4.7p1 password auth broken on SCO OSR6

Tim Rice tim at multitalents.net
Tue Sep 11 09:14:48 EST 2007


On Mon, 10 Sep 2007, Roger Cornelius wrote:

> openssh 4.7p1
> SCO OSR6
> 
> Password authentication is non-functional.  This seems dependent on
> USE_LIBIAF which further depends on HAVE_LIBIAF (in defines.h), but
> there is no longer any code in configure to define the latter.  Building

This patch will solve the missing HAVE_LIBIAF
------------
--- configure.ac.old	2007-08-15 09:16:29.007892000 -0700
+++ configure.ac	2007-09-10 15:54:26.072835157 -0700
@@ -2004,7 +2004,10 @@
 saved_LIBS="$LIBS"
 AC_CHECK_LIB(iaf, ia_openinfo, [
 	LIBS="$LIBS -liaf"
-	AC_CHECK_FUNCS(set_id, [SSHDLIBS="$SSHDLIBS -liaf"])
+	AC_CHECK_FUNCS(set_id, [SSHDLIBS="$SSHDLIBS -liaf"
+				AC_DEFINE(HAVE_LIBIAF, 1,
+        		[Define if system has libiaf that supports set_id])
+				])
 ])
 LIBS="$saved_LIBS"
 
------------

> with HAVE_LIBIAF defined enables password authentication, but only for
> non-long (<9 char) passwords, even though UNIXWARE_LONG_PASSWORDS seems
> to be defined.  I haven't had time yet to investigate further.

Authentication in the SVR5 space on OpenServer 6 is still lacking.
(getluid/setluid)

Probably best to build in the osr5 space for now.
 

-- 
Tim Rice				Multitalents	(707) 887-1469
tim at multitalents.net




More information about the openssh-unix-dev mailing list