Make it Happen

2002-01-20 Thread tbeveridge
TIRED OF ENDLESSLY POSTING YOUR ONLINE CLASSIFIED AD AND GETTING NO RESULTS? There are over 7000 such sites scattered about the web; and quite frankly, none of them generate enough traffic to be worth your while. Even when someone finds or visits one of these sites, your ad is hopelessly lost i

Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Andrey A. Chernov
Bug: srandomdev() can't be used in libraries because it touch internal RNG state which may be used by user program which not want true randomness but pseudo one. Fix: srandomdev() removed, random() replaced by arc4random() which initialize itself from true randomness automatically. --- pam_uni

Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Andrey A. Chernov
Bug: There is possible when pam_sm_acct_mgmt() called, password is not expired, but due to some delay between calls (like network delays for NIS passwords), expired at the moment of pam_sm_authenticate() check. It may allow user to enter with expired password under some circumstanes when he is

Diskless Boot Working in -Current ??

2002-01-20 Thread Glenn Gombert
I have several kernels built using v4.3 that boot fine over an etherboot/NFS network but a kernel built using GENERIC (with the necesary options added to diskless booting, does not seem to boot), also the option 'MFS' (Memory File System) seems to have been removed from -CURRENT for some reason..

Step3, pam_opie snprintf bloat fix for review

2002-01-20 Thread Andrey A. Chernov
Bug: snprintf is large and slow, increasing program size and slowing it down. Better way is avoid snprintf when it is not neccessary. Fix: Full functionality of snprintf is not needed below, so it is replaced by much faster strlcpy. --- pam_opie.c.bak Sat Jan 19 21:29:49 2002 +++ pam_opie.

Re: Step3, pam_opie snprintf bloat fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > Bug: > snprintf is large and slow, increasing program size and slowing it down. > Better way is avoid snprintf when it is not neccessary. > > Fix: > Full functionality of snprintf is not needed below, so it is replaced by > much faster strlcpy.

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > Bug: > There is possible when pam_sm_acct_mgmt() called, password is not > expired, but due to some delay between calls (like network delays for NIS > passwords), expired at the moment of pam_sm_authenticate() check. > > It may allow user to ente

Step4, pam_opie getpwnam check fix for review

2002-01-20 Thread Andrey A. Chernov
Bug: getpwnum() (or getlogin() in earlier stage) may return NULL under various complex circumstanes, but following code not expect it and may cause NULL pointer reference and core dump. Fix: Add check for NULL and return PAM_AUTH_ERR --- pam_opie.c.bak Sun Jan 20 22:23:18 2002 +++ pam_opi

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Mark Murray
> Bug: > There is possible when pam_sm_acct_mgmt() called, password is not > expired, but due to some delay between calls (like network delays for NIS > passwords), expired at the moment of pam_sm_authenticate() check. It is not pam_sm_authenticate()'s job to determine such things as expiry. Thi

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 20:41:09 +0100, Dag-Erling Smorgrav wrote: > pam_sm_acct_mgmt() is allowed to return PAM_AUTHTOK_EXPIRED (which is > a better return value than PAM_AUTH_ERR for this case). Other than > that, I have no objections to your patch. This is fix for pam_sm_authenticate(), not

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 19:47:55 +, Mark Murray wrote: > > Do you mean that at at the very edge of password expiry, the user may > still be able log in (maybe some seconds later)? If so this is not a > credible threat. Yes. Few seconds can be few hours or more in case network is down or some

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Mark Murray
> Bug: > srandomdev() can't be used in libraries because it touch internal RNG > state which may be used by user program which not want true randomness but > pseudo one. > > Fix: > srandomdev() removed, random() replaced by arc4random() which initialize > itself from true randomness automaticall

Re: Step4, pam_opie getpwnam check fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > Bug: > getpwnum() (or getlogin() in earlier stage) may return NULL under > various complex circumstanes, but following code not expect it and may > cause NULL pointer reference and core dump. > > Fix: > Add check for NULL and return PAM_AUTH_ERR

