Commit Graph

2037 Commits

Author SHA1 Message Date
imp
a508b60adc Fix minor buffer problems:
Off by one in verify allowed one to march one byte off the end of
	wd.wd_hostname if wd.wd_hostname had no NUL characters in it.

	strncpy of myname into mywd used the source buffer's length, rather
	than the dest.
1996-11-01 06:29:34 +00:00
alex
8d80515b00 Fix incorrect length argument to memset() function. Closes PR#1937.
Submitted by:	Archie Cobbs <archie@whistle.com>
1996-11-01 01:42:08 +00:00
joerg
3029e93724 Improve the sample login script now that our sh(1) understands -p.
Closes PR # docs/1383: ppp(8) man page suggests using shell script...
1996-10-31 19:55:05 +00:00
ache
2e12dc9fbc Fix base64->8bit conversion
Submitted by: Eric Allman <eric@sendmail.org>
1996-10-31 00:45:43 +00:00
ache
9331b2cc7e Oops, don't suppress initial output header (from previous commit),
it is superfluous
1996-10-31 00:03:14 +00:00
ache
9bed9d0fb5 1) print only errors if -v not given, it allows non-verbose
crontab runnig
2) use full path /usr/bin/mail for security reasons
3) Use time_t instead of long for time (in one place)
1996-10-30 23:58:08 +00:00
wosch
aafdab57f3 rmgroup - delete a Unix group
usage: rmgroup group
1996-10-30 20:58:47 +00:00
wosch
7736b90b96 addgroup - add a group or add users to a group
addgroup [-g gid] group [user[,user,...]]
1996-10-29 20:31:43 +00:00
se
348afbb79a Correct indentation of multi-LUN device info. (Slightly different fix
than suggested by Bruce Evans).

Submitted by:	bde
1996-10-29 19:32:31 +00:00
peter
f46f416def Integrate our changes from bin/rmail. Mainly it causes immediate
delivery rather than queueing it and forgetting it.

(and some -Wall fixes where gcc is too dumb to see it's a "cant happen")
1996-10-29 11:32:22 +00:00
peter
7bfbad3404 Convert the DONT_FSYNC compile time option to a runtime option (like
nobiff).  The options to turn these on are specified in the
LOCAL_MAILER_ARGS define the the sendmail.mc that you build from.
1996-10-29 05:35:24 +00:00
peter
6d127efe9f Merge in our changes from src/libexec/mail.local. This version doesn't
violate disk quotas, has more robust locking, is still being developed,
etc.  The main changes merged in were the ability to not fsync() the
mailbox, not do biff/comsat broadcasts, man page fixes.
1996-10-29 05:22:52 +00:00
joerg
e9e54bcde4 Do not modify a malloc()ed pointer; instead, use memmove().
Detected by: phkmalloc - AJ :)
1996-10-28 23:02:38 +00:00
joerg
ccc0f03f6b Back out the entire change from rev 1.11 of syslogd.c. It was bogus.
Correct the man page to reflect the new reality.
1996-10-28 08:25:13 +00:00
alex
63862d7113 Fix a typo, putput --> output.
Submitted by:	Philippe Charnier <charnier@xp11.frmug.org>
1996-10-27 23:12:48 +00:00
imp
354a4db3b5 lpc/cmds.c:
From NetBSD via OpenBSD to fix NetBSD PR #506
	More descriptive message for printer status
	(OpenBSD: 1.2)

	Various warnings cleaned up (OpenBSD: 1.4)

lpc/lpc.c:
	Various warnings cleaned up (OpenBSD: 1.3)

lpd/lpd.c:
	Remove trailing blank lines (OpenBSD: 1.2)

	Potential umask problem with creating /dev/printer
	(OpenBSD: 1.4 and 1.5)

	Ftp bounce attack (untested on FreeBSD)
	(OpenBSD: 1.6, 1.8, 1.9)
	Fencepost in strncpy
	(OpenBSD: 1.6)

lpd/printjob.c:
	Fix from freebsd for waiting for an exiting filter, that
	appears not in the FreeBSD CVS tree.
	(OpenBSD: 1.6)

lpd/recvjob.c:
	Buffer overflow protection: use strncpy rather than strcpy.
	(OpenBSD: 1.3)

lpr/lpr.c:
	NetBSD change of return type for main()
	(OpenBSD: 1.2)

	Restrict time running as root
	(OpenBSD: 1.7)

	Use getcwd rather than getwd (from NetBSD)

	Use snprintf rather than sprintf
	(OpenBSD: 1.8)

	Minor tweak to end of loop and buffer overflow sanity.  card()
	overflow already in FreeBSD
	(OpenBSD: 1.9)

lptest/lptest.c:
	void -> int return type of main, from NetBSD via OpenBSD
	(OpenBSD: 1.2)

pac/pac.c:
	void -> int return type of main, from NetBSD via OpenBSD
	(OpenBSD: 1.3)

Obtained from: OpenBSD
1996-10-27 03:06:52 +00:00
imp
a5f434cb1c Fix transcription error I introduced in last patch. This created a
fencepost error that would run one off the end of the buffer.

