- rediff for zero fuzz tolerance
This commit is contained in:
parent
93a4744539
commit
09510adc7c
@ -2,10 +2,11 @@ Skip the initial empty-password check if permit_empty_passwd is disabled. This
|
|||||||
doesn't change the timing profiles of the host because the additional condition
|
doesn't change the timing profiles of the host because the additional condition
|
||||||
check which can short-circuit the call to pam_authenticate() has no dependency
|
check which can short-circuit the call to pam_authenticate() has no dependency
|
||||||
on the identity of the user who is being authenticated.
|
on the identity of the user who is being authenticated.
|
||||||
--- openssh-3.8p1/auth1.c 2004-02-26 21:05:25.000000000 -0500
|
diff -up openssh-5.1p1/auth1.c.skip-initial openssh-5.1p1/auth1.c
|
||||||
+++ openssh-3.8p1/auth1.c 2004-02-26 21:05:20.000000000 -0500
|
--- openssh-5.1p1/auth1.c.skip-initial 2008-07-09 12:54:05.000000000 +0200
|
||||||
@@ -76,7 +76,7 @@
|
+++ openssh-5.1p1/auth1.c 2008-07-23 18:26:01.000000000 +0200
|
||||||
authctxt->valid ? "" : "illegal user ", authctxt->user);
|
@@ -244,7 +244,7 @@ do_authloop(Authctxt *authctxt)
|
||||||
|
authctxt->valid ? "" : "invalid user ", authctxt->user);
|
||||||
|
|
||||||
/* If the user has no password, accept authentication immediately. */
|
/* If the user has no password, accept authentication immediately. */
|
||||||
- if (options.password_authentication &&
|
- if (options.password_authentication &&
|
||||||
@ -13,11 +14,12 @@ on the identity of the user who is being authenticated.
|
|||||||
#ifdef KRB5
|
#ifdef KRB5
|
||||||
(!options.kerberos_authentication || options.kerberos_or_local_passwd) &&
|
(!options.kerberos_authentication || options.kerberos_or_local_passwd) &&
|
||||||
#endif
|
#endif
|
||||||
--- openssh-3.8p1/auth2-none.c 2004-02-26 21:07:34.000000000 -0500
|
diff -up openssh-5.1p1/auth2-none.c.skip-initial openssh-5.1p1/auth2-none.c
|
||||||
+++ openssh-3.8p1/auth2-none.c 2004-02-26 21:07:28.000000000 -0500
|
--- openssh-5.1p1/auth2-none.c.skip-initial 2008-07-02 14:56:09.000000000 +0200
|
||||||
@@ -100,7 +100,7 @@
|
+++ openssh-5.1p1/auth2-none.c 2008-07-23 18:26:01.000000000 +0200
|
||||||
|
@@ -65,7 +65,7 @@ userauth_none(Authctxt *authctxt)
|
||||||
if (check_nt_auth(1, authctxt->pw) == 0)
|
if (check_nt_auth(1, authctxt->pw) == 0)
|
||||||
return(0);
|
return (0);
|
||||||
#endif
|
#endif
|
||||||
- if (options.password_authentication)
|
- if (options.password_authentication)
|
||||||
+ if (options.permit_empty_passwd && options.password_authentication)
|
+ if (options.permit_empty_passwd && options.password_authentication)
|
@ -75,13 +75,14 @@ Source1: openssh-nukeacss.sh
|
|||||||
Source2: sshd.pam
|
Source2: sshd.pam
|
||||||
Source3: sshd.init
|
Source3: sshd.init
|
||||||
