259065 |
07-Dec-2013 |
gjb |
- Copy stable/10 (r259064) to releng/10.0 as part of the 10.0-RELEASE cycle. - Update __FreeBSD_version [1] - Set branch name to -RC1
[1] 10.0-CURRENT __FreeBSD_version value ended at '55', so start releng/10.0 at '100' so the branch is started with a value ending in zero.
Approved by: re (implicit) Sponsored by: The FreeBSD Foundation |
256281 |
10-Oct-2013 |
gjb |
Copy head (r256279) to stable/10 as part of the 10.0-RELEASE cycle.
Approved by: re (implicit) Sponsored by: The FreeBSD Foundation
|
254259 |
12-Aug-2013 |
trasz |
Make check for unknown login class actually work. Previously, using the "-c" option with login class not defined in login.conf(5) would silently fail, resulting in using the default login class.
|
254215 |
11-Aug-2013 |
trasz |
In su(1), fix option ordering and clarify that the login class specified must be defined in login.conf.
MFC after: 1 month
|
226428 |
16-Oct-2011 |
ed |
Undo r226423.
It seems su does build without warnings, but it requires a small fix to libbsm headers, which I have not committed to SVN yet.
|
226423 |
16-Oct-2011 |
ed |
Remove WARNS line. This tool builds with WARNS=6 properly.
|
222770 |
06-Jun-2011 |
gjb |
Attempt to clear up some confusion in the following example, by stating the '-c' argument is passed to the shell, not to su(1), which would indicate the login class.
'su -m <user> -c <command>'
Submitted by: Warren Block <wblock@wonkity.com> (followup to 157078) MFC after: 5 days
|
222759 |
06-Jun-2011 |
gjb |
Bump date from previous commit. :(
MFC after: 5 days
|
222758 |
06-Jun-2011 |
gjb |
Document that when running 'su -m <user> -c <command>', <command> is run within a shell as <user>.
PR: 157078 Submitted by: Warren Block <wblock@wonkity.com> MFC after: 5 days
|
220055 |
27-Mar-2011 |
ume |
getpwnam(3) may return NULL.
Requested by: nork Reviewed by: Takeharu KATO <takeharu1219__at__ybb.ne.jp>, nork MFC after: 1 week
|
216370 |
11-Dec-2010 |
joel |
Remove the advertising clause from UCB copyrighted files in usr.bin. This is in accordance with the information provided at ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change
Also add $FreeBSD$ to a few files to keep svn happy.
Discussed with: imp, rwatson
|
201386 |
02-Jan-2010 |
ed |
Build usr.bin/ with WARNS=6 by default.
Also add some missing $FreeBSD$ to keep svn happy.
|
200462 |
13-Dec-2009 |
delphij |
Revert most part of 200420 as requested, as more review and polish is needed.
|
200420 |
11-Dec-2009 |
delphij |
Remove unneeded header includes from usr.bin/ except contributed code.
Tested with: make universe
|
190700 |
04-Apr-2009 |
csjp |
Fixup the parameters to audit_submit(3) the order is errno then return value. This bug went un-noticed for so long because EPERM == 1
MFC after: 1 week Spotted by: sson, rwatson
|
180155 |
01-Jul-2008 |
danger |
- add the -m option to the example commands because they would fail w/o it as the ``man'' user does not have a valid shell by default.
PR: docs/121713 Approved by: trhodes MFC after: 3 days
|
179547 |
04-Jun-2008 |
dwmalone |
Fix a strict aliasing warning - I think it is really telling us that the way char * and void * pointers may not be stored in the same way.
|
172749 |
18-Oct-2007 |
davidxu |
The upper while loop has already recycled child process, so the if statement has never executed as expected, fix it.
MFC after: 3 days
|
171562 |
24-Jul-2007 |
delphij |
Stop mentioning /usr/X11R6.
