4.7p1 password auth broken on SCO OSR6
Tim Rice
tim at multitalents.net
Tue Sep 11 09:14:48 EST 2007
On Mon, 10 Sep 2007, Roger Cornelius wrote:
> openssh 4.7p1
> SCO OSR6
>
> Password authentication is non-functional. This seems dependent on
> USE_LIBIAF which further depends on HAVE_LIBIAF (in defines.h), but
> there is no longer any code in configure to define the latter. Building
This patch will solve the missing HAVE_LIBIAF
------------
--- configure.ac.old 2007-08-15 09:16:29.007892000 -0700
+++ configure.ac 2007-09-10 15:54:26.072835157 -0700
@@ -2004,7 +2004,10 @@
saved_LIBS="$LIBS"
AC_CHECK_LIB(iaf, ia_openinfo, [
LIBS="$LIBS -liaf"
- AC_CHECK_FUNCS(set_id, [SSHDLIBS="$SSHDLIBS -liaf"])
+ AC_CHECK_FUNCS(set_id, [SSHDLIBS="$SSHDLIBS -liaf"
+ AC_DEFINE(HAVE_LIBIAF, 1,
+ [Define if system has libiaf that supports set_id])
+ ])
])
LIBS="$saved_LIBS"
------------
> with HAVE_LIBIAF defined enables password authentication, but only for
> non-long (<9 char) passwords, even though UNIXWARE_LONG_PASSWORDS seems
> to be defined. I haven't had time yet to investigate further.
Authentication in the SVR5 space on OpenServer 6 is still lacking.
(getluid/setluid)
Probably best to build in the osr5 space for now.
--
Tim Rice Multitalents (707) 887-1469
tim at multitalents.net
More information about the openssh-unix-dev
mailing list