head	1.4;
access;
symbols
	RELEASE_7_4_0:1.3
	RELEASE_8_2_0:1.3
	RELEASE_6_EOL:1.3
	RELEASE_8_1_0:1.3
	RELEASE_7_3_0:1.3
	RELEASE_8_0_0:1.3
	RELEASE_7_2_0:1.3
	RELEASE_7_1_0:1.3
	RELEASE_6_4_0:1.3
	RELEASE_5_EOL:1.3
	RELEASE_7_0_0:1.3
	RELEASE_6_3_0:1.3
	PRE_XORG_7:1.3
	RELEASE_4_EOL:1.3
	RELEASE_6_2_0:1.3
	RELEASE_6_1_0:1.3
	RELEASE_5_5_0:1.3
	RELEASE_6_0_0:1.3
	RELEASE_5_4_0:1.3
	RELEASE_4_11_0:1.3
	RELEASE_5_3_0:1.3
	RELEASE_4_10_0:1.3
	RELEASE_5_2_1:1.3
	RELEASE_5_2_0:1.3
	RELEASE_4_9_0:1.3
	RELEASE_5_1_0:1.3
	RELEASE_4_8_0:1.3
	RELEASE_5_0_0:1.3
	RELEASE_4_7_0:1.3
	RELEASE_4_6_2:1.3
	RELEASE_4_6_1:1.3
	ssh_1_2_33:1.3
	ssh_1_2_32:1.3
	ssh_1_2_31:1.3
	ssh_1_2_30:1.3
	ssh_1_2_29:1.3
	ssh_1_2_28:1.3
	ssh_1_2_27:1.3
	RELEASE_4_6_0:1.3
	RELEASE_5_0_DP1:1.3
	RELEASE_4_5_0:1.3
	RELEASE_4_4_0:1.3
	RELEASE_4_3_0:1.3
	RELEASE_4_2_0:1.3
	RELEASE_4_1_1:1.3
	RELEASE_4_1_0:1.3
	RELEASE_3_5_0:1.3
	RELEASE_4_0_0:1.3
	RELEASE_3_4_0:1.2
	RELEASE_3_3_0:1.2
	RELEASE_3_2_0:1.1
	RELEASE_3_1_0:1.1
	RELEASE_2_2_8:1.1;
locks; strict;
comment	@# @;


1.4
date	2011.05.01.20.14.19;	author bapt;	state dead;
branches;
next	1.3;

1.3
date	2000.01.14.19.37.34;	author torstenb;	state Exp;
branches;
next	1.2;

1.2
date	99.06.15.20.13.56;	author sada;	state Exp;
branches;
next	1.1;

1.1
date	98.11.10.13.20.21;	author ache;	state Exp;
branches;
next	;


desc
@@


1.4
log
@Remove unmaintained expired ports from security

2011-05-01 security/aafid2: Upstream disapear and distfile is no more available
2011-05-01 security/bjorb: Upstream disapear and distfile is no more available
2011-05-01 security/borzoi: Upstream disapear and distfile is no more available
2011-05-01 security/cmd5checkpw: Upstream disapear and distfile is no more available
2011-05-01 security/cops: Upstream disapear and distfile is no more available
2011-05-01 security/find_ddos: Upstream disapear and distfile is no more available
2011-05-01 security/ftpmap: Upstream disapear and distfile is no more available
2011-05-01 security/hafiye: Upstream disapear and distfile is no more available
2011-05-01 security/ident2: Upstream disapear and distfile is no more available
2011-05-01 security/liedentd: Upstream disapear and distfile is no more available
2011-05-01 security/pam_pop3: Upstream disapear and distfile is no more available
2011-05-01 security/poc: Upstream disapear and distfile is no more available
2011-05-01 security/portscanner: Upstream disapear and distfile is no more available
2011-05-01 security/ppgen: Upstream disapear and distfile is no more available
2011-05-01 security/qident: Upstream disapear and distfile is no more available
2011-05-01 security/quintuple-agent: Upstream disapear and distfile is no more available
2011-05-01 security/rc5pipe: Upstream disapear and distfile is no more available
2011-05-01 security/rid: Upstream disapear and distfile is no more available
2011-05-01 security/ssh: Upstream disapear and distfile is no more available
2011-05-01 security/tea-total: Upstream disapear and distfile is no more available
2011-05-01 security/uberkey: Upstream disapear and distfile is no more available
@
text
@*** auth-kerberos.c.orig	Tue Jan 11 20:33:46 2000
--- auth-kerberos.c	Tue Jan 11 20:33:38 2000
***************
*** 120,129 ****
--- 120,137 ----
        
