diff options
author | Damien Miller <djm@mindrot.org> | 2000-10-14 16:23:11 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-10-14 16:23:11 +1100 |
commit | 874d77bb134a21a5cf625956b60173376a993ba8 (patch) | |
tree | 93dd73b2ff1fbf0ad5f3978a2c4e0d8438a0bf7c /auth-krb4.c | |
parent | 89d9796fbedef4eed6956a2c095c7cc25330c28d (diff) |
- (djm) Big OpenBSD sync:
- markus@cvs.openbsd.org 2000/09/30 10:27:44
[log.c]
allow loglevel debug
- markus@cvs.openbsd.org 2000/10/03 11:59:57
[packet.c]
hmac->mac
- markus@cvs.openbsd.org 2000/10/03 12:03:03
[auth-krb4.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c auth-rsa.c auth1.c]
move fake-auth from auth1.c to individual auth methods, disables s/key in
debug-msg
- markus@cvs.openbsd.org 2000/10/03 12:16:48
ssh.c
do not resolve canonname, i have no idea why this was added oin ossh
- markus@cvs.openbsd.org 2000/10/09 15:30:44
ssh-keygen.1 ssh-keygen.c
-X now reads private ssh.com DSA keys, too.
- markus@cvs.openbsd.org 2000/10/09 15:32:34
auth-options.c
clear options on every call.
- markus@cvs.openbsd.org 2000/10/09 15:51:00
authfd.c authfd.h
interop with ssh-agent2, from <res@shore.net>
- markus@cvs.openbsd.org 2000/10/10 14:20:45
compat.c
use rexexp for version string matching
- provos@cvs.openbsd.org 2000/10/10 22:02:18
[kex.c kex.h myproposal.h ssh.h ssh2.h sshconnect2.c sshd.c dh.c dh.h]
First rough implementation of the diffie-hellman group exchange. The
client can ask the server for bigger groups to perform the diffie-hellman
in, thus increasing the attack complexity when using ciphers with longer
keys. University of Windsor provided network, T the company.
- markus@cvs.openbsd.org 2000/10/11 13:59:52
[auth-rsa.c auth2.c]
clear auth options unless auth sucessfull
- markus@cvs.openbsd.org 2000/10/11 14:00:27
[auth-options.h]
clear auth options unless auth sucessfull
- markus@cvs.openbsd.org 2000/10/11 14:03:27
[scp.1 scp.c]
support 'scp -o' with help from mouring@pconline.com
- markus@cvs.openbsd.org 2000/10/11 14:11:35
[dh.c]
Wall
- markus@cvs.openbsd.org 2000/10/11 14:14:40
[auth.h auth2.c readconf.c readconf.h readpass.c servconf.c servconf.h]
[ssh.h sshconnect2.c sshd_config auth2-skey.c cli.c cli.h]
add support for s/key (kbd-interactive) to ssh2, based on work by
mkiernan@avantgo.com and me
- markus@cvs.openbsd.org 2000/10/11 14:27:24
[auth.c auth1.c auth2.c authfile.c cipher.c cipher.h kex.c kex.h]
[myproposal.h packet.c readconf.c session.c ssh.c ssh.h sshconnect1.c]
[sshconnect2.c sshd.c]
new cipher framework
- markus@cvs.openbsd.org 2000/10/11 14:45:21
[cipher.c]
remove DES
- markus@cvs.openbsd.org 2000/10/12 03:59:20
[cipher.c cipher.h sshconnect1.c sshconnect2.c sshd.c]
enable DES in SSH-1 clients only
- markus@cvs.openbsd.org 2000/10/12 08:21:13
[kex.h packet.c]
remove unused
- markus@cvs.openbsd.org 2000/10/13 12:34:46
[sshd.c]
Kludge for F-Secure Macintosh < 1.0.2; appro@fy.chalmers.se
- markus@cvs.openbsd.org 2000/10/13 12:59:15