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Dag-Erling Smorgrav
Mark Murray <[EMAIL PROTECTED]> writes: > > Bug: > > There is possible when pam_sm_acct_mgmt() called, password is not > > expired, but due to some delay between calls (like network delays for NIS > > passwords), expired at the moment of pam_sm_authenticate() check. > It is not pam_sm_authenticat

Re: Step3, pam_opie snprintf bloat fix for review

2002-01-20 Thread Mark Murray
> Bug: > snprintf is large and slow, increasing program size and slowing it down. > Better way is avoid snprintf when it is not neccessary. > > Fix: > Full functionality of snprintf is not needed below, so it is replaced by > much faster strlcpy. This is fine! Style - please make it 'sizeof(fo

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 19:55:31 +, Mark Murray wrote: > > This works, but strikes me as overkill. This is salt, not cryptographic > randomness, so 'srandom(junk)' is most likely better as a replacement > for srandomdev() (where 'junk' can be time(), pid or anything similar). You can't call

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > On Sun, Jan 20, 2002 at 20:41:09 +0100, Dag-Erling Smorgrav wrote: > > pam_sm_acct_mgmt() is allowed to return PAM_AUTHTOK_EXPIRED (which is > > a better return value than PAM_AUTH_ERR for this case). Other than > > that, I have no objections to y

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Mark Murray
> On Sun, Jan 20, 2002 at 19:47:55 +, Mark Murray wrote: > > > > Do you mean that at at the very edge of password expiry, the user may > > still be able log in (maybe some seconds later)? If so this is not a > > credible threat. > > Yes. Few seconds can be few hours or more in case network i

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Dag-Erling Smorgrav
Mark Murray <[EMAIL PROTECTED]> writes: > > On Sun, Jan 20, 2002 at 19:47:55 +, Mark Murray wrote: > > > Do you mean that at at the very edge of password expiry, the user may > > > still be able log in (maybe some seconds later)? If so this is not a > > > credible threat. > > Yes. Few seconds

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 21:07:14 +0100, Dag-Erling Smorgrav wrote: > I misread your mail. Pam_sm_authenticate() is not supposed to care > that the password is expired. If it did, it users with expired > passwords would be effectively locked out; they're supposed to get a > chance to change their

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > Yes, but I mean edge case when password yet not expired at the moment of > pam_acct_mgmt() call (i.e. pam_acct_mgmt() not return > PAM_AUTHTOK_EXPIRED), but expired at the moment of pam_authenticate() > call. There can be big network delay betwee

Re: Step2, pam_unix just expired pass fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 20:06:32 +, Mark Murray wrote: > > pam_authenticate() answers the question "does the user have the correct > credentials?". pam_acct_mgmt() answers the question "OK - they are who > they say they are. Are they allowed in _now_?". Well, I tend to agree, Step2 is withdr

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Mark Murray
> On Sun, Jan 20, 2002 at 19:55:31 +, Mark Murray wrote: > > > > This works, but strikes me as overkill. This is salt, not cryptographic > > randomness, so 'srandom(junk)' is most likely better as a replacement > > for srandomdev() (where 'junk' can be time(), pid or anything similar). > > Y

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 20:17:21 +, Mark Murray wrote: > > Hmm. OK. Do you understand, though, why the salt does not need > cryptographic randomness? Yes. > Another patch of yours replaced sprintf with a faster strlcpy, > but this uses the _much_ slower arc4random() which is not > necessary

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Mark Murray
> > The original crypt(3) salt quantised the time-of-day into > > 4096 pieces for the salt - how about doing something like > > that? UUEncode time()|pid()|getuid() might work just fine. > > I agree. But I don't plan to improve PAM in this my fix, I just want to > unbreak application first. Some

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 20:34:35 +, Mark Murray wrote: > > > The original crypt(3) salt quantised the time-of-day into > > > 4096 pieces for the salt - how about doing something like > > > that? UUEncode time()|pid()|getuid() might work just fine. > > > > I agree. But I don't plan to improve

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Terry Lambert
"Andrey A. Chernov" wrote: > On Sun, Jan 20, 2002 at 19:55:31 +, Mark Murray wrote: > > This works, but strikes me as overkill. This is salt, not cryptographic > > randomness, so 'srandom(junk)' is most likely better as a replacement > > for srandomdev() (where 'junk' can be time(), pid or any

