
* - markus@cvs.openbsd.org 2003/08/13 08:33:02Darren Tucker2003-08-131-10/+4
| | | | | | [session.c] use more portable tcsendbreak(3) and ignore break_length; ok deraadt, millert
* - (dtucker) [session.c] Remove #ifdef TIOCSBRK kludge.Darren Tucker2003-08-131-4/+0
|
* - (dtucker) [session.c openbsd-compat/bsd-cygwin_util.h] Move CygwinDarren Tucker2003-08-071-6/+0
| | | | specific defines and includes to bsd-cygwin_util.h. Fixes build error too.
* - (dtucker) [session.c] Have session_break_req not attempt to send a breakDarren Tucker2003-08-071-0/+4
| | | | if TIOCSBRK and TIOCCBRK are not defined (eg Cygwin).
* - (dtucker) OpenBSD CVS SyncPOST_KRB4_REMOVALDarren Tucker2003-08-021-53/+4
| | | | | | | | | | | | | - markus@cvs.openbsd.org 2003/07/22 13:35:22 [auth1.c auth.h auth-passwd.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h readconf.c readconf.h servconf.c servconf.h session.c ssh.1 ssh.c ssh_config.5 sshconnect1.c sshd.c sshd_config.5 ssh.h] remove (already disabled) KRB4/AFS support, re-enable -k in ssh(1); test+ok henning@ - (dtucker) [Makefile.in acconfig.h configure.ac] Remove KRB4/AFS support. - (dtucker) [auth-krb4.c radix.c radix.h] Remove KRB4/AFS specific files. I hope I got this right....
* - (dtucker) [auth-passwd.c auth.c session.c sshd.c port-aix.c port-aix.h]Darren Tucker2003-07-081-8/+8
| | | | Convert aixloginmsg into platform-independant Buffer loginmsg.
* - (dtucker) Check return value of setpcred().Darren Tucker2003-07-081-1/+2
|
* - (dtucker) [acconfig.h auth-passwd.c configure.ac session.c port-aix.[ch]]Darren Tucker2003-07-081-1/+1
| | | | | Include AIX headers for authentication functions and make calls match prototypes. Test for and handle 3-args and 4-arg variants of loginfailed.
* - (djm) OpenBSD CVS SyncDamien Miller2003-06-031-4/+4
| | | | | | | | | | | | | - markus@cvs.openbsd.org 2003/06/02 09:17:34 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c] [canohost.c monitor.c servconf.c servconf.h session.c sshd_config] [sshd_config.5] deprecate VerifyReverseMapping since it's dangerous if combined with IP based access control as noted by Mike Harding; replace with a UseDNS option, UseDNS is on by default and includes the VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@ ok deraadt@, djm@ - (djm) Fix portable-specific uses of verify_reverse_mapping too
* - markus@cvs.openbsd.org 2003/05/14 22:24:42Damien Miller2003-05-151-1/+23
| | | | | [clientloop.c session.c ssh.1] allow to send a BREAK to the remote system; ok various
* - (djm) Add new UsePAM configuration directive to allow runtime controlDamien Miller2003-05-141-13/+17
| | | | | over usage of PAM. This allows non-root use of sshd when built with --with-pam
* - markus@cvs.openbsd.org 2003/05/11 20:30:25Damien Miller2003-05-141-2/+2
| | | | | [channels.c clientloop.c serverloop.c session.c ssh.c] make channel_new() strdup the 'remote_name' (not the caller); ok theo
* - (djm) RCSID sync w/ OpenBSDDamien Miller2003-05-141-1/+1
|
* *** empty log message ***Damien Miller2003-04-091-5/+5
|
* - (bal) Disable Privsep for Tru64 after pre-authentication due to issuesBen Lindstrom2003-03-211-1/+1
| | | | | with SIA. Also, clean up of tru64 support patch by Chris Adams <cmadams@hiwaay.net>
* - (djm) OpenBSD CVS SyncDamien Miller2003-03-101-4/+5
| | | | | | | - markus@cvs.openbsd.org 2003/03/05 22:33:43 [channels.c monitor.c scp.c session.c sftp-client.c sftp-int.c] [sftp-server.c ssh-add.c sshconnect2.c] fix memory leaks; from dlheine@suif.Stanford.EDU/CLOUSEAU; ok djm@
* - (djm) Bug #494: Allow multiple accounts on Windows 9x/Me;Damien Miller2003-02-241-4/+8
| | | | From vinschen@redhat.com
* - markus@cvs.openbsd.org 2003/02/06 09:26:23Damien Miller2003-02-241-1/+3
| | | | | [session.c] missing call to setproctitle() after authentication; ok provos@