[OpenAFS] OpenSSH 3.5p1 + ~/.shosts + token passing?
steve rader
rader@ginseng.hep.wisc.edu
Thu, 07 Nov 2002 23:54:12 -0600
------- =_aaaaaaaaaa0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <15838.1036734592.1@ginseng>
It seems like ~/.shosts and token passing with OpenSSH 3.5p1
is broke. Or at least, I couldn't get it to work until I
hacked the source some. All I did--more or less--was re-add
code that was in the 2.3.0 (auth1.c) source. It seems like
somebody removed code for ~/.shosts + token passing somewhere
between 2.3.0 and 3.5.
Does anybody know what's up with that? Or am I on the bleeding
edge here? Or have I lost my marbles again?
I'd sure like to know what's going on before I go shoot my
mouth off at the OpenSSH folks!
steve
- - -
systems & network guy
high energy physics
university of wisconsin
------- =_aaaaaaaaaa0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <15838.1036734592.2@ginseng>
Content-Description: openssh-3.5p1-auth1.c.patch
*** auth1.c.orig Thu Sep 26 22:26:01 2002
--- auth1.c Thu Nov 7 23:38:23 2002
***************
*** 175,183 ****
packet_send_debug("Kerberos TGT passing disabled before authentication.");
break;
#ifdef AFS
! case SSH_CMSG_HAVE_AFS_TOKEN:
! packet_send_debug("AFS token passing disabled before authentication.");
! break;
#endif /* AFS */
#endif /* AFS || KRB5 */
--- 175,194 ----
packet_send_debug("Kerberos TGT passing disabled before authentication.");
break;
#ifdef AFS
! case SSH_CMSG_HAVE_AFS_TOKEN:
! if (!options.afs_token_passing || !k_hasafs()) {
! verbose("AFS token passing disabled.");
! } else {
! /* Accept AFS token. */
! char *token = packet_get_string(&dlen);
! packet_check_eom();
!
! if (!auth_afs_token(authctxt, token))
! verbose("AFS token refused for %.100s",
! authctxt->user);
! xfree(token);
! }
! break;
#endif /* AFS */
#endif /* AFS || KRB5 */
------- =_aaaaaaaaaa0--