        debug("Kerberos invalid service name (%.100s).", server);
        packet_send_debug("Kerberos invalid service name (%.100s).", server);
+ #ifdef krb5_xfree
        krb5_xfree(server);
+ #else
+       free(server);
+ #endif
        return 0;
      }
+ #ifdef krb5_xfree
    krb5_xfree(server);
+ #else
+   free(server);
+ #endif
    
    /* Extract the users name from the ticket client principal */
    problem = krb5_copy_principal(ssh_context, ticket->enc_part2->client,
***************
*** 159,165 ****
--- 167,177 ----
    packet_put_string((char *) reply.data, reply.length);
    packet_send();
    packet_write_wait();
+ #ifdef krb5_xfree
    krb5_xfree(reply.data);
+ #else
+   krb5_free_data_contents(ssh_context, &reply);
+ #endif
    return 1;
  }
  #endif /* KRB5 */
***************
*** 177,183 ****
    extern char *ticket;
    static krb5_principal rcache_server = 0;
    static krb5_rcache rcache;
!   struct sockaddr_in local, foreign;
    krb5_address *local_addr, *remote_addr;
    int s;
    
--- 189,195 ----
    extern char *ticket;
    static krb5_principal rcache_server = 0;
    static krb5_rcache rcache;
!   struct sockaddr_storage local, foreign;
    krb5_address *local_addr, *remote_addr;
    int s;
    
@


1.3
log
@Add IPv6 support to ssh.
The IPv6 patch was obtained from the kame repository and has been
been writen by KIKUCHI Takahiro <kick@@kyoto.wide.ad.jp>

Due to the whole mess with different patches it was necessary to include
both the IPv6 patch and patch-ssh-1.2.27-bsd.tty.chown in ${PATCHDIR}.
Since both patches modify the configure script it was also necessary
to rebuild it via autoconf from configure.in. I've decided to use
USE_AUTOCONF instead of including the re-build configure script in
${FILESDIR}

Obtained from:	KAME/WIDE
@
text
@@


1.2
log
@PR:	ports/12037
Submitted by:	Issei Suzuki <issei@@jp.FreeBSD.ORG>
Upgrade to 1.2.27.
# I'm not maintainer but it seems that torstenb is too busy to
# look the PR and many people want new version ssh port.
@
text
@d1 54
a54 33
--- auth-kerberos.c.orig	Sun Jun  6 02:01:32 1999
+++ auth-kerberos.c	Sun Jun  6 02:01:33 1999
@@@@ -120,10 +120,18 @@@@
       
       debug("Kerberos invalid service name (%.100s).", server);
       packet_send_debug("Kerberos invalid service name (%.100s).", server);
+#ifdef krb5_xfree
       krb5_xfree(server);
+#else
+      free(server);
+#endif
       return 0;
     }
+#ifdef krb5_xfree
   krb5_xfree(server);
+#else
+  free(server);
+#endif
   
   /* Extract the users name from the ticket client principal */
   problem = krb5_copy_principal(ssh_context, ticket->enc_part2->client,
@@@@ -159,7 +167,11 @@@@
   packet_put_string((char *) reply.data, reply.length);
   packet_send();
   packet_write_wait();
+#ifdef krb5_xfree
   krb5_xfree(reply.data);
+#else
+  krb5_free_data_contents(ssh_context, &reply);
+#endif
   return 1;
 }
 #endif /* KRB5 */
@