[cipher.c cipher.h myproposal.h rijndael.c rijndael.h]
rijndael/aes support
- markus@cvs.openbsd.org 2000/10/13 13:10:54
[sshd.8]
more info about -V
- markus@cvs.openbsd.org 2000/10/13 13:12:02
[myproposal.h]
prefer no compression
Diffstat (limited to 'auth-krb4.c')
-rw-r--r-- | auth-krb4.c | 16 |
1 files changed, 14 insertions, 2 deletions
diff --git a/auth-krb4.c b/auth-krb4.c index 799cf261a..21a9625e3 100644 --- a/auth-krb4.c +++ b/auth-krb4.c | |||
@@ -28,7 +28,7 @@ | |||
28 | #include "ssh.h" | 28 | #include "ssh.h" |
29 | #include "servconf.h" | 29 | #include "servconf.h" |
30 | 30 | ||
31 | RCSID("$OpenBSD: auth-krb4.c,v 1.18 2000/09/07 20:27:49 deraadt Exp $"); | 31 | RCSID("$OpenBSD: auth-krb4.c,v 1.19 2000/10/03 18:03:02 markus Exp $"); |
32 | 32 | ||
33 | #ifdef KRB4 | 33 | #ifdef KRB4 |
34 | char *ticket = NULL; | 34 | char *ticket = NULL; |
@@ -280,6 +280,8 @@ auth_kerberos_tgt(struct passwd *pw, const char *string) | |||
280 | { | 280 | { |
281 | CREDENTIALS creds; | 281 | CREDENTIALS creds; |
282 | 282 | ||
283 | if (pw == NULL) | ||
284 | goto auth_kerberos_tgt_failure; | ||
283 | if (!radix_to_creds(string, &creds)) { | 285 | if (!radix_to_creds(string, &creds)) { |
284 | log("Protocol error decoding Kerberos V4 tgt"); | 286 | log("Protocol error decoding Kerberos V4 tgt"); |
285 | packet_send_debug("Protocol error decoding Kerberos V4 tgt"); | 287 | packet_send_debug("Protocol error decoding Kerberos V4 tgt"); |
@@ -334,8 +336,16 @@ int | |||
334 | auth_afs_token(struct passwd *pw, const char *token_string) | 336 | auth_afs_token(struct passwd *pw, const char *token_string) |
335 | { | 337 | { |
336 | CREDENTIALS creds; | 338 | CREDENTIALS creds; |
337 | uid_t uid = pw->pw_uid; | 339 | uid_t uid; |
338 | 340 | ||
341 | if (pw == NULL) { | ||
342 | /* XXX fake protocol error */ | ||
343 | packet_send_debug("Protocol error decoding AFS token"); | ||
344 | packet_start(SSH_SMSG_FAILURE); | ||
345 | packet_send(); | ||
346 | packet_write_wait(); | ||
347 | return 0; | ||
348 | } | ||
339 | if (!radix_to_creds(token_string, &creds)) { | 349 | if (!radix_to_creds(token_string, &creds)) { |
340 | log("Protocol error decoding AFS token"); | 350 | log("Protocol error decoding AFS token"); |
341 | packet_send_debug("Protocol error decoding AFS token"); | 351 | packet_send_debug("Protocol error decoding AFS token"); |
@@ -349,6 +359,8 @@ auth_afs_token(struct passwd *pw, const char *token_string) | |||
349 | 359 | ||
350 | if (strncmp(creds.pname, "AFS ID ", 7) == 0) | 360 | if (strncmp(creds.pname, "AFS ID ", 7) == 0) |
351 | uid = atoi(creds.pname + 7); | 361 | uid = atoi(creds.pname + 7); |
362 | else | ||
363 | uid = pw->pw_uid; | ||
352 | 364 | ||
353 | if (kafs_settoken(creds.realm, uid, &creds)) { | 365 | if (kafs_settoken(creds.realm, uid, &creds)) { |
354 | log("AFS token (%s@%s) rejected for %s", creds.pname, creds.realm, | 366 | log("AFS token (%s@%s) rejected for %s", creds.pname, creds.realm, |