Approved by: re (hrs)
|
171195 |
04-Jul-2007 |
scf |
Significantly reduce the memory leak as noted in BUGS section for setenv(3) by tracking the size of the memory allocated instead of using strlen() on the current value.
Convert all calls to POSIX from historic BSD API: - unsetenv returns an int. - putenv takes a char * instead of const char *. - putenv no longer makes a copy of the input string. - errno is set appropriately for POSIX. Exceptions involve bad environ variable and internal initialization code. These both set errno to EFAULT.
Several patches to base utilities to handle the POSIX changes from Andrey Chernov's previous commit. A few I re-wrote to use setenv() instead of putenv().
New regression module for tools/regression/environ to test these functions. It also can be used to test the performance.
Bump __FreeBSD_version to 700050 due to API change.
PR: kern/99826 Approved by: wes Approved by: re (kensmith)
|
169177 |
01-May-2007 |
ache |
Back out all POSIXified *env() changes.
Not because I admit they are technically wrong and not because of bug reports (I receive nothing). But because I surprisingly meets so strong opposition and resistance so lost any desire to continue that.
Anyone who interested in POSIX can dig out what changes and how through cvs diffs.
|
169125 |
30-Apr-2007 |
ache |
Prepare for upcoming POSIXed putenv() rewrite: don't free memory after putenv()
|
163665 |
24-Oct-2006 |
sobomax |
Backout previous change (SIGSYS related). The fix has been applied to the proper place.
Pointed out by: rwatson
|
163641 |
24-Oct-2006 |
sobomax |
Ignore SIGSYS when BSM is compiled in. Otherwise, attempt to invoke su on system that don't have audit framefork compiled into kernel or ia32 binary on amd64 system will result in SIGSYS. There is one place in su.c itself where it tries to check for errno != ENOSYS, but it has been a nop since su does not catch SIGSYS anyway. There are few other places in libbsm, where attempt to invoke audit syscal would result in SIGSYS if no audit support is present in the kernel, so that the only reliable method for now is to disable SIGSYS completely in the case when BSM is compiled in.
In the long run, both direct invocation of audit-related syscalls and libbsm should be made more intellegent to handle the case when BSM is not compiled into the kernel gracefully.
MFC after: 3 days (provided re@ approval)
|
162792 |
29-Sep-2006 |
ru |
Markup fixes.
|
162761 |
29-Sep-2006 |
luoqi |
Do not chdir(2) until after setuid(2), otherwise "su - username" would fail when root doesn't have the permission to enter target user's home directory. If set, PAM environment variable HOME will be used in chdir(2) instead of pwd->pw_dir, this allows pam_chroot module to continue to function.
|
162286 |
13-Sep-2006 |
joel |
Remove references to the pam(8) manual page. It does not exist.
Requested by: novel Discussed with: brueffer, simon
|
161815 |
01-Sep-2006 |
csjp |
Integrate audit_submit(3) bits into su. This means that records for successful and failed su attempts will be recorded using the AUE_su event type (login or lo class) if auditing is present in the system. Currently, the records will have a header, subject, text (with the actual diagnostics), a return and trailer token.
See audit_submit(3) for more information.
Reviewed by: rwatson Obtained from: TrustedBSD Project
|
154945 |
28-Jan-2006 |
brd |
- Mention that users need to be in the wheel group to `su - root' by default, and how to change it.
PR: docs/70616 Submitted by: Jilles Tjoelker <jilles at stack dot nl> Reviewed by: ru@ Approved by: ceri@ MFC after: 3 days
|
153985 |
03-Jan-2006 |
brian |
Fix the other su bug reintroduced two commits ago, namely
$ su % kill -STOP $$
where su is executing (t)csh. csh's job handling is a little more special than that of (a)sh, bash and even zsh and blows up a little more spectacularly. This modification restores the original mucking about with the tty pgrp, but is careful to only do it when su (or su's child) is the foreground process.