Noticed by: Bruce Evans
1996-10-26 00:46:34 +00:00
imp
96b7b01c64 Fix a problem where the command line could be used to overflow a stack
buffer which could be made to lead to a root shell.  This patch is
OpenBSD's solution to the problem, and will silently truncate the
output rather than overflow the buffer.

Obtained from: OpenBSD
1996-10-25 18:14:48 +00:00
bde
104718bd5b Made this work for non-root again. The security fixes in rev.1.11
were equivalent to disabling its setgid'ness, since the default
kernel was not distinguished from a user-specified kernel.
1996-10-25 15:36:42 +00:00
wpaul
23c458cf11 Add support for handling the YP_SECURE and YP_INTERDOMAIN keys from
any maps that may have them. If the YP_SECURE key is present, ypserv
will only allow access to the map from clients on reserved ports.
If the YP_INTERDOMAIN key is present, the server will do DNS lookups
for hostnames that it can't find in hosts.byname or hosts.byaddr.
This is the same as the -d flag (which is retained for backwards
compatibility) but it can be set on a per-map/per-domain basis.

Also modified /var/yp/Makefile to add YP_INTERDOMAIN to the hosts.*
maps and YP_SECURE to master.passwd.* maps by default.
1996-10-24 18:58:26 +00:00
wpaul
9c6283900e Add -b and -s flags for adding YP_INTERDOMAIN and YP_SECURE entries to
map databases. Also document said flags in the man page.

Adding YP_INTERDOMAIN to a map causes ypserv(8) to do a DNS lookup
when a yp_match() on the map fails. (This affects only the hosts.by*
maps; for all other maps it's ignored.) The YP_SECURE entry causes
ypserv(8) to restrict access to the map so that only clients making
requests from reserved ports can get at it.

Our ypserv doesn't currently support these features so they're silently
ignored for the moment, but this will change. :)
1996-10-24 14:52:50 +00:00
peter
3c73db0636 Untangle NEWDB/NDBM options.
Enable praliases.c to not use NDBM.
1996-10-24 14:04:03 +00:00
peter
0c4d52e349 missed this praliases.8 <-> praliases.0 change 1996-10-24 05:20:52 +00:00
peter
c927066f54 Fold sendmail-8.8.2 changes into files that have been touched.
(^!&@$#&^! delete !!@^@^ trailing !@^&#$!& whitespace!!!)
1996-10-24 05:07:25 +00:00
peter
117b06cef4 This commit was generated by cvs2svn to compensate for changes in r19146,
which included commits to RCS files with non-trunk default branches.
1996-10-24 04:51:14 +00:00
peter
c25f71c7e5 Import sendmail-8.8.2 onto the vendor branch
Obtained from: Eric Allman <eric@sendmail.org>
1996-10-24 04:51:14 +00:00
wosch
c7268b1813 fix FAQ URL. Note for Jordan: don't merge this change into 2.1.6! 1996-10-23 22:28:56 +00:00
wpaul
c2980df722 Add extra sanity checking to the in-place update routine. Sometimes you
find two users with the same UID (i.e. root and toor), but yp_mkdb(8)
forbits duplicate keys, so only one of them will end up in the *.byuid
maps (probably toor, since it comes after root in the template file).
If I asked rpc.yppasswdd(8) to change toor's password, it would update
the *.byname maps correctly, but incorrectly modify root's entry in
the *.byuid maps since the only matching record with UID=0 in those
maps belongs to root.

To fix this, we check that both the name and UID are correct before trying
to write new entries to the maps.
1996-10-23 21:46:17 +00:00
julian
b9fc5c00e5 Reviewed by: various (mailing list feedback)
Submitted by:	whistle communications

move the socket from /dev to /var/run by default
TRANSITIONALLY make syslog add a symlink..
I PROMISE I'll remove that as soon as I have the makefiles etc fixed as well.
1996-10-23 20:17:57 +00:00
wpaul
b7a42c0562 In ypxfr_callback(), the failure to create an RPC CLIENT * handle for
the callback is a fatal error for this function; return immediatlely if
this happens. Also make the "failed to establish callback handle" error
mesaage print the IP address of the target callback host.
1996-10-23 15:49:22 +00:00
wpaul
f8eb2a9fb7 Make error messages more informative. 1996-10-23 15:42:37 +00:00
scrappy
5371bc9b5c Fixes:
>Description:
        pppd failes to set control terminal if -detach option is given.

