summaryrefslogtreecommitdiffstats
path: root/libexec/rexecd
Commit message (Collapse)AuthorAgeFilesLines
* The .Nm utilitycharnier2002-07-061-11/+16
|
* Unbreak static build and remove usage() that isn't usage().des2002-05-031-15/+8
| | | | Reviewed by: bde
* PAMify rexecd(8).des2002-05-022-116/+89
| | | | Sponsored by: DARPA, NAI Labs
* When opieverify() is fail, fallback to try unix password.ume2002-04-161-4/+9
| | | | Tested by: kuriyama
* Add an IPv6 support.ume2002-04-161-10/+23
| | | | | | | I dunno if there is an IPv6 supported rexec client. So, it was tested that this change doesn't break an IPv4. Tested by: kuriyama (IPv4 only)
* Make this compilable without -DOPIE.kuriyama2002-04-161-1/+1
| | | | Hint by: ume
* o __P removalimp2002-02-071-27/+20
| | | | | o register removal o use new style prototypes and function definitions
* Lock down with WFORMAT?=1, with overrides in the subdirectories whichkris2002-02-041-0/+1
| | | | are not yet warning-clean. Tested on i386 and alpha.
* Don't clobber the default for CFLAGS.bde2001-08-031-1/+1
|
* Use STD{ERR,IN,OUT}_FILENO instead of their numeric values. Thesheldonh2001-07-261-3/+3
| | | | | | | definitions are more readable, and it's possible that they're more portable to pathalogical platforms. Submitted by: David Hill <david@phobia.ms>
* Remove whitespace at EOL.dd2001-07-151-6/+6
|
* mdoc(7) police: removed HISTORY info from the .Os call.ru2001-07-101-1/+1
|
* Goodbye S/Key, Hello OPIE.markm2001-07-092-13/+17
| | | | | I believe I have done due dilligence on this, but I'd appreciate decent test scenarios and sucess (or failure) reports.
* Fix the type of the NULL arg to execl()brian2001-07-091-1/+1
| | | | Idea from: Theo de Raadt <deraadt@openbsd.org>
* Avoid a warning by making a variable a const char *.dwmalone2001-05-011-1/+2
|
* - Backout botched attempt to intoduce MANSECT feature.ru2001-03-261-0/+1
| | | | - MAN[1-9] -> MAN.
* Set the default manual section for libexec/ to 8.ru2001-03-201-1/+0
|
* Remove unused #include. Use getopt(3). Add usage() with syslog(3) cap.charnier2000-11-281-8/+22
|
* mdoc(7) police: use the new features of the Nm macro.ru2000-11-201-2/+2
|
* Man page fixupsnsayer2000-05-151-4/+7
| | | | Submitted by: sheldonh@uunet.co.za
* Add -i (insecure) flag to rexecd, which allows uid == 0 loginsnsayer2000-05-132-4/+11
| | | | | (presuming that the user in question is not in /etc/ftpusers and does not have a null password).
* $Id$ -> $FreeBSD$peter1999-08-283-3/+3
|
* Ensure that things returned by gethostname() andbrian1999-04-071-3/+3
| | | | | | | | | | friends are terminated and allow for a maximum host name length of MAXHOSTNAMELEN - 1. Put parenthesis around sizeof args. Make some variables static. Fix telnetd -u (broken by my last commit) Prompted by: bde
* Link with libutilbrian1999-04-061-3/+3
|
* Use realhostname() rather than various combinations ofbrian1999-04-061-6/+4
| | | | | | gethostbyaddr() & gethostbyname(). Remove brokeness in ftpd for hosts of MAXHOSTNAMELEN length.
* Use err(3). -Wall cleaning. Use Pa for file names and add section in Xrefs.charnier1997-11-262-23/+29
|
* Julian A's fix. Do chdir as user rather than as root. Fixes a minor NFSimp1997-03-241-8/+8
| | | | | | | | | compatibility problem at the same time. Some buffer made large enough for worst case hostname. fixes PR 2593. Reviewed by: Dan Cross and maybe others
* Revert $FreeBSD$ to $Id$peter1997-02-223-3/+3
|
* Buffer Overflow from OpenBSDimp1997-02-091-1/+1
| | | | | | rev 1.7 deraadt: buf oflow Obtained from: OpenBSD
* Make the long-awaited change from $Id$ to $FreeBSD$jkh1997-01-143-3/+3
| | | | | | | | This will make a number of things easier in the future, as well as (finally!) avoiding the Id-smashing problem which has plagued developers for so long. Boy, I'm glad we're not using sup anymore. This update would have been insane otherwise.
* Back out recent security patch for rexecd. After more careful analysis,pst1996-11-222-28/+15
| | | | | | | | | | it is both uneeded and breaks certain lock-step timing in the rexec protocol. Yes, an attacker can "relay" connections using this trick, but a properly configured firewall that would make this sort of subterfuge necessary in the first place (instead of direct packet spoofing) would also thwart useful attacks based on this.
* Do not attempt to open reverse channel until authentication phase haspst1996-11-192-17/+30
| | | | | | | | | | | | succeeded. Never allow the reverse channel to be to a privileged port. Cannidate for: 2.1 and 2.2 branches Reviewed by: pst (with local cleanups) Submitted by: Cy Shubert <cy@cwsys.cwent.com> Obtained from: Jaeger <jaeger@dhp.com> via BUGTRAQ
* add forgotten $Id$wosch1996-09-223-0/+4
|
* Check for expired passwords before allowing access to the system.mpp1995-08-281-1/+2
|
* rexecd was not calling "setlogin()" when it should have. This was causingpeter1995-07-291-0/+2
| | | | | | getlogin() to return wrong answers (eg: "root"). Reviewed by: davidg Obtained from: James Jegers, for NetBSD, slightly reworked by me.
* Remove trailing whitespace.rgrimes1995-05-301-1/+1
|
* Don't rely on the shared library bringing in libmd, do it explicitly.nate1995-03-181-2/+2
| | | | | | | Change the library order so libcrypt is the last library in the list. libskey contains references to _crypt and can't resolve it unless -lcrypt occurs after it in the link command. This only occurs when linking statically.
* make rexecd link against skeyaccess, not authfilepst1994-09-301-2/+2
|
* Tighen up rexecd(8) security (see manual page for details).pst1994-09-292-16/+58
| | | | | | | Rexecd is a crock, it never should have been written, however make it so that people who have a need to run it don't hurt themselves so badly. Obtained from: Ideas obtained from logdaemon 4.3 from Wietse Venema
* Add skey supportguido1994-08-212-2/+13
| | | | | Reviewed by: Submitted by: guido
* LDADD= -lcryptcsgr1994-08-201-0/+3
| | | | Submitted by: Geoff
* Update to new make macros and disable Kerberos because we haven't got itwollman1994-08-051-1/+1
| | | | set up right yet.
* BSD 4.4 Lite Libexec Sourcesrgrimes1994-05-273-0/+413
OpenPOWER on IntegriCloud