While I'm here, fix a STDERR_FILENO spelling as suggested by bde.
|
153966 |
02-Jan-2006 |
brian |
Handle the case (that I just broke) where the following hangs:
$ su # kill -STOP $$
Pointed out by: David Xu <davidxu@freebsd.org>
|
153964 |
02-Jan-2006 |
brian |
Remove broken code that mucks about with tcsetpgrp() -- even if su isn't the foreground process. Hopefully this won't break PAM, but I couldn't find any useful information about ache's theory that it will.
Specifically, this change fixes the following:
# sh # echo $$ # su - root -c id & # echo $$
The PID output changes as su seems to be kill -STOP'ing itself and catching the parent shell in the process. This is especially bad if you add a ``su - user -c command &'' to an rc script!
Sponsored by: Sophos/Activestate Not objected to by: des
|
140420 |
18-Jan-2005 |
ru |
Sort sections.
|
140392 |
17-Jan-2005 |
rwatson |
If su(1) is run without an effective uid of 0, generate an error to the user indicating that su is not running setuid, which may help suggest to the user that it should be setuid, or should not be running from a file system mounted nosuid.
Suggsted by: Ivan Voras <ivoras at fer dot hr> MFC after: 2 weeks
|
137164 |
03-Nov-2004 |
ru |
Introduce the PRECIOUSPROG knob in bsd.prog.mk, similar to PRECIOUSLIB from bsd.lib.mk. The side effect of this is making installing the world under jail(8) possible by using another knob, NOFSCHG.
Reviewed by: oliver
|
136114 |
04-Oct-2004 |
simon |
Bump document date for last commit.
Noticed by: ru
|
136102 |
03-Oct-2004 |
simon |
PAM configuration is now in /etc/pam.d/su.
Submitted by: Jilles Tjoelker <jilles@stack.nl> (original version) PR: docs/70616 (part of) MFC after: 1 week
|
131507 |
03-Jul-2004 |
ru |
Deal with double whitespace.
|
131491 |
02-Jul-2004 |
ru |
Mechanically kill hard sentence breaks.
|
130541 |
15-Jun-2004 |
markm |
Oops. My last commit included a bug that would make "su -m" always use /bin/sh. Fix this.
|
130409 |
13-Jun-2004 |
markm |
Paranoia, WARNS fixes and lint.
|
129434 |
19-May-2004 |
ru |
Bumped the document date. Fixed the grammar nit.
|
127848 |
04-Apr-2004 |
charnier |
Add FBSDID. Do not dot terminate errx(3) string.
|
125334 |
02-Feb-2004 |
ru |
Fixed style of assignments.
|
124166 |
06-Jan-2004 |
des |
When root tries to su to a non-existent user, pam_authenticate() will normally succeed (because root can su to anyone), but pam_acct_mgmt() will most likely fail, causing su to log a confusing "pam_acct_mgmt: error in service module" message. To avoid this, call getpwnam() before pam_acct_mgmt().
Sponsored by: registrar.no
|
122061 |
04-Nov-2003 |
davidxu |
Be sure to restore foreground group to parent su before parent su exits, otherwise shell will be confused and does not set foreground group correctly for next su command. This sounds like a bug in sh.
|
122013 |
03-Nov-2003 |
davidxu |
It seems when su executes in a shell scripts, there is a timing race, sometimes, su will receive a SIGTTOU when parent su tries to set child su's process group as foreground group, and su will be stopped unexpectly, ignoring SIGTTOU fixes the problem.
Noticed by: fjoe
|
121236 |
19-Oct-2003 |
cognet |
Fix broken su -m behaviour : chshell must return 0 if the shell is not a standard shell, or else it is possible to use an account without a valid shell.
Reviewed by: des
|
120557 |
28-Sep-2003 |
kensmith |
- Clarification to how command line arguments are processed.
