Print this page
First stab at the full Joyent wad (still needs work!!!)

Split Close
Expand all
Collapse all
          --- old/build/openssh/patches/0010-PAM-enhancements-for-Solaris.patch
          +++ new/build/openssh/patches/0012-PAM-enhancements-for-Solaris.patch
   1      -From f31faf48842765bb3a9a5a9c400bf4613d639e94 Mon Sep 17 00:00:00 2001
        1 +From 8aa9debff40660ed691f984b805e513f3f54334b Mon Sep 17 00:00:00 2001
   2    2  From: oracle <solaris@oracle.com>
   3    3  Date: Mon, 3 Aug 2015 14:36:19 -0700
   4      -Subject: [PATCH 10/30] PAM enhancements for Solaris
        4 +Subject: [PATCH 12/36] PAM enhancements for Solaris
   5    5  
   6    6  #
   7    7  # This patch contains a couple of PAM enhancements:
   8    8  #   1) Each SSHv2 userauth method has its own PAM service name so that PAM can
   9    9  #      be used to control what userauth methods are allowed.
  10   10  #   2) The PAMServiceName and PAMServicePrefix options.
  11   11  #
  12   12  # We have contributed back this feature to the OpenSSH upstream community.
  13   13  # For more information, see https://bugzilla.mindrot.org/show_bug.cgi?id=2246
  14   14  # In the future, if these enhancements are accepted by the upsteam in a
↓ open down ↓ 560 lines elided ↑ open up ↑
 575  575  +#ifdef PAM_ENHANCEMENT
 576  576  +       char   *pam_service_prefix;
 577  577  +       char   *pam_service_name;
 578  578  +       int     pam_service_per_authmethod;
 579  579  +#endif
 580  580  +        
 581  581          int     fingerprint_hash;
 582  582   }       ServerOptions;
 583  583   
 584  584  diff --git a/sshd.1m b/sshd.1m
 585      -index 967a753..d67efd7 100644
      585 +index ada4f25..3753f90 100644
 586  586  --- a/sshd.1m
 587  587  +++ b/sshd.1m
 588  588  @@ -944,6 +944,33 @@ concurrently for different ports, this contains the process ID of the one
 589  589   started last).
 590  590   The content of this file is not sensitive; it can be world-readable.
 591  591   .El
 592  592  +
 593  593  +.Sh SECURITY
 594  594  +sshd uses pam(3PAM) for password and keyboard-interactive methods as well as 
 595  595  +for account management, session management, and the password management for all
↓ open down ↓ 17 lines elided ↑ open up ↑
 613  613  +| hostbased            | sshd-hostbased       |
 614  614  +-----------------------------------------------
 615  615  +| gssapi-with-mic      | sshd-gssapi          |
 616  616  +-----------------------------------------------
 617  617  +.Ed
 618  618  +
 619  619   .Sh SEE ALSO
 620  620   .Xr scp 1 ,
 621  621   .Xr sftp 1 ,
 622  622  diff --git a/sshd.c b/sshd.c
 623      -index 3df50f8..5a00ae2 100644
      623 +index 84e1dee..7e519d4 100644
 624  624  --- a/sshd.c
 625  625  +++ b/sshd.c
 626      -@@ -2159,6 +2159,11 @@ main(int ac, char **av)
      626 +@@ -2165,6 +2165,11 @@ main(int ac, char **av)
 627  627   
 628  628          sshd_exchange_identification(sock_in, sock_out);
 629  629   
 630  630  +#ifdef PAM_ENHANCEMENT
 631  631  +       if (!compat20)
 632  632  +               options.pam_service_per_authmethod = 0;
 633  633  +#endif
 634  634  +
 635  635          /* In inetd mode, generate ephemeral key only for proto 1 connections */
 636  636          if (!compat20 && inetd_flag && sensitive_data.server_key == NULL)
↓ open down ↓ 28 lines elided ↑ open up ↑
 665  665   is enabled, you will not be able to run
 666  666   .Xr sshd 1M
 667  667   as a non-root user.
 668  668  -The default is
 669  669  -.Dq no .
 670  670  +On Solaris, the option is always enabled.
 671  671   .It Cm UsePrivilegeSeparation
 672  672   Specifies whether
 673  673   .Xr sshd 1M
 674  674  -- 
 675      -2.3.2 (Apple Git-55)
      675 +2.5.4 (Apple Git-61)
 676  676  
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX