Commit Graph

112 Commits

Author SHA1 Message Date
tls
4147a3c54a Add new Makefile knob, USE_FORT, which extends USE_SSP by turning on the
FORTIFY_SOURCE feature of libssp, thus checking the size of arguments to
various string and memory copy and set functions (as well as a few system
calls and other miscellany) where known at function entry.  RedHat has
evidently built all "core system packages" with this option for some time.

This option should be used at the top of Makefiles (or Makefile.inc where
this is used for subdirectories) but after any setting of LIB.

This is only useful for userland code, and cannot be used in libc or in
any code which includes the libc internals, because it overrides certain
libc functions with macros.  Some effort has been made to make USE_FORT=yes
work correctly for a full-system build by having the bsd.sys.mk logic
disable the feature where it should not be used (libc, libssp iteself,
the kernel) but no attempt has been made to build the entire system with
USE_FORT and doing so will doubtless expose numerous bugs and misfeatures.

Adjust the system build so that all programs and libraries that are setuid,
directly handle network data (including serial comm data), perform
authentication, or appear likely to have (or have a history of having)
data-driven bugs (e.g. file(1)) are built with USE_FORT=yes by default,
with the exception of libc, which cannot use USE_FORT and thus uses
only USE_SSP by default.  Tested on i386 with no ill results; USE_FORT=no
per-directory or in a system build will disable if desired.
2007-05-28 12:06:17 +00:00
christos
50873dad9c bump date 2007-03-10 18:31:42 +00:00
christos
6ccceec0a3 tyop 2007-03-10 18:31:07 +00:00
christos
33aa8ab0d0 off by one, reported by jukka salmi. 2007-03-10 18:30:45 +00:00
christos
476933786a PR/35968: Jukka Salmi: add option to pam_krb5(8) to request renewable tickets 2007-03-10 17:47:21 +00:00
hubertf
4d49175215 Remove unneeded #include of <libgen.h>
From: Slava Semushin <php-coder@altlinux.ru>
2007-03-09 23:44:50 +00:00
christos
4ed3eb7f90 init the syslog data. 2006-11-03 18:55:40 +00:00
christos
e76ecd93c1 use the re-entrant syslog functions so that we don't depend on the syslog
settings of the calling program.
2006-11-03 18:04:20 +00:00
christos
105f63f965 don't include syslog.h if you are not going to use it. 2006-11-03 18:03:23 +00:00
dogcow
f35a70b511 new ssh import requires another include 2006-09-29 04:56:04 +00:00
jnemeth
74cf788741 PR/30730 force changing password via chsh fails
PR/33502 password aging not working
copy old_pwd to new_pwd before modifying
2006-05-30 19:48:07 +00:00
christos
d49dbefade Coverity CID 3783: Fix uninit variable. 2006-05-25 15:27:35 +00:00
christos
4d02435f76 Coverity CID 3677: Plug memory leak 2006-05-23 00:58:42 +00:00
christos
ad04b86013 Remove old kerberos library (Jukka Salmi) 2006-03-20 21:22:40 +00:00
christos
85e611dd01 Goodbye KerberosIV 2006-03-20 04:03:10 +00:00
christos
6b8123e7e5 Coverity CID 1909: Prevent memory leak. 2006-03-19 21:21:18 +00:00
christos
e5d241d0e4 Coverity CID 2480: Move variable initialization higher up to prevent
uninitialized access during error cleanup.
2006-03-19 21:15:21 +00:00
christos
81cd8f57a4 Coverity CID 2481: Move initialization of variable higher up to prevent
uninitialized access in error path.
2006-03-19 21:11:28 +00:00
christos
082737ff51 Coverity CID 2595: Don't call cc_destroy after cc_close because cc_close
free's the second argument.
2006-03-19 21:07:55 +00:00
jnemeth
0c47a67596 Fix coverity run 5, issue 2018 -- memory leak.
Approved by christos.
2006-03-19 06:52:26 +00:00
jnemeth
216a33af30 Fix Coverity run 5, issue 2022 -- memory leak.
Approved by christos@.
2006-03-18 10:53:17 +00:00
jnemeth
f358706242 Fix Coverity run 5, issue 2498 -- uninitialized variable
Fix Coverity run 5, issue 707 -- unreachable code
Approved by Christos.
2006-03-18 10:06:16 +00:00
jnemeth
9804398129 PR/30923: Zafer Aydogan: pam too verbose
Syslog root login failures on insecure terminals.

