jnemeth
74cf788741
PR/30730 force changing password via chsh fails
...
PR/33502 password aging not working
copy old_pwd to new_pwd before modifying
2006-05-30 19:48:07 +00:00
christos
d49dbefade
Coverity CID 3783: Fix uninit variable.
2006-05-25 15:27:35 +00:00
christos
4d02435f76
Coverity CID 3677: Plug memory leak
2006-05-23 00:58:42 +00:00
christos
ad04b86013
Remove old kerberos library (Jukka Salmi)
2006-03-20 21:22:40 +00:00
christos
85e611dd01
Goodbye KerberosIV
2006-03-20 04:03:10 +00:00
christos
6b8123e7e5
Coverity CID 1909: Prevent memory leak.
2006-03-19 21:21:18 +00:00
christos
e5d241d0e4
Coverity CID 2480: Move variable initialization higher up to prevent
...
uninitialized access during error cleanup.
2006-03-19 21:15:21 +00:00
christos
81cd8f57a4
Coverity CID 2481: Move initialization of variable higher up to prevent
...
uninitialized access in error path.
2006-03-19 21:11:28 +00:00
christos
082737ff51
Coverity CID 2595: Don't call cc_destroy after cc_close because cc_close
...
free's the second argument.
2006-03-19 21:07:55 +00:00
jnemeth
0c47a67596
Fix coverity run 5, issue 2018 -- memory leak.
...
Approved by christos.
2006-03-19 06:52:26 +00:00
jnemeth
216a33af30
Fix Coverity run 5, issue 2022 -- memory leak.
...
Approved by christos@.
2006-03-18 10:53:17 +00:00
jnemeth
f358706242
Fix Coverity run 5, issue 2498 -- uninitialized variable
...
Fix Coverity run 5, issue 707 -- unreachable code
Approved by Christos.
2006-03-18 10:06:16 +00:00
jnemeth
9804398129
PR/30923: Zafer Aydogan: pam too verbose
...
Syslog root login failures on insecure terminals.
Approved by christos@.
2006-03-06 23:08:20 +00:00
christos
e551462e89
PR/32870: Johan Veenhuizen: login(1) does not obey .hushlogin
2006-02-19 00:12:36 +00:00
bouyer
5cd3d133bf
Use the class of the user, not then default class, when checking for
...
nologin and ignorelogin login.conf(5) capabilities.
2006-02-15 20:28:32 +00:00
christos
7768338003
Declare what we services provide, otherwise pam assumes that we provide
...
everything and this breaks static linking.
2006-01-20 16:51:15 +00:00
tsarna
9b412b7436
Implement PAM_REFRESH_CRED / PAM_REINITIALIZE_CRED
...
support in pam_sm_setcred()
With this and a suitably pam-aware screen locker (eg xscreensaver built
with PAM), you now get the nice Windows-style behavior of having
your tickets refreshed (and tokens, with pam_afslog) when you unlock
your screen.
2005-09-27 14:38:19 +00:00
wiz
d61c7b6e74
Remove trailing whitespace. Punctuation nits. Use .Nm more.
...
Use .An. Sort SEE ALSO.
2005-09-23 19:56:16 +00:00
tsarna
4019a4212f
pam_afslog is used in conjunction with pam_krb5 to obtain AFS tokens and
...
create a PAG if necessary.
Especially important for home directories on AFS.
2005-09-21 14:19:08 +00:00
matt
ae59c445be
Remove CPPFLAGS
2005-04-25 17:21:31 +00:00
matt
51ba88ed0f
Add ${DESTDIR}/usr/include/krb5 to CPPFLAGS so <parse_units.h> can be found.
2005-04-25 15:43:34 +00:00
matt
bb1ca526b7
Don't cast the lvalue; cast the rhs instead.
2005-04-25 15:42:46 +00:00
yamt
8c79aa408b
s!/var/run/nologin!/etc/nologin!g to match with the code.
2005-04-25 10:24:06 +00:00
christos
b4073cddaf
Fix getgrnam -> getgrnam_r
2005-04-19 13:04:38 +00:00
christos
e640241b82
fix getgrnam -> getgrnam_r and add a forgotten getpwnam -> gepwnam_r
...