PR: docs/55613 Submitted by: gshapiro@freebsd.org Approved by: blackend (mentor)
|
116047 |
08-Jun-2003 |
charnier |
typo
|
113262 |
08-Apr-2003 |
des |
PAM-related improvements:
- if operating "as them" (su -l), use pam_{open,close}_session() - allow PAM to override $HOME (pam_chroot needs this) - chdir early, because later on we may be chrooted and chdir will fail
Also use pid_t instead of int where applicable.
|
112695 |
27-Mar-2003 |
davidxu |
Put child process in a different process group, ensure that the broadcast signal never affects su directly, some shells changes its pgrp at running or suspended time, so a broadcast SIGTSTP from child will mess up su's job control.
Discussed with: bde
|
112087 |
11-Mar-2003 |
des |
Fix style bugs in the previous commit (which weren't in bde's patch)
|
112085 |
11-Mar-2003 |
davidxu |
Reset SIGTSTP handler to default both for parent and child process.
Submitted by: bde
|
112072 |
11-Mar-2003 |
davidxu |
Fix long standing job control bug. SIGTSTP shouldn't be ignored. Special instructions tested: suspend stop $$
|
110456 |
06-Feb-2003 |
des |
Pass the correct, verified username to PAM instead of getlogin().
|
107276 |
26-Nov-2002 |
ru |
mdoc(7) police: markup polishing.
Approved by: re
|
105758 |
23-Oct-2002 |
rwatson |
Add a new '-s' option to su(1): if the flag is present, attempt to also set the user's MAC label as part of the user credential setup by setting setusercontext(3)'s SETMAC flag. By default, change only traditional process properties.
Approved by: re Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
|
105386 |
18-Oct-2002 |
markm |
When a user gets refused because the password is wrong, use the older "BAD SU" syslog message that folks prefer. There is quite a bit more tweaking that can be done with other similar messages.
Asked for by: tjr
|
105362 |
17-Oct-2002 |
tjr |
Style: use sa_handler instead of __sigaction_u.__sa_handler.
|
105080 |
14-Oct-2002 |
phk |
Remove an unused variable.
|
101749 |
12-Aug-2002 |
ache |
Fix typing error in prev. commit
|
101748 |
12-Aug-2002 |
ache |
Fix style bug in prev. commit
|
101722 |
12-Aug-2002 |
ache |
Fix su job control (recently introduced for PAM cleanup purposes) to not kill login shell on either "suspend/fg" or "stop $$/fg" for tcsh. Since this bug occurse on -stable too, it is not kernel threads bug.
Submitted by: David Xu <bsddiy@yahoo.com>
|
101446 |
07-Aug-2002 |
ache |
Back out workaround of fixing "suspend/fg" by price of breaking "stop $$/fg".
This is real kernel bug (threads) and don't attempt to mask it by workarounds to increase chances to fix it in the kernel.
|
99685 |
09-Jul-2002 |
ache |
Remove tcsetpgrp() stuff across suspend/continue because it cause upper level tcsh killed on resume (fg). It is because tcsh is interactive itself and do its own things with terminal group.
|
98837 |
26-Jun-2002 |
dillon |
This is Alexander Kabaev's patch to solve the signal problem with su (see 'zsh exits upon ^C' thread). This may be temporary be he's been running it for a year without incident so we should be golden with it.
Approved by: des
|
98836 |
26-Jun-2002 |
dillon |
Backout 1.51 on DES's request.
Approved by: des
|
97438 |
29-May-2002 |
des |
Make our child the leader of its own process group to avoid receiving signals in its stead. This fixes the dread "zsh exits upon ^C" bug.
|
97377 |
28-May-2002 |
des |
Drive-by whitespace cleanup & add NAI copyright
|
95124 |
20-Apr-2002 |
charnier |
Use `The .Nm utility'
|
93417 |
30-Mar-2002 |
keramida |
Fix a few typos. as a user ID -> has a user ID command constitutes of -> command consists of
PR: misc/36523 Submitted by: Chris Pepper <pepper@mail.rockefeller.edu> MFC after: 3 days
|
91745 |
06-Mar-2002 |
des |
Belatedly OpenPAMify. I forgot this patch in last night's megacommit.