Approved by christos@.
2006-03-06 23:08:20 +00:00
christos
e551462e89 PR/32870: Johan Veenhuizen: login(1) does not obey .hushlogin 2006-02-19 00:12:36 +00:00
bouyer
5cd3d133bf Use the class of the user, not then default class, when checking for
nologin and ignorelogin login.conf(5) capabilities.
2006-02-15 20:28:32 +00:00
christos
e531452f6f define where the dynamic modules go. 2006-02-05 02:38:25 +00:00
christos
ba9fdf89e5 Add all the modules to the static pam. This is required, otherwise pam does
not work on non pic builds because it does not find modules listed in
/etc/pam.d.
2006-01-20 16:52:55 +00:00
christos
7768338003 Declare what we services provide, otherwise pam assumes that we provide
everything and this breaks static linking.
2006-01-20 16:51:15 +00:00
tsarna
9b412b7436 Implement PAM_REFRESH_CRED / PAM_REINITIALIZE_CRED
support in pam_sm_setcred()

With this and a suitably pam-aware screen locker (eg xscreensaver built
with PAM), you now get the nice Windows-style behavior of having
your tickets refreshed (and tokens, with pam_afslog) when you unlock
your screen.
2005-09-27 14:38:19 +00:00
wiz
d61c7b6e74 Remove trailing whitespace. Punctuation nits. Use .Nm more.
Use .An. Sort SEE ALSO.
2005-09-23 19:56:16 +00:00
tsarna
4019a4212f pam_afslog is used in conjunction with pam_krb5 to obtain AFS tokens and
create a PAG if necessary.

Especially important for home directories on AFS.
2005-09-21 14:19:08 +00:00
christos
98785bd85a Get rid of pam debugging.
XXX: We should do this on the 3.0 branch too.
2005-08-28 07:41:41 +00:00
matt
ae59c445be Remove CPPFLAGS 2005-04-25 17:21:31 +00:00
matt
51ba88ed0f Add ${DESTDIR}/usr/include/krb5 to CPPFLAGS so <parse_units.h> can be found. 2005-04-25 15:43:34 +00:00
matt
bb1ca526b7 Don't cast the lvalue; cast the rhs instead. 2005-04-25 15:42:46 +00:00
yamt
8c79aa408b s!/var/run/nologin!/etc/nologin!g to match with the code. 2005-04-25 10:24:06 +00:00
christos
b4073cddaf Fix getgrnam -> getgrnam_r 2005-04-19 13:04:38 +00:00
christos
e640241b82 fix getgrnam -> getgrnam_r and add a forgotten getpwnam -> gepwnam_r
From john nemeth
2005-04-19 13:04:19 +00:00
lukem
01cf9d0263 Safety boots: don't depend upon getpwnam_r() to set pwd to NULL on all
failures, especially if we're going to ignore the return result.
2005-04-19 03:40:16 +00:00
lukem
a767f5ec9c getpw*_r() may return 0 and set pwd==NULL 2005-04-19 03:38:08 +00:00
christos
2a62e4e1ad check for pwd != in getpw*_r functions. 2005-04-19 03:15:34 +00:00
christos
b4eda329f4 Don't print an error if we are doing authentication. 2005-04-05 18:24:17 +00:00
thorpej
59cbc9e205 Use getpwnam_r(). 2005-03-31 15:11:54 +00:00
christos
611fb1aa58 Make S/Key prompt compliant with RFC 2289. Patch supplied by Dave Huang
in PR bin/23167.
2005-03-20 16:48:47 +00:00
christos
dbf71d82fb remove debugging printf's 2005-03-17 01:14:40 +00:00
christos
99186ebfc8 Clear the authorization token at the entry of each loop, so that
we get a chance to re-enter.
2005-03-17 01:13:59 +00:00
christos
52ffc9e55d remove code to deal with authorized keys. it has no place here. 2005-03-14 23:39:26 +00:00
christos
041bcdce98 Go back to rev-1.5. This is better than what was there before, but I am
still uncertain about the proper way to dealing what keys to accept.
2005-03-14 05:45:48 +00:00
christos
56cc440468 Revert previous. This is not the right fix. 2005-03-14 05:40:35 +00:00
christos
adb433f9e5 Do not let keys that are not listed in authorized_keys participate
in authentication. Problem reported by Maximum Entropy.
2005-03-14 05:35:23 +00:00