From john nemeth
2005-04-19 13:04:19 +00:00
lukem
01cf9d0263
Safety boots: don't depend upon getpwnam_r() to set pwd to NULL on all
...
failures, especially if we're going to ignore the return result.
2005-04-19 03:40:16 +00:00
lukem
a767f5ec9c
getpw*_r() may return 0 and set pwd==NULL
2005-04-19 03:38:08 +00:00
christos
2a62e4e1ad
check for pwd != in getpw*_r functions.
2005-04-19 03:15:34 +00:00
christos
b4eda329f4
Don't print an error if we are doing authentication.
2005-04-05 18:24:17 +00:00
thorpej
59cbc9e205
Use getpwnam_r().
2005-03-31 15:11:54 +00:00
christos
611fb1aa58
Make S/Key prompt compliant with RFC 2289. Patch supplied by Dave Huang
...
in PR bin/23167.
2005-03-20 16:48:47 +00:00
christos
dbf71d82fb
remove debugging printf's
2005-03-17 01:14:40 +00:00
christos
99186ebfc8
Clear the authorization token at the entry of each loop, so that
...
we get a chance to re-enter.
2005-03-17 01:13:59 +00:00
christos
52ffc9e55d
remove code to deal with authorized keys. it has no place here.
2005-03-14 23:39:26 +00:00
christos
041bcdce98
Go back to rev-1.5. This is better than what was there before, but I am
...
still uncertain about the proper way to dealing what keys to accept.
2005-03-14 05:45:48 +00:00
christos
56cc440468
Revert previous. This is not the right fix.
2005-03-14 05:40:35 +00:00
christos
adb433f9e5
Do not let keys that are not listed in authorized_keys participate
...
in authentication. Problem reported by Maximum Entropy.
2005-03-14 05:35:23 +00:00
christos
811c70b5c5
Free the prompt response.
2005-03-05 20:33:40 +00:00
christos
a3df4155fc
PR/29566: Izumi Tsutsui: login(1) shows wrong last-login-from host
...
Caused by improper initialization of struct lastlogx. Code has been
completely restructured, and we also now use pam_prompt() instead of
printf().
cvs: ----------------------------------------------------------------------
2005-03-05 20:32:41 +00:00
christos
fde63d0ea8
If authentication failed because the user was not in wheel, say so like
...
the old su did. From John Nemeth
2005-03-05 15:39:43 +00:00
christos
3d37b7e762
Document the no_nested option.
2005-03-03 02:11:49 +00:00
christos
fa02801fbd
- Fix the quiet option; use login_cap to determine if we should print or not.
...
- Add nested user handling, including a no_nested option to control it.
2005-03-03 02:11:40 +00:00
wiz
15a3d47d36
Improve wording of the BUGS section to make it easier to understand.
...
Ok'd by christos.
2005-02-28 15:21:25 +00:00
wiz
49d2a708c0
Bump date for previous. Remove trailing whitespace. Sort SEE ALSO.
...
Remove superfluous .Pp.
2005-02-28 10:34:17 +00:00
wiz
e368145667
Bump date for new SECURITY CONSIDERATIONS section.
2005-02-28 10:31:41 +00:00
christos
d747ae24a0
Document that this is broken and not used.
2005-02-28 01:25:01 +00:00
thorpej
a4e3f97482
Add a SECURITY CONSIDERATIONS section.
2005-02-27 21:33:02 +00:00
thorpej
80ea74d85d
Add a SECURITY CONSIDRATIONS section.
2005-02-27 21:32:46 +00:00
thorpej
11b55133f0
Add an S/Key PAM module.
2005-02-27 21:01:59 +00:00
christos
901ebd51aa
NetBSD does not allow setuid(user) when euid=user, and ruid=0. Change
...
the logic for setting the uid/gid/groups for the agent around and also
add error checking. I.e. Don't exec the agent, if we could not set
the proper environment for it. Add a few more debugging lines. Now ssh
authentication works through xdm.
2005-02-27 01:16:27 +00:00