Patch0: openssh-5.1p1-redhat.patch
|
Patch0: openssh-5.1p1-redhat.patch
|
||||||
Patch2: openssh-3.8.1p1-skip-initial.patch
|
Patch2: openssh-5.1p1-skip-initial.patch
|
||||||
Patch3: openssh-3.8.1p1-krb5-config.patch
|
Patch3: openssh-3.8.1p1-krb5-config.patch
|
||||||
Patch4: openssh-5.1p1-vendor.patch
|
Patch4: openssh-5.1p1-vendor.patch
|
||||||
Patch12: openssh-5.1p1-selinux.patch
|
Patch12: openssh-5.1p1-selinux.patch
|
||||||
Patch13: openssh-4.7p1-mls.patch
|
Patch13: openssh-4.7p1-mls.patch
|
||||||
Patch16: openssh-4.7p1-audit.patch
|
Patch16: openssh-4.7p1-audit.patch
|
||||||
Patch17: openssh-4.3p2-cve-2007-3102.patch
|
Patch17: openssh-4.3p2-cve-2007-3102.patch
|
||||||
|
Patch18: openssh-5.0p1-pam_selinux.patch
|
||||||
Patch22: openssh-3.9p1-askpass-keep-above.patch
|
Patch22: openssh-3.9p1-askpass-keep-above.patch
|
||||||
Patch24: openssh-4.3p1-fromto-remote.patch
|
Patch24: openssh-4.3p1-fromto-remote.patch
|
||||||
Patch27: openssh-5.1p1-log-in-chroot.patch
|
Patch27: openssh-5.1p1-log-in-chroot.patch
|
||||||
@ -94,7 +95,6 @@ Patch49: openssh-4.3p2-gssapi-canohost.patch
|
|||||||
Patch51: openssh-4.7p1-nss-keys.patch
|
Patch51: openssh-4.7p1-nss-keys.patch
|
||||||
Patch54: openssh-4.7p1-gssapi-role.patch
|
Patch54: openssh-4.7p1-gssapi-role.patch
|
||||||
Patch55: openssh-5.1p1-cloexec.patch
|
Patch55: openssh-5.1p1-cloexec.patch
|
||||||
Patch60: openssh-5.0p1-pam_selinux.patch
|
|
||||||
Patch62: openssh-3.9p1-scp-manpage.patch
|
Patch62: openssh-3.9p1-scp-manpage.patch
|
||||||
|
|
||||||
License: BSD
|
License: BSD
|
||||||
@ -199,7 +199,6 @@ into and executing commands on a remote machine. This package contains
|
|||||||
an X11 passphrase dialog for OpenSSH.
|
an X11 passphrase dialog for OpenSSH.
|
||||||
|
|
||||||
%prep
|
%prep
|
||||||
|
|
||||||
%setup -q
|
%setup -q
|
||||||
%patch0 -p1 -b .redhat
|
%patch0 -p1 -b .redhat
|
||||||
%patch2 -p1 -b .skip-initial
|
%patch2 -p1 -b .skip-initial
|
||||||
@ -212,6 +211,7 @@ an X11 passphrase dialog for OpenSSH.
|
|||||||
%patch13 -p1 -b .mls
|
%patch13 -p1 -b .mls
|
||||||
%patch16 -p1 -b .audit
|
%patch16 -p1 -b .audit
|
||||||
%patch17 -p1 -b .inject-fix
|
%patch17 -p1 -b .inject-fix
|
||||||
|
%patch18 -p1 -b .pam_selinux
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
%patch22 -p1 -b .keep-above
|
%patch22 -p1 -b .keep-above
|
||||||
@ -226,7 +226,6 @@ an X11 passphrase dialog for OpenSSH.
|
|||||||
%patch51 -p1 -b .nss-keys
|
%patch51 -p1 -b .nss-keys
|
||||||
%patch54 -p0 -b .gssapi-role
|
%patch54 -p0 -b .gssapi-role
|
||||||
%patch55 -p1 -b .cloexec
|
%patch55 -p1 -b .cloexec
|
||||||
%patch60 -p1 -b .pam_selinux
|
|
||||||
%patch62 -p0 -b .manpage
|
%patch62 -p0 -b .manpage
|
||||||
|
|
||||||
autoreconf
|
autoreconf
|
||||||
|
Loading…
Reference in New Issue
Block a user