diff options
author | Colin Watson <cjwatson@debian.org> | 2010-03-31 10:46:28 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2010-03-31 10:46:28 +0100 |
commit | efd3d4522636ae029488c2e9730b60c88e257d2e (patch) | |
tree | 31e02ac3f16090ce8c53448677356b2b7f423683 /openbsd-compat/port-aix.c | |
parent | bbec4db36d464ea1d464a707625125f9fd5c7b5e (diff) | |
parent | d1a87e462e1db89f19cd960588d0c6b287cb5ccc (diff) |
* New upstream release (LP: #535029).
- After a transition period of about 10 years, this release disables SSH
protocol 1 by default. Clients and servers that need to use the
legacy protocol must explicitly enable it in ssh_config / sshd_config
or on the command-line.
- Remove the libsectok/OpenSC-based smartcard code and add support for
PKCS#11 tokens. This support is enabled by default in the Debian
packaging, since it now doesn't involve additional library
dependencies (closes: #231472, LP: #16918).
- Add support for certificate authentication of users and hosts using a
new, minimal OpenSSH certificate format (closes: #482806).
- Added a 'netcat mode' to ssh(1): "ssh -W host:port ...".
- Add the ability to revoke keys in sshd(8) and ssh(1). (For the Debian
package, this overlaps with the key blacklisting facility added in
openssh 1:4.7p1-9, but with different file formats and slightly
different scopes; for the moment, I've roughly merged the two.)
- Various multiplexing improvements, including support for requesting
port-forwardings via the multiplex protocol (closes: #360151).
- Allow setting an explicit umask on the sftp-server(8) commandline to
override whatever default the user has (closes: #496843).
- Many sftp client improvements, including tab-completion, more options,
and recursive transfer support for get/put (LP: #33378). The old
mget/mput commands never worked properly and have been removed
(closes: #270399, #428082).
- Do not prompt for a passphrase if we fail to open a keyfile, and log
the reason why the open failed to debug (closes: #431538).
- Prevent sftp from crashing when given a "-" without a command. Also,
allow whitespace to follow a "-" (closes: #531561).
Diffstat (limited to 'openbsd-compat/port-aix.c')
-rw-r--r-- | openbsd-compat/port-aix.c | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/openbsd-compat/port-aix.c b/openbsd-compat/port-aix.c index d9c0876f3..0bdefbf6d 100644 --- a/openbsd-compat/port-aix.c +++ b/openbsd-compat/port-aix.c | |||
@@ -374,6 +374,31 @@ aix_restoreauthdb(void) | |||
374 | 374 | ||
375 | # endif /* WITH_AIXAUTHENTICATE */ | 375 | # endif /* WITH_AIXAUTHENTICATE */ |
376 | 376 | ||
377 | # ifdef USE_AIX_KRB_NAME | ||
378 | /* | ||
379 | * aix_krb5_get_principal_name: returns the user's kerberos client principal name if | ||
380 | * configured, otherwise NULL. Caller must free returned string. | ||
381 | */ | ||
382 | char * | ||
383 | aix_krb5_get_principal_name(char *pw_name) | ||
384 | { | ||
385 | char *authname = NULL, *authdomain = NULL, *principal = NULL; | ||
386 | |||
387 | setuserdb(S_READ); | ||
388 | if (getuserattr(pw_name, S_AUTHDOMAIN, &authdomain, SEC_CHAR) != 0) | ||
389 | debug("AIX getuserattr S_AUTHDOMAIN: %s", strerror(errno)); | ||
390 | if (getuserattr(pw_name, S_AUTHNAME, &authname, SEC_CHAR) != 0) | ||
391 | debug("AIX getuserattr S_AUTHNAME: %s", strerror(errno)); | ||
392 | |||
393 | if (authdomain != NULL) | ||
394 | xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomain); | ||
395 | else if (authname != NULL) | ||
396 | principal = xstrdup(authname); | ||
397 | enduserdb(); | ||
398 | return principal; | ||
399 | } | ||
400 | # endif /* USE_AIX_KRB_NAME */ | ||
401 | |||
377 | # if defined(AIX_GETNAMEINFO_HACK) && !defined(BROKEN_ADDRINFO) | 402 | # if defined(AIX_GETNAMEINFO_HACK) && !defined(BROKEN_ADDRINFO) |
378 | # undef getnameinfo | 403 | # undef getnameinfo |
379 | /* | 404 | /* |