1.1
log
@add official kerberos patch
@
text
@d1 7
a7 211
--- sshconnect.c.orig	Wed Jul  8 20:40:38 1998
+++ sshconnect.c	Tue Nov 10 15:43:45 1998
@@@@ -282,7 +282,7 @@@@
 
       /* Child.  Permanently give up superuser privileges. */
       if (setuid(getuid()) < 0)
-	fatal("setuid: %s", strerror(errno));
+	fatal("setuid: %.100s", strerror(errno));
 
       /* Redirect stdin and stdout. */
       close(pin[1]);
@@@@ -944,7 +944,7 @@@@
   if (!ssh_context)
     {
       if ((r = krb5_init_context(&ssh_context)))
-	fatal("Kerberos V5: %s while initializing krb5.", error_message(r));
+	fatal("Kerberos V5: %.100s while initializing krb5.", error_message(r));
       krb5_init_ets(ssh_context);
     }
   
@@@@ -959,14 +959,14 @@@@
 				   "host", KRB5_NT_SRV_HST,
 				   &creds.server)))
     {
-      debug("Kerberos V5: error while constructing service name: %s.",
+      debug("Kerberos V5: error while constructing service name: %.100s.",
 	    error_message(r));
       goto cleanup;
     }
   if ((r = krb5_cc_get_principal(ssh_context, ccache,
 				 &creds.client)))
     {
-      debug("Kerberos V5: failure on principal (%s).",
+      debug("Kerberos V5: failure on principal (%.100s).",
 	    error_message(r));
       goto cleanup;
     }
@@@@ -975,7 +975,7 @@@@
   if ((r = krb5_get_credentials(ssh_context, 0,
 				ccache, &creds, &new_creds)))
     {
-      debug("Kerberos V5: failure on credentials(%s).",
+      debug("Kerberos V5: failure on credentials(%.100s).",
 	    error_message(r));
       goto cleanup;
     }
@@@@ -987,7 +987,7 @@@@
     {
       if ((r = krb5_auth_con_init(ssh_context, &auth_context)))
 	{
-	  debug("Kerberos V5: failed to init auth_context (%s)",
+	  debug("Kerberos V5: failed to init auth_context (%.100s)",
 		error_message(r));
 	  goto cleanup;
         }
@@@@ -998,7 +998,7 @@@@
   if ((r = krb5_mk_req_extended(ssh_context, &auth_context, ap_opts,
 				0, new_creds, &auth)))
     {
-      debug("Kerberos V5: failed krb5_mk_req_extended (%s)",
+      debug("Kerberos V5: failed krb5_mk_req_extended (%.100s)",
 	    error_message(r));
       goto cleanup;
     }
@@@@ -1046,7 +1046,7 @@@@
       
       if (r = krb5_rd_rep(ssh_context, auth_context, &auth, &repl))
 	{
-	  packet_disconnect("Kerberos V5 Authentication failed: %s",
+	  packet_disconnect("Kerberos V5 Authentication failed: %.100s",
 			    error_message(r));
 	  goto cleanup;
 	}
@@@@ -1090,7 +1090,7 @@@@
   krb5_data outbuf;
   krb5_error_code r;
   int type;
-  char server_name[128];
+  char server_name[512];
   
   remotehost = (char *) get_canonical_hostname();
   memset(&outbuf, 0 , sizeof(outbuf));
@@@@ -1100,14 +1100,14 @@@@
   if (!ssh_context)
     {
       if ((r = krb5_init_context(&ssh_context)))
-	fatal("Kerberos V5: %s while initializing krb5.", error_message(r));
+	fatal("Kerberos V5: %.100s while initializing krb5.", error_message(r));
       krb5_init_ets(ssh_context);
     }
   if (!auth_context)
     {
       if ((r = krb5_auth_con_init(ssh_context, &auth_context)))
 	{
-	  debug("Kerberos V5: failed to init auth_context (%s)",
+	  debug("Kerberos V5: failed to init auth_context (%.100s)",
 		error_message(r));
 	  return 0 ;
         }
@@@@ -1124,7 +1124,7 @@@@
     if ((r = krb5_cc_get_principal(ssh_context, ccache,
                                    &client)))
       {
-        debug("Kerberos V5: failure on principal (%s)",
+        debug("Kerberos V5: failure on principal (%.100s)",
 	      error_message(r));
         return 0 ;
       }
@@@@ -1136,7 +1136,7 @@@@
        principal and point it to clients realm. This way
        we pass over a TGT of the clients realm. */
     