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Mark Murray
> > Second step is effectively damages srandom(3) RNG state. > > Since the library is a totally encapsulated usage, it makes sense > for it to save and restore state aroun its use of the functions, > which would effectively allow concurrent use of the generator > with other code that uses it. >

Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
Bug: pam_opie module _always_ allows Unix (plaintext) password, even in the cases which are disabled by OPIE auth procedure. Description: How non-PAM standalone OPIE works: 1) If OPIE user exists, its remote host checked against /etc/opieaccess via opieaccessfile() 2) If remote host is found

Re: Step1, pam_unix srandomdev fix for review

2002-01-20 Thread Peter Jeremy
On 2002-Jan-20 21:51:07 +, Mark Murray <[EMAIL PROTECTED]> wrote: >> > Second step is effectively damages srandom(3) RNG state. >> >> Since the library is a totally encapsulated usage, it makes sense >> for it to save and restore state aroun its use of the functions, >> which would effectivel

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray
> Bug: > > pam_opie module _always_ allows Unix (plaintext) password, even in the > cases which are disabled by OPIE auth procedure. I agree that this is a bug. > Description: > > How non-PAM standalone OPIE works: > > 1) If OPIE user exists, its remote host checked against /etc/opieaccess >

"Current & Etherboot"

2002-01-20 Thread Glenn Gombert
etherboot runs fine on Current, all that is required if to have the 'device.hints' statically compiled into the kernel you are trying to boot: #To statically compile in device wiring instead of /boot/device.hints hints "NETBOOT.hints" #Default places to look for devices. bit

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 23:14:13 +, Mark Murray wrote: > > The PAM OPIE may only do OPIE authentication. It is entirely up to the > PAM stack to decide what the login policy is. > > (Well, the PAM stack as specified by the pam configs in /etc/pam*) Yes. And to allow PAM stack to make right

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray
> On Sun, Jan 20, 2002 at 23:14:13 +, Mark Murray wrote: > > > > The PAM OPIE may only do OPIE authentication. It is entirely up to the > > PAM stack to decide what the login policy is. > > > > (Well, the PAM stack as specified by the pam configs in /etc/pam*) > > Yes. And to allow PAM stac

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > Yes. And to allow PAM stack to make right decision, pam_opie pass special > information to PAM stack. Look at the patch, pam_opie not breaks from the > stack by yourself, it is /etc/pam* do that using information from > pam_opie. What I can't unde

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Sun, Jan 20, 2002 at 23:44:44 +, Mark Murray wrote: > > Yes. And to allow PAM stack to make right decision, pam_opie pass special > > information to PAM stack. Look at the patch, pam_opie not breaks from the > > stack by yourself, it is /etc/pam* do that using information from > > pam_opie

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Dag-Erling Smorgrav
Dag-Erling Smorgrav <[EMAIL PROTECTED]> writes: > In any case, if I understand what you're trying to do, it can be done > by returning PAM_SUCCESS if OPIE authentication succeeded, PAM_IGNORE > if it failed but Unix authentication is still allowed, and > PAM_AUTH_ERR if OPIE failed and Unix authen

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray
> On Sun, Jan 20, 2002 at 23:44:44 +, Mark Murray wrote: > > > > Yes. And to allow PAM stack to make right decision, pam_opie pass special > > > information to PAM stack. Look at the patch, pam_opie not breaks from the > > > stack by yourself, it is /etc/pam* do that using information from >

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 00:56:46 +0100, Dag-Erling Smorgrav wrote: > > What I can't understand is why OPIE is making that decision in the > first place. The only answer I can think of is that it was written > before the advent of PAM, and tries to be a poor man's PAM. That is > not its place.

