0b77dc9b0b
Thu Sep 25 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3.1-6 - fix bug in patch to make rlogind start login with a clean environment a la netkit rlogin, spotted and fixed by Scott McClung Tue Sep 23 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3.1-5 - include profile.d scriptlets in krb5-devel so that krb5-config will be in the path, reported by Kir Kolyshkin Mon Sep 08 2003 Nalin Dahyabhai <nalin@redhat.com> - add more etypes (arcfour) to the default enctype list in kdc.conf - don't apply previous patch, refused upstream Fri Sep 05 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3.1-4 - fix 32/64-bit bug storing and retrieving the issue_date in v4 credentials Wed Sep 03 2003 Dan Walsh <dwalsh@redhat.com> 1.3.1-3 - Don't check for write access on /etc/krb5.conf if SELinux Tue Aug 26 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3.1-2 - fixup some int/pointer varargs wackiness Tue Aug 05 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3.1-1 - rebuild Mon Aug 04 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3.1-0 - update to 1.3.1 Thu Jul 24 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3-2 - pull fix for non-compliant encoding of salt field in etype-info2 preauth data from 1.3.1 beta 1, until 1.3.1 is released. Mon Jul 21 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3-1 - update to 1.3 Mon Jul 07 2003 Nalin Dahyabhai <nalin@redhat.com> 1.2.8-4 - correctly use stdargs Wed Jun 18 2003 Nalin Dahyabhai <nalin@redhat.com> 1.3-0.beta.4 - test update to 1.3 beta 4 - ditch statglue build option - krb5-devel requires e2fsprogs-devel, which now provides libss and libcom_err Wed Jun 04 2003 Elliot Lee <sopwith@redhat.com> - rebuilt Wed May 21 2003 Jeremy Katz <katzj@redhat.com> 1.2.8-2 - gcc 3.3 doesn't implement varargs.h, include stdarg.h instead Wed Apr 09 2003 Nalin Dahyabhai <nalin@redhat.com> 1.2.8-1 - update to 1.2.8
50 lines
1.9 KiB
Diff
50 lines
1.9 KiB
Diff
Start with only TERM defined in the environment, like NetKit rlogind does.
|
|
--- krb5-1.3/src/appl/bsd/krlogind.c
|
|
+++ krb5-1.3/src/appl/bsd/krlogind.c
|
|
@@ -713,6 +713,9 @@
|
|
#else
|
|
struct sgttyb b;
|
|
#endif /* POSIX_TERMIOS */
|
|
+ char environ_term[sizeof(term) + 6], environ_ccname[sizeof(environ_term)];
|
|
+ char *bare_environ[] = {environ_term, environ_ccname, NULL};
|
|
+
|
|
if ((retval = pty_open_slave(line, &t))) {
|
|
fatal(f, error_message(retval));
|
|
exit(1);
|
|
@@ -819,11 +822,15 @@
|
|
/* use the vendors login, which has -p and -f. Tested on
|
|
* AIX 4.1.4 and HPUX 10
|
|
*/
|
|
+ memset(environ_term, '\0', sizeof(environ_term));
|
|
+ memset(environ_ccname, '\0', sizeof(environ_ccname));
|
|
+ if (getenv("KRB5CCNAME") != NULL)
|
|
+ snprintf(environ_ccname, sizeof(environ_ccname) - 1, "KRB5CCNAME=%s", getenv("KRB5CCNAME"));
|
|
{
|
|
char *cp;
|
|
if ((cp = strchr(term,'/')))
|
|
*cp = '\0';
|
|
- setenv("TERM",term, 1);
|
|
+ snprintf(environ_term, sizeof(environ_term) - 1, "TERM=%s", term);
|
|
}
|
|
|
|
retval = pty_make_sane_hostname((struct sockaddr *) fromp, maxhostlen,
|
|
@@ -832,13 +839,13 @@
|
|
if (retval)
|
|
fatalperror(f, "failed make_sane_hostname");
|
|
if (passwd_req)
|
|
- execl(login_program, "login", "-p", "-h", rhost_sane,
|
|
- lusername, 0);
|
|
+ execle(login_program, "login", "-p", "-h", rhost_sane,
|
|
+ lusername, 0, bare_environ);
|
|
else
|
|
- execl(login_program, "login", "-p", "-h", rhost_sane,
|
|
- "-f", lusername, 0);
|
|
+ execle(login_program, "login", "-p", "-h", rhost_sane,
|
|
+ "-f", lusername, 0, bare_environ);
|
|
#else /* USE_LOGIN_F */
|
|
- execl(login_program, "login", "-r", rhost_sane, 0);
|
|
+ execle(login_program, "login", "-r", rhost_sane, 0, bare_environ);
|
|
#endif /* USE_LOGIN_F */
|
|
syslog(LOG_ERR, "failed exec of %s: %s",
|
|
login_program, error_message(errno));
|