Sponsored by: DARPA, NAI Labs
|
89746 |
24-Jan-2002 |
des |
Don't set PAM_RHOST, this is a local login.
Sponsored by: DARPA, NAI Labs
|
87769 |
12-Dec-2001 |
markm |
Remove to-be-default WARNS?=2
|
83391 |
13-Sep-2001 |
ru |
Set BINOWN=root explicitly for setuid root binaries.
This is not "useless", as one may have non-default setting for BINOWN in make.conf, and we still want these to be installed setuid root in this case.
|
83373 |
12-Sep-2001 |
markm |
Reinstate complete (and now correctly functioning) WARNS=2.
|
83209 |
07-Sep-2001 |
markm |
Back out (with prejudice) the last WARNS=2 fix. I cannot understand its failure mode, and will revisit it later.
|
82979 |
04-Sep-2001 |
markm |
WARNS=2 fixes.
The remaining problem of converting highly incompatible pointer types is done by "laundering" the value through a union.
This solves the problem (in my own mind) of how a "const char *" _ever_ actually gets a value in a WARNS=2 world.
|
81971 |
20-Aug-2001 |
markm |
Very minor stylistic nit.
Discussed with: ru
|
81703 |
15-Aug-2001 |
ru |
Substitute ARGSTR in-place. Forgot trailing newline in usage().
|
81702 |
15-Aug-2001 |
ru |
Fixed the usage() string.
This also reverts change in rev. 1.36 to the documented style of writing usage().
PR: bin/29730 Submitted by: Joseph Mallett <jmallett@xMach.org>
|
81529 |
11-Aug-2001 |
markm |
Set the RUSER for PAM so that (eg) kerberos can set up tickets properly.
|
81528 |
11-Aug-2001 |
markm |
WARNS=2 type cleanup.
WARNS=2 cannot be enable because of an unresolvable conflict in arg 2 of execv(). Document this in the Makefile.
Reviewed by: bde (su.c only)
|
81462 |
10-Aug-2001 |
ru |
mdoc(7) police: join split punctuation to macro calls.
|
79755 |
15-Jul-2001 |
dd |
Remove whitespace at EOL.
|
77220 |
26-May-2001 |
markm |
Deconvolute the authentication mess, and hand total responsiblity for authentication to PAM. This meens that WHEELSU-type logic can now be effected in the pam.conf "su" configuration stack. While here, clean up the mess that the code had assumed over years of hacking by folks using different styles. ANSIfy.
There is more policy in here that can be handed over to PAM. This will be revisited.
|
76427 |
10-May-2001 |
obrien |
Tell the user what group they must be in to su to root.
Submitted by: Seth Kingsley <sethk@osd.bsdi.com>
|
76104 |
28-Apr-2001 |
markm |
Dike out Kerberos(IV) support on the grounds that better kerberos support can be gotten via PAM.
|
76103 |
28-Apr-2001 |
markm |
Dike out the Kerberos(IV) support on the grounds that better kerberos support can be already obtained via PAM.
|
74874 |
27-Mar-2001 |
markm |
Add full PAM support for account management and sessions.
The PAM_FAIL_CHECK and PAM_END macros in su.c came from the util-linux package's PAM patches to the BSD login.c
Submitted by: "David J. MacKenzie" <djm@web.us.uu.net>
|
69427 |
30-Nov-2000 |
rwatson |
o Make comment match reality, synch code with comment. o In practice: the comment indicates that all but umask and environmental variables of the users login class are applied when su occurs, unless -m is used to specify a class. This was incorrect; in practice, the uid, gids, resources, and priority were set, and then resources and priority were selectively removed. This meant that some aspects of the user context were not set, including handling of login events (wtmp, utmp), as well as the path specified in login.conf. o I changed it so that the behavior is the same, but instead, LOGIN_SETALL is used, and appropriate flags are removed, including the LOGIN_SETLOGIN and LOGIN_SETPATH entries that were implicitly not present before. I also updated the comment to reflect reality, selecting reality as the "correct" behavior. o This has the practical benefit that as new LOGIN_SET* flags are introduced, they are supported by su unless specifically disabled. For example, of a LOGIN_SETLABEL flag is introduced to support MAC labels determined by the user's login class, then su no longer has to be modified. o It might be desirable to have su use LOGIN_SETPATH depending on its command line parameters, as it might or might not be considered part of the "environment".