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray
> Dag-Erling Smorgrav <[EMAIL PROTECTED]> writes: > > In any case, if I understand what you're trying to do, it can be done > > by returning PAM_SUCCESS if OPIE authentication succeeded, PAM_IGNORE > > if it failed but Unix authentication is still allowed, and > > PAM_AUTH_ERR if OPIE failed and U

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > The basic OPIE/S-KEY idea under that was that normally only one-time > password is allowed, i.e. user is not allowed to type plaintext passwords > at all because connection treated as totally insecured one. > > But for very special cases configure

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 00:09:21 +, Mark Murray wrote: > > Dag-Erling Smorgrav <[EMAIL PROTECTED]> writes: > > > In any case, if I understand what you're trying to do, it can be done > > > by returning PAM_SUCCESS if OPIE authentication succeeded, PAM_IGNORE > > > if it failed but Unix authent

For Review: sendmail 8.12.2 import into -CURRENT

2002-01-20 Thread Gregory Neil Shapiro
I am seeking volunteers to review and test the infrastructure changes needed to import sendmail 8.12.2 into FreeBSD (-CURRENT). If you are interested in helping, please visit: http://people.freebsd.org/~gshapiro/CURRENT-8.12.2 and following the instructions there. Please report any successes o

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 01:17:44 +0100, Dag-Erling Smorgrav wrote: > > That's what PAM is for. If fixed (not necessary plaintext!) passwords > are allowed, the admin will mark pam_opie as "sufficient" and place > pam_unix below it; if they're not, he'll just remove pam_unix. It not allows flexi

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Mark Murray
> "sufficient" will not works due to IGNORE assigned to AUTH_ERR reaction. > > [default=ignore success=done auth_err=die] > > works. > > Do you agree with this variant? Eeew. It may work, but it is really a last-ditch sort of thing. I much prefer an option that specifies the behaviour. M --

Re: profiled kernel build fails was Re: -CURRENT AIO bug

2002-01-20 Thread k Macy
Should I file a PR to track this or is that overkill? -Kip --- Bruce Evans <[EMAIL PROTECTED]> wrote: > On Sat, 19 Jan 2002, k Macy wrote: > > > Thanks for working on this. I was going to try > running > > a profiled kernel on -CURRENT and -STABLE to see > what > > the difference

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > [default=ignore success=done auth_err=die] > > works. > > Do you agree with this variant? No. That's a Linuxism. DES -- Dag-Erling Smorgrav - [EMAIL PROTECTED] To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 00:29:29 +, Mark Murray wrote: > > "sufficient" will not works due to IGNORE assigned to AUTH_ERR reaction. > > > > [default=ignore success=done auth_err=die] > > > > works. > > > > Do you agree with this variant? > > Eeew. It may work, but it is really a last-ditc

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 01:34:02 +0100, Dag-Erling Smorgrav wrote: > "Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > > [default=ignore success=done auth_err=die] > > > > works. > > > > Do you agree with this variant? > > No. That's a Linuxism. What do you mean, exactly? Long forms are well

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > On Mon, Jan 21, 2002 at 01:17:44 +0100, Dag-Erling Smorgrav wrote: > > The current system, BTW, leaves the policy in the hands of the user, > > as she can create or remove ~/.opie_always at will. A security policy > > which is based on letting the

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > What you dislike in that way? This method fully described in pam(8). The fact that it is described in pam(8) does not mean we like it. We also have a man page for gets(3), but you know what BDE will say if you try to use it. > I see no differenc

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 01:42:00 +0100, Dag-Erling Smorgrav wrote: > > The admin can't enforce "always OPIE" for a user, because the user can > always delete his ~/.opiealways. This is per-machine choice. Long time ago, for S-KEY, it was per-terminal choice too, but OPIE currently not have per-

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 03:49:08 +0300, Andrey A. Chernov wrote: > > How about I write a pam_opieaccess(8) module and you tell me what you > > think of it? It's really the cleanest solution from PAM's point of > > view. > > Ok, I'll write it and send for review. Oops, some keyboard slip. I mean

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 01:45:37 +0100, Dag-Erling Smorgrav wrote: > > No. The "[...]" form is a Linux-PAM invention, and is tightly linked > to Linux-PAM implementation details. It does not exist in other PAM > implementations. I aim to move *away* from dependence on Linux-PAM, > not *towards

GDB maintainer?

