| Summary: | CVS PAM authentication does not support RHOST item | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | Petr Pisar <ppisar> | ||||
| Component: | cvs | Assignee: | Petr Pisar <ppisar> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Tomas Dolezal <todoleza> | ||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 6.1 | CC: | azelinka, ovasik, psklenar, redhat-bugzilla, rvokal, tao, todoleza | ||||
| Target Milestone: | rc | Keywords: | FutureFeature, Patch | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | cvs-1.11.23-16.el6 | Doc Type: | Enhancement | ||||
| Doc Text: |
Feature:
CVS server should pass client's IP address to Pluggable
Athentication Module (PAM) system.
Reason:
PAM allows to discriminate users according to their
network address. To use this feature, CVS server has to
set the remote address.
Result (if any):
CVS server has been patched to retrieve client's network
address and pass it the the PAM. Also the server has been
patched to set PAM_TTY variable to a dummy value `cvs'
because some PAM modules expect the value has a defined
value.
|
Story Points: | --- | ||||
| Clone Of: | cvs-pam-rhost | Environment: | |||||
| Last Closed: | 2013-11-21 06:07:58 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | |||||||
| Bug Blocks: | 947781 | ||||||
| Attachments: |
|
||||||
|
Description
Petr Pisar
2011-03-14 13:58:52 UTC
Created attachment 484192 [details]
Fix backported from upstream development version
This patch passes PAM_RHOST and PAM_TTY to PAM subsystem. The value is obtained
from standard input descriptor.
This way is more generic than former patch relying to environment.
This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. If you would like it considered as an exception in the current release, please ask your support representative. This request was evaluated by Red Hat Product Management for inclusion in the current release of Red Hat Enterprise Linux. Because the affected component is not scheduled to be updated in the current release, Red Hat is unfortunately unable to address this request at this time. It has been proposed for the next release. If you would like it considered as an exception in the current release, please ask your support representative. *** Bug 858692 has been marked as a duplicate of this bug. *** Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-1555.html |