Obtained from: TrustedBSD Project
|
68963 |
20-Nov-2000 |
ru |
mdoc(7) police: use the new features of the Nm macro.
|
64288 |
05-Aug-2000 |
marko |
Document the ``-'' option and minor re-wording in EXAMPLES
|
57670 |
01-Mar-2000 |
sheldonh |
Remove single-space hard sentence breaks. These degrade the quality of the typeset output, tend to make diffs harder to read and provide bad examples for new-comers to mdoc.
|
57450 |
24-Feb-2000 |
markm |
Use libcrypto in place of libdes.
|
54782 |
18-Dec-1999 |
peter |
Revert the libcrypt/libmd stuff back to how it was. This should not have happened as it was working around problems elsewhere (ie: binutils/ld not doing the right thing according to the ELF design). libcrypt has been adjusted to not need the runtime -lmd. It's still not quite right (ld is supposed to work damnit) but at least it doesn't impact all the users of libcrypt in Marcel's cross-build model.
|
54677 |
16-Dec-1999 |
marcel |
Add libmd (or move it after libcrypt). We don't want the linker to be smart because it will definitely get it wrong. This popped up during cross-linking.
|
51436 |
19-Sep-1999 |
markm |
Change edistribution to krb4 in preaparation for K5
|
51039 |
06-Sep-1999 |
markm |
Fix Common Error brokenness.
|
50477 |
28-Aug-1999 |
peter |
$Id$ -> $FreeBSD$
|
49839 |
15-Aug-1999 |
bde |
Fixed editing error in previous commit. `-lmd' (link libmd) became `-md' (emulate the 'd' linker (?)). This was most harmful for the NOSHARED=yes case since libskey.o isn't linked to libmd.a.
Fixed the usual disorder of DPADD and LDADD, and some tab lossage.
|
49696 |
13-Aug-1999 |
sheldonh |
Axe LOGIN_CAP_AUTH.
PR: 10115 Reported by: Gene Skonicki <gene@cif.rochester.edu> Requested by: jdp
|
48458 |
02-Jul-1999 |
bde |
Actually fixed ambiguous else. The previous revision had no effect.
|
48403 |
01-Jul-1999 |
billf |
Fix ambigious else.
Reviewed By: eivind
|
40128 |
09-Oct-1998 |
markm |
Add JKH's auth.conf parser to turn on/off Kerberos in userland
|
39538 |
21-Sep-1998 |
roberto |
Fix bad option processing.
PR: bin/7986 Submitted by: Dan Nelson <dnelson@emsphone.com>
|
39495 |
19-Sep-1998 |
obrien |
Remove useless `BINOWN=root' now that it is the default.
|
38750 |
02-Sep-1998 |
bde |
Removed a buggy ifdef for not linking libmd explicitly. Explicit linkage is needed for the NOSHARED=YES case, so it is simplest to never depend on the automagic linkage for elf shared libraries.
Reviewed by: jdp
|
38645 |
30-Aug-1998 |
gpalmer |
Add $Id$
|
38643 |
30-Aug-1998 |
gpalmer |
Still need -lmd on the alpha as it doesn't have shlibs yet
|
38635 |
30-Aug-1998 |
jb |
BINFORMAT -> OBJFORMAT ready for E-day.
|
38149 |
06-Aug-1998 |
markm |
Fix LIBDIR (for aout/ELF).
|
36750 |
08-Jun-1998 |
jkoshy |
Reword to remove confusion between su(1)'s "-c" option and that of the shell being invoked. Add example that clarifies usage of "-c".