-    sprintf(server_name,"host/%s@@", remotehost);
+    sprintf(server_name,"host/%.100s@@", remotehost);
     strncat(server_name,client->realm.data,client->realm.length);
     krb5_parse_name(ssh_context,server_name, &server);
     server->type = KRB5_NT_SRV_HST;
@@@@ -1145,7 +1145,7 @@@@
     if ((r = krb5_fwd_tgt_creds(ssh_context, auth_context, 0, client, 
  			        server, ccache, 1, &outbuf)))
       {
-	debug("Kerberos V5 krb5_fwd_tgt_creds failure (%s)",
+	debug("Kerberos V5 krb5_fwd_tgt_creds failure (%.100s)",
 	      error_message(r));
 	krb5_free_principal(ssh_context, client);
         krb5_free_principal(ssh_context, server);
@@@@ -1416,7 +1416,7 @@@@
       error("Someone could be eavesdropping on you right now (man-in-the-middle attack)!");
       error("It is also possible that the host key has just been changed.");
       error("Please contact your system administrator.");
-      error("Add correct host key in %s to get rid of this message.", 
+      error("Add correct host key in %.100s to get rid of this message.",
 	    options->user_hostfile);
       
       /* If strict host key checking is in use, the user will have to edit
@@@@ -1589,7 +1589,7 @@@@
   if (!ssh_context)
     {
       if ((problem = krb5_init_context(&ssh_context)))
-	fatal("Kerberos V5: %s while initializing krb5.",
+	fatal("Kerberos V5: %.100s while initializing krb5.",
 	      error_message(problem));
       krb5_init_ets(ssh_context);
     }
@@@@ -1605,7 +1605,7 @@@@
 	  if ((problem = krb5_cc_get_principal(ssh_context, ccache,
 					       &client)))
 	    {
-	      debug("Kerberos V5: failure on principal (%s).",
+	      debug("Kerberos V5: failure on principal (%.100s).",
                     error_message(problem));
 	    }
 	  else {
--- auth-kerberos.c.orig	Wed Jul  8 20:40:35 1998
+++ auth-kerberos.c	Tue Nov 10 15:50:15 1998
@@@@ -63,11 +63,11 @@@@
 	  krb5_auth_con_free(ssh_context, auth_context);
 	  auth_context = 0;
 	}
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
       
-      debug("Kerberos krb5_auth_con_genaddrs (%s).", error_message(problem));
-      packet_send_debug("Kerberos krb5_auth_con_genaddrs: %s",
+      debug("Kerberos krb5_auth_con_genaddrs (%.100s).", error_message(problem));
+      packet_send_debug("Kerberos krb5_auth_con_genaddrs: %.100s",
 			error_message(problem));
       return 0;
     }
@@@@ -80,11 +80,11 @@@@
 	  krb5_auth_con_free(ssh_context, auth_context);
 	  auth_context = 0;  
 	}
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
       
-      debug("Kerberos V5 rd_req failed (%s).", error_message(problem));
-      packet_send_debug("Kerberos V5 krb5_rd_req: %s", error_message(problem));
+      debug("Kerberos V5 rd_req failed (%.100s).", error_message(problem));
+      packet_send_debug("Kerberos V5 krb5_rd_req: %.100s", error_message(problem));
       return 0;
     }
   
@@@@ -93,22 +93,22 @@@@
   if (problem)
     {
       krb5_free_ticket(ssh_context, ticket);
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
       