2002-01-20 Thread k Macy
Who is the current GDB maintainer? -Kip __ Do You Yahoo!? Send FREE video emails in Yahoo! Mail! http://promo.yahoo.com/videomail/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the bo

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Dag-Erling Smorgrav
"Andrey A. Chernov" <[EMAIL PROTECTED]> writes: > On Mon, Jan 21, 2002 at 01:42:00 +0100, Dag-Erling Smorgrav wrote: > > The admin can't enforce "always OPIE" for a user, because the user can > > always delete his ~/.opiealways. > This is per-machine choice. Long time ago, for S-KEY, it was per-te

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 02:21:34 +0100, Dag-Erling Smorgrav wrote: > > I'm sorry, but in my opinion that should really be the admin's > decision. You can trust a machine without necessarily trusting users > coming from that machine to pick good passwords. I not advocate some my position here, I

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
On Mon, Jan 21, 2002 at 02:21:34 +0100, Dag-Erling Smorgrav wrote: > > No need. See the attached patch. > Tested. I use /etc/pam.d/login for test with following OPIE lines: authsufficient pam_opie.so no_warn authrequisite pam_opieaccess.so no_warn

Extended paging bug in Athlon affect FreeBSD?

2002-01-20 Thread Raman Ng
I don't know what mailing list this mail should be posted to, sorry if it is posted to the wrong mailing list. Recently I found Linux 2.4 kernel is affected by the bug of extended paging in AMD Athlon through the following link. I don't know if FreeBSD is also affected. http://linuxtoday.com/ne

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Andrey A. Chernov
BTW, I have a doubt about PAM_SYSTEM_ERR code you use in several places like this: > if (luser == NULL) > PAM_RETURN(PAM_SYSTEM_ERR); Please explain two moments: 1) What is stack reaction on this option? Is it the same like PAM_AUTH_ERR reaction or not? 2) Can PAM_SYSTEM_

Hi Friend

2002-01-20 Thread liltator
Warning Unable to process data: multipart/mixed;boundary="=_NextPart_000_1B37_2A92.1000"

Re: Diskless Boot Working in -Current ??

2002-01-20 Thread Robert Watson
I use diskless booting daily on 5.0-CURRENT, and after some tweaks to rc.diskless[12] (now committed) it works just fine. In 5.0-CURRENT, FFS is used directly over malloc disks (md) to support local storage. You should be able to configure netbooing on 5.0 in much the same way as RELENG_4. Are

Re: "Current & Etherboot"

2002-01-20 Thread Robert Watson
Most people I know of that netboot boxes on Intel platforms now use PXE. With PXE config, the pxe loader has full access to the NFS-mounted /boot directory, so there's no reason to compile in the hints. Robert N M Watson FreeBSD Core Team, TrustedBSD Project [EMAIL PROTECTED] N

__stderrp error

2002-01-20 Thread Julian Elischer
Lots of my old programs get: /usr/libexec/ld-elf.so.1: /usr/local/lib/libpng.so.3: Undefined symbol "__stderrp" this is NOT the error in UPDATING and doing what it says for a similar problem: 20010924: The buildworld has been fixed. You may need to install the 4.x compati

Re: Step5, pam_opie OPIE auth fix for review

2002-01-20 Thread Terry Lambert
Mark Murray wrote: > > Yes. And to allow PAM stack to make right decision, pam_opie pass special > > information to PAM stack. Look at the patch, pam_opie not breaks from the > > stack by yourself, it is /etc/pam* do that using information from > > pam_opie. > > Sure - but you are making speciali

Re: __stderrp error

2002-01-20 Thread Emiel Kollof
Julian Elischer heeft op maandag 21 januari 2002 om 08:34 het volgende geschreven: > > Lots of my old programs get: > /usr/libexec/ld-elf.so.1: /usr/local/lib/libpng.so.3: Undefined symbol > "__stderrp" > > this is NOT the error in UPDATING [...] It isn't? It's related. I've seen it before. Se

Re: __stderrp error

2002-01-20 Thread Julian Elischer
On Mon, 21 Jan 2002, Emiel Kollof wrote: > > Julian Elischer heeft op maandag 21 januari 2002 om 08:34 het volgende > geschreven: > > > > > Lots of my old programs get: > > /usr/libexec/ld-elf.so.1: /usr/local/lib/libpng.so.3: Undefined symbol > > "__stderrp" > > > > this is NOT the error in