PR: 6859
|
36391 |
26-May-1998 |
danny |
PR: 1904 Abort if given uname is > MAXLOGNAME-1
|
36348 |
25-May-1998 |
steve |
Allow a user in group 0 to su(1) to root if their primary group is 0 in /etc/passwd even if they aren't listed as a member in /etc/group. This is more inline with what the group manpage says.
PR: 6696 Submitted by: Max Euston <meuston@jmrodgers.com>
|
30820 |
28-Oct-1997 |
guido |
I wonder how I managed to get the krb.h include wrong. Anyway: correct it.
|
30793 |
27-Oct-1997 |
guido |
Add -c option that allows root to specify a login_class.
|
29923 |
28-Sep-1997 |
markm |
Changes for KTH KerberosIV. Quieten -Wall a bit.
From Joe Traister: The previous patch did not propogate the KRBTKFILE environment variable into the new environment when -l is given to su, making it impossible for kdestroy to find the ticket file. This patch corrects that problem as well as the original segfault problem. (Fixes PR 3903)
|
29333 |
13-Sep-1997 |
wosch |
PR: docs/4383 su manpage ambiguous regarding command prompt
Submitted by: sheldonh@iafrica.com
|
29145 |
05-Sep-1997 |
peter |
If elf, don't add libmd.a just because we link against libskey.so. A
|
28935 |
30-Aug-1997 |
jmg |
fix a few spelling changes
Submitted by: Josh Gilliam
Closes PR's: 4429, 4431-4438
PS: He has agreed to submit all contrib fixes back to the original author.
|
28612 |
23-Aug-1997 |
joerg |
Prevent a NULL dereferencation when given a garbage command line.
PR: bin/3206 Submitted by: blank@fox.uni-trier.de
|
28099 |
12-Aug-1997 |
charnier |
Add usage().
|
26078 |
23-May-1997 |
ache |
Move libmd after all libraries to keep natural libraries order
|
25674 |
10-May-1997 |
davidn |
login_getclass() -> login_getpwclass().
|
24360 |
29-Mar-1997 |
imp |
compare return value from getopt against -1 rather than EOF, per the final posix standard on the topic.
|
23085 |
24-Feb-1997 |
guido |
When group wheel is empty, allow everyone to su to root. This has normally no conseqeunces as we ship with a non-empty wheel.
Closes PR/1882 Submitted by: Arne Henrik Juul <arnej@frida.imf.unit.no>
|
23012 |
22-Feb-1997 |
peter |
Revert $FreeBSD$ to $Id$
|
21748 |
15-Jan-1997 |
wosch |
Sort cross references.
|
21677 |
14-Jan-1997 |
davidn |
Fix problem with mask passwd to setusercontext() which prevented uid/group change with non-root target.
|
21673 |
14-Jan-1997 |
jkh |
Make the long-awaited change from $Id$ to $FreeBSD$
This will make a number of things easier in the future, as well as (finally!) avoiding the Id-smashing problem which has plagued developers for so long.
Boy, I'm glad we're not using sup anymore. This update would have been insane otherwise.
|
21647 |
13-Jan-1997 |
davidn |
Document effect of login class capabilities.
|
21646 |
13-Jan-1997 |
davidn |
Make su login_cap savvy. As with login(1), LOGIN_CAP_AUTH is not yet enabled since we don't yet have authorisation modules.
|
18789 |
07-Oct-1996 |
joerg |
Export $TERM only if it has been set in our environment.
Detected by: Amancio Hasty
|
17891 |
29-Aug-1996 |
wosch |
[HISTORY] command appeared in Version 1 AT&T UNIX Obtained from: A Quarter Century of UNIX, Peter H. Salus, page 41
|
14572 |
11-Mar-1996 |
markm |
Make su a little less fascist about using Kerberos if it is not configured or available.
