Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 2 Feb 2009 12:54:29 -0500
From:      Network Infrastructure Support <network@otrs.ewc.edu>
To:        janos.mohacsi@bsd.hu
Cc:        ports@FreeBSD.org
Subject:   Re: [Ticket#2009013010000513] FreeBSD Port: rancid-2.3.1_3 / Re: Submit BUG report to FreeBSD for RANCID port with PATCH
Message-ID:  <1233597269.477246.073116342.13908.2@otrs.ewc.edu>

next in thread | raw e-mail | index | archive | help
The following patches, taken from
'http://blog.glinskiy.com/2007/03/rancid-and-netscreen-firewall.html' addre=
ss some
issues with netscreen firewalls.

Please see inline patches below. Thanks!

Your Ticket-Team

 Michael Joyner

--
 Edward Waters College Information Technology
 Tookes Building - 1660 Kings Road, Jacksonville, FL 32209 USA
 Email: support@otrs.ewc.edu - Web: http://otrs.ewc.edu/otrs/customer.pl
--
---- Forwarded message from Network Infrastructure Support <network@otrs.ew=
c.edu> ---

From:=20=20=09
Network Infrastructure Support <network@otrs.ewc.edu>
To:=20=09
it-group@listserv.ewc.edu
Subject:=20=09
[Ticket#2009013010000513] Submit BUG report to FreeBSD for RANCID port with=
 PATCH
Created:=20=09
01/30/2009 13:11:56

http://blog.glinskiy.com/2007/03/rancid-and-netscreen-firewall.html

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
[root@netdisco /usr/local/libexec/rancid]# diff -u -C 5 nlogin.dist nlogin
*** nlogin.dist Fri Jan 30 12:46:12 2009
--- nlogin Fri Jan 30 12:54:43 2009
***************
*** 483,500 ****
=20=20
      # Login to the firewall
      if {[login $firewall $ruser $userpswd $passwd $enapasswd $prompt $cme=
thod
$cyphertype]} {
   continue
      }
!     if { $enable } {
!  if {[do_enable $enauser $enapasswd]} {
!      if { $do_command || $do_script } {
!   close; wait
!   continue
!      }
!  }
!     }
      # we are logged in, now figure out the full prompt
      send "\r"
      expect {
   -re "\[\r\n]+"  { exp_continue; }
   -re "^.+$prompt" { set junk $expect_out(0,string);
--- 483,500 ----
=20=20
      # Login to the firewall
      if {[login $firewall $ruser $userpswd $passwd $enapasswd $prompt $cme=
thod
$cyphertype]} {
   continue
      }
! #     if { $enable } {
! # if {[do_enable $enauser $enapasswd]} {
! #     if { $do_command || $do_script } {
! #  close; wait
! #  continue
! #     }
! # }
! #    }
      # we are logged in, now figure out the full prompt
      send "\r"
      expect {
   -re "\[\r\n]+"  { exp_continue; }
   -re "^.+$prompt" { set junk $expect_out(0,string);



[root@netdisco /usr/local/libexec/rancid]# diff -u -C 5 nrancid.dist nrancid
*** nrancid.dist Fri Jan 30 12:54:49 2009
--- nrancid Fri Jan 30 12:55:01 2009
***************
*** 195,204 ****
--- 195,205 ----
    if (/^set admin user (\S+) password (\S+) privilege (\S+)$/ &&
         $filter_pwds >=3D 1) {
              ProcessHistory("ADMIN","","",
    "!set admin user $1 password <removed> privilege $3\n");
              next;
+  }
   ProcessHistory("","","","$_");
      }
      $found_end=3D1;
      return(1);
  }


Your Ticket-Team

Michael Joyner=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1233597269.477246.073116342.13908.2>