From owner-freebsd-bugs Tue Aug 11 21:50:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id VAA19310 for freebsd-bugs-outgoing; Tue, 11 Aug 1998 21:50:07 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id VAA19258 for ; Tue, 11 Aug 1998 21:50:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id VAA14541; Tue, 11 Aug 1998 21:50:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id VAA18386; Tue, 11 Aug 1998 21:43:45 -0700 (PDT) (envelope-from nobody) Message-Id: <199808120443.VAA18386@hub.freebsd.org> Date: Tue, 11 Aug 1998 21:43:45 -0700 (PDT) From: joes@wstein.com To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: bin/7584: pppd login fails to check /etc/passwd Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 7584 >Category: bin >Synopsis: pppd login fails to check /etc/passwd >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Aug 11 21:50:00 PDT 1998 >Last-Modified: >Originator: Joseph Stein >Organization: Stein Family Internet Services >Release: FreeBSD 2.2.7-STABLE >Environment: FreeBSD shasta.wstein.com 2.2.7-STABLE FreeBSD 2.2.7-STABLE #0: Sat Jul 25 11:50:38 PDT 1998 root@shasta.wstein.com:/usr/src/sys/compile/SHASTA i386 >Description: When a user logs into a pppd server running (as of 25-Jul-1998, fwiw) with 'login' set, that user will not be able to connect to the server; pppd logs 'PAP authentication failed' and both sides are seeing the correct password. >How-To-Repeat: Try to login to a pppd-server without attaching the following mod: >Fix: around line 688 (or so; I added in some debugging to find this) there is a line that reads if (uselogin && ret == UPAP_AUTHACK) change the UPAP_AUTHACK to UPAP_AUTHNAK and it'll work like a charm. you have to change your /etc/ppp/pap-secrets file though, to include the authorized IP addresses. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message