Also fix a _nasty_ bug that would let one in if su -K was used. Any old password would work :-( :-(.
|
14440 |
09-Mar-1996 |
markm |
Better integrate kerberos into su so that if an incorrect Kerberos password is entered, the user is not prompted for a password a second time.
This closes pr-bin/1006.
|
14024 |
11-Feb-1996 |
markm |
#include <kerberosIV/des.h> -> #include <des.h>
|
11449 |
12-Oct-1995 |
wollman |
Make it possible to enable WHEELSU from /etc/make.conf.
|
11233 |
05-Oct-1995 |
gibbs |
Kerberos can now deal with multi-homed clients.
Kerberos obtains a network address for the local host from the routing tables and uses it consistently for all Kerberos transactions. This ensures that packets only leave the *authenticated* interface. Clients who open and use their own sockets for encrypted or authenticated correspondance to kerberos services should bind their sockets to the same address as that used by kerberos. krb_get_local_addr() and krb_bind_local_addr() allow clients to obtain the local address or bind a socket to the local address used by Kerberos respectively.
Reviewed by: Mark Murray <markm>, Garrett Wollman <wollman> Obtained from: concept by Dieter Dworkin Muller <dworkin@village.org>
|
10586 |
06-Sep-1995 |
joerg |
Bring Barry Morris' changes from FreeBSD 1.1.5.1 back: pass arguments to the target login's shell. This allows for "su -c".
Do it right this time and also explain this behaviour in the man page. :)
Obtained from: bsm's work in FreeBSD 1.1.5.1
|
10401 |
28-Aug-1995 |
mpp |
Check for expired passwords before allowing access to the system.
|
9502 |
12-Jul-1995 |
wollman |
Added support for an LCS-style `wheel su' which allows users in group wheel to su to root by authenticating as themselves (using a password or S/Key) rather than by using the root password. This is useful in contexts like ours, where a large group of people need root access to a set of machines. (However, the security implications are such that this should not be enabled by default.)
The code is conditionalized on WHEELSU.
|
8874 |
30-May-1995 |
rgrimes |
Remove trailing whitespace.
|
7641 |
06-Apr-1995 |
jkh |
It has always bugged me that ps and w did not display su with tcsh properly. I know, tcsh is not a "Real Shell".
jc p2 :0.0 Tue04PM - -u (tcsh) ^^^ 7173 p2 S+ 0:01.33 -u (tcsh) ^^^
Submitted by: John Capo <jc@irbs.com>
|
7141 |
18-Mar-1995 |
nate |
Change the library order so libcrypt is the last library in the list. libskey contains references to _crypt and can't resolve it unless -lcrypt occurs after it in the link command. This only occurs when linking statically.
|
4715 |
20-Nov-1994 |
wollman |
Add distribution=krb for P-HK
|
4563 |
17-Nov-1994 |
ats |
Fixed the PATH and cleanenv setting in su. This was totally broken in the 4.4BSD Lite source.
|
3702 |
19-Oct-1994 |
pst |
Include most of the logdaemon v4.4 S/key changes
|
3208 |
29-Sep-1994 |
pst |
Add support for s/keys
|
3197 |
29-Sep-1994 |
csgr |
First level of changes for bringing in eBones (kerberos). - Get rid of inverse logic (NOKERBEROS and NOEBONES) in src/makefile, and replace with MAKE_KERBEROS and MAKE_EBONES. (Far fewer contortions, and both default to off.) IF YOU WANT KERBEROS, YOU HAVE TO EXPLICITLY DEFINE ONE OF THESE. - Make Makefiles kerberos-aware.
|
2159 |
20-Aug-1994 |
csgr |
LDADD= -lcrypt Submitted by: Geoff
|
1870 |
05-Aug-1994 |
wollman |
Don't use kerberos yet, we aren't ready.
|
1591 |
27-May-1994 |
rgrimes |
This commit was generated by cvs2svn to compensate for changes in r1590, which included commits to RCS files with non-trunk default branches.
|