Submitted by: enami@ba2.so-net.or.jp
1996-10-22 21:41:43 +00:00
se
0e8236f24c Add pciconf. 1996-10-22 20:58:14 +00:00
se
1aed9ce9d1 This commit was generated by cvs2svn to compensate for changes in r19102,
which included commits to RCS files with non-trunk default branches.
1996-10-22 20:27:47 +00:00
se
97741b92a3 Initial version of the user land code for the PCI config register
access functions. Written by Garrett Wollman and modified by me to
better match my view of the (PCI) world.

Submitted by:	wollman
1996-10-22 20:27:47 +00:00
wpaul
37e1a46671 Two small changes that were in my development sources at home
but never made it here for some reason:

- 'u' option was missing from getopt string
- Use daemon() to become daemonic.
1996-10-22 14:58:10 +00:00
scrappy
5624ede1e3 Fixes:
If timed is running when system clock is changed by date command,
improper wtmp entry is made.  According to wtmp(5), two entries, one
with "|" as ut_line field and one with "{" for ut_line, should be
recorded, but, one with "|" and one with "}" are made.

Closes: PR#bin/1182

Submitted by:	 Masafumi NAKANE <masafumi@tky007.tth.expo96.ad.jp>
1996-10-22 05:13:42 +00:00
wpaul
66f320435d Since rpc.yppasswdd(8) also supports adding entries to the
/var/yp/master.passwd template file and it uses the same kind of code
as chpass(1), it may also be vulnerable to the bug from PR #1519.
May as well deal with it since I'm in the area. (yppasswdd in -stable
doesn't do additions, therefore it shouldn't be have this problem.)
1996-10-22 03:53:06 +00:00
wpaul
46b1a4aff5 Begin closing out PR #1519 (this requires a change to chpass too,
and both changes need to be pulled into the stable branch). The
problem here is that when pwd_mkdb creates /etc/passwd, it turns
empty UID and GID fields into zeroes. To fix this, we check the
_PWF_UID and _PWF_GID bits in the pw_fields flag: if the bits
are not set, we print an empty field instead of a zero. This way,
you don't get zeroes in the UID or GID fields unless you explicit
want them.
1996-10-22 03:18:11 +00:00
pst
7fae940052 Fix a YTK bug. 1996-10-20 17:55:36 +00:00
joerg
0c6cd17945 Make pstat -s (aka. sswapinfo) print ``[NFS]'' as opposed to
``/dev/??'' for NFS swap.

I had a hard time to figure out whether it's possible to print the
actual mounted swap file, but i failed to get any information.  If
anybody knows how to get ``192.168.0.1:/swap.192.168.0.3'' instead,
please step forward!
1996-10-20 12:54:55 +00:00
jkh
a95b9bd326 Make changes suggested in PR#1825, closing it. Removes default local
hack behavior better than previous commit.
Submitted-By: Peter Childs <pjchilds@imforei.apana.org.au>
1996-10-18 03:47:53 +00:00
jkh
4822eb7860 Turn LOCALHACK off by default (whoops!)
Noticed-By: Atsushi Murai <amurai@spec.co.jp>
1996-10-18 01:44:45 +00:00
jkh
4bf196a8f9 Don't casually blow away FTP site settings now that it's easy for user
to override them.
1996-10-14 21:50:38 +00:00
jkh
1583864055 Remove the now-unusable ports configuration code. Swapping CDs is bogus. 1996-10-14 21:32:39 +00:00
jkh
34c1fc6b4c Fix PR#1557 - chained package dependencies using URLs didn't work. 1996-10-14 19:41:44 +00:00
sos
75d85a7c3c Fixed the security leek I introduced the other day, now
shell command is only executabel from command files, not
from the commandline.
1996-10-13 15:05:14 +00:00
jkh
3287a8d4c6 Be less draconian about distribution extraction errors - still write
/etc file changes out.
1996-10-12 23:48:33 +00:00
erich
69b9dc90e9 Get the pysical address for id_maddr when opening an -incore kernel.
This fixes the kernel panic when propagating userconfig changes to
arbitrary kernels.

Remove obsoleted `#include <tcl.h>' added a few <stdio.h> where
necessary.

Fix getting scsi bus information from an -incore kernel.

Turned on SAVE_USERCONFIG by default.
1996-10-12 20:23:26 +00:00
jkh
1689251411 Some cosmetic tweaks, attempt to fix package wait problem by checking
for error return as well (not sure if this is it, but it's one possible
explanation).
1996-10-12 19:30:26 +00:00