-      debug("Kerberos krb5_unparse_name failed (%s).", error_message(problem));
-      packet_send_debug("Kerberos krb5_unparse_name: %s",
+      debug("Kerberos krb5_unparse_name failed (%.100s).", error_message(problem));
+      packet_send_debug("Kerberos krb5_unparse_name: %.100s",
 			error_message(problem));
       return 0;
     }
   if (strncmp(server, "host/", strlen("host/")))
     {
       krb5_free_ticket(ssh_context, ticket);
-      log_msg("Kerberos ticket authentication of user %s failed: invalid service name (%s)",
+      log_msg("Kerberos ticket authentication of user %.100s failed: invalid service name (%.100s)",
 	      server_user, server);
       
-      debug("Kerberos invalid service name (%s).", server);
-      packet_send_debug("Kerberos invalid service name (%s).", server);
+      debug("Kerberos invalid service name (%.100s).", server);
+      packet_send_debug("Kerberos invalid service name (%.100s).", server);
d9 3
d14 10
a23 71
@@@@ -122,11 +122,11 @@@@
   
   if (problem)
     {
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
-      debug("Kerberos krb5_copy_principal failed (%s).", 
+      debug("Kerberos krb5_copy_principal failed (%.100s).",
 	    error_message(problem));
-      packet_send_debug("Kerberos krb5_copy_principal: %s", 
+      packet_send_debug("Kerberos krb5_copy_principal: %.100s",
 			error_message(problem));
       return 0;
     }
@@@@ -135,11 +135,11 @@@@
   /* Make the reply - so that mutual authentication can be done */
   if ((problem = krb5_mk_rep(ssh_context, auth_context, &reply)))
     {
-      log_msg("Kerberos ticket authentication of user %s failed: %s",
+      log_msg("Kerberos ticket authentication of user %.100s failed: %.100s",
 	      server_user, error_message(problem));
-      debug("Kerberos krb5_mk_rep failed (%s).",
+      debug("Kerberos krb5_mk_rep failed (%.100s).",
 	    error_message(problem));
-      packet_send_debug("Kerberos krb5_mk_rep failed: %s",
+      packet_send_debug("Kerberos krb5_mk_rep failed: %.100s",
 			error_message(problem));
       return 0;
     }
@@@@ -160,7 +160,7 @@@@
 {
   krb5_creds **creds;
   krb5_error_code retval;
-  static char ccname[128];
+  static char ccname[512];
   krb5_ccache ccache = NULL;
   struct passwd *pwd;
   extern char *ticket;
@@@@ -208,9 +208,9 @@@@
   
   if (retval = krb5_rd_cred(ssh_context, auth_context, krb5data, &creds, NULL))
     {
-      log_msg("Kerberos V5 tgt rejected for user %.100s : %s", server_user,
+      log_msg("Kerberos V5 tgt rejected for user %.100s : %.100s", server_user,
 	      error_message(retval));
-      packet_send_debug("Kerberos V5 tgt rejected for %.100s : %s",
+      packet_send_debug("Kerberos V5 tgt rejected for %.100s : %.100s",
 			server_user,
 			error_message(retval));
       packet_start(SSH_SMSG_FAILURE);
@@@@ -234,7 +234,7 @@@@
     goto errout;
   
   ticket = xmalloc(strlen(ccname) + 1);
-  (void) sprintf(ticket, "%s", ccname);
+  (void) sprintf(ticket, "%.100s", ccname);
   
   /* Successful */
   packet_start(SSH_SMSG_SUCCESS);
@@@@ -244,9 +244,9 @@@@
   
 errout:
   krb5_free_tgt_creds(ssh_context, creds);
-  log_msg("Kerberos V5 tgt rejected for user %.100s :%s", server_user,
+  log_msg("Kerberos V5 tgt rejected for user %.100s :%.100s", server_user,
 	  error_message(retval));
-  packet_send_debug("Kerberos V5 tgt rejected for %.100s : %s", server_user,
+  packet_send_debug("Kerberos V5 tgt rejected for %.100s : %.100s", server_user,
 		    error_message(retval));
   packet_start(SSH_SMSG_FAILURE);
d25 9
@

