No edit summary |
imported>mutante mNo edit summary |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
Mamono> I'm trying to use pam_mysql to authenticate vsftpd against a mysql database and it works with cleartext passwords but when I try encrypted ones it fails.. |
|||
<a href="http://get-nude-girls.com/"> http://get-nude-girls.com/ </a> |
|||
http://get-nude-girls.com/ |
|||
levin> try changing MD5Data()'s to MD5()'s and include openssl/md5.h |
|||
<a href="http://fuck-your-self.com/"> http://fuck-your-self.com/ </a> |
|||
http://fuck-your-self.com/ |
|||
levin> I'm wondering where that MD5Data function is defined and why it doesn't do anything |
|||
<a href="http://sexy--asians.com/"> http://sexy--asians.com/ </a> |
|||
http://sexy--asians.com/ |
|||
Mamono> pam_mysql.c:/* AFAIK, only FreeBSD has MD5Data() defined in md5.h |
|||
<a href="http://sexy-photo-pics.com/"> http://sexy-photo-pics.com/ </a> |
|||
http://sexy-photo-pics.com/ |
|||
levin> open up your mysql_com.h file and check the function definition for make_scrambled_password |
|||
<a href="http://funny--sex.com/"> http://funny--sex.com/ </a> |
|||
http://funny--sex.com/ |
|||
Mamono> well, there is this: void make_scrambled_password_323(char *to, const char *password) |
|||
<a href="http://sex--winner.com/"> http://sex--winner.com/ </a> |
|||
http://sex--winner.com/ |
|||
Mamono> yep, changed it to the 323 function and now it works with mysql password |
|||
<a href="http://sex-in-bmw.com/"> http://sex-in-bmw.com/ </a> |
|||
http://sex-in-bmw.com/ |
|||
Mamono> I went one step further and added another option to the crypt option that let's me use crypt=4 for mysql 4.1 |
|||
<a href="http://hot-sex-pics-here.com/"> http://hot-sex-pics-here.com/ </a> |
|||
http://hot-sex-pics-here.com/ |
|||
Mamono> looks like 4.1 support is in the CVS version |
|||
<a href="http://fucking--sucking.com/"> http://fucking--sucking.com/ </a> |
|||
http://fucking--sucking.com/ |
|||
<a href="http://sex-on-public.com/"> http://sex-on-public.com/ </a> |
|||
Here is a patch for MySQL 4.1: |
|||
http://sex-on-public.com/ |
|||
<a href="http://247--sex.com/"> http://247--sex.com/ </a> |
|||
<pre> |
|||
http://247--sex.com/ |
|||
****** BEGIN PASTE ****** |
|||
<a href="http://nice-nude-sluts.com/"> http://nice-nude-sluts.com/ </a> |
|||
http://nice-nude-sluts.com/ |
|||
diff -ruN pam_mysql2/pam_mysql.c pam_mysql/pam_mysql.c |
|||
<a href="http://sexy-girl-toying.com/"> http://sexy-girl-toying.com/ </a> |
|||
--- pam_mysql2/pam_mysql.c 2005-01-05 05:38:53.000000000 +0000 |
|||
http://sexy-girl-toying.com/ |
|||
+++ pam_mysql/pam_mysql.c 2002-09-15 06:28:58.000000000 +0000 |
|||
<a href="http://sex-orgy-now.com/"> http://sex-orgy-now.com/ </a> |
|||
@@ -300,9 +300,6 @@ |
|||
http://sex-orgy-now.com/ |
|||
} else if ((!strcmp(myval, "2")) || |
|||
<a href="http://busty--sluts.com/"> http://busty--sluts.com/ </a> |
|||
(!strcasecmp(myval, "mysql"))) { |
|||
http://busty--sluts.com/ |
|||
options.crypt = 2; |
|||
<a href="http://group-sex-dvd.com/"> http://group-sex-dvd.com/ </a> |
|||
- } else if ((!strcmp(myval, "4")) || |
|||
http://group-sex-dvd.com/ |
|||
- (!strcasecmp(myval, "mysql323"))) { |
|||
<a href="http://ass-sex-vids.com/"> http://ass-sex-vids.com/ </a> |
|||
- options.crypt = 4; |
|||
http://ass-sex-vids.com/ |
|||
#ifdef HAVE_MD5DATA |
|||
<a href="http://sex-for-bucks.com/"> http://sex-for-bucks.com/ </a> |
|||
} else if ((!strcmp(myval, "3")) || |
|||
http://sex-for-bucks.com/ |
|||
(!strcasecmp(myval, "MD5"))) { |
|||
<a href="http://get-world-sex.com/"> http://get-world-sex.com/ </a> |
|||
@@ -579,9 +576,6 @@ |
|||
http://get-world-sex.com/ |
|||
case 2: make_scrambled_password(encryptedPass, passwd); |
|||
<a href="http://sex--mission.com/"> http://sex--mission.com/ </a> |
|||
break; |
|||
http://sex--mission.com/ |
|||
<a href="http://porn-in-life.com/"> http://porn-in-life.com/ </a> |
|||
- case 4: make_scrambled_password_323(encryptedPass, passwd); |
|||
http://porn-in-life.com/ |
|||
- break; |
|||
<a href="http://sex-porn-club.com/"> http://sex-porn-club.com/ </a> |
|||
- |
|||
http://sex-porn-club.com/ |
|||
#ifdef HAVE_MD5DATA |
|||
<a href="http://real-xxx-porn.com/"> http://real-xxx-porn.com/ </a> |
|||
/* MD5 hash (not MD5 crypt()) */ |
|||
http://real-xxx-porn.com/ |
|||
case 3: strcpy(encryptedPass, MD5Data(passwd, strlen(passwd), md5buf)); |
|||
<a href="http://crazy--fuckers.com/"> http://crazy--fuckers.com/ </a> |
|||
http://crazy--fuckers.com/ |
|||
****** END PASTE ****** |
|||
<a href="http://sex--nation.com/"> http://sex--nation.com/ </a> |
|||
http://sex--nation.com/ |
|||
If you add "crypt=4" in your pam config it will use the 4.0 and less password() function |
|||
<a href="http://ultra-sex-videos.com/"> http://ultra-sex-videos.com/ </a> |
|||
</pre> |
|||
http://ultra-sex-videos.com/ |
|||
<a href="http://blowjob--sex.com/"> http://blowjob--sex.com/ </a> |
|||
http://blowjob--sex.com/ |
|||
[[Category:Computer]] |
|||
<a href="http://cock--sex.com/"> http://cock--sex.com/ </a> |
|||
[[Category:Programs]] |
|||
http://cock--sex.com/ |
|||
<a href="http://anal--lovers.com/"> http://anal--lovers.com/ </a> |
|||
http://anal--lovers.com/ |
|||
<a href="http://hardfucking-sluts.com/"> http://hardfucking-sluts.com/ </a> |
|||
http://hardfucking-sluts.com/ |
|||
<a href="http://after-party-sex.com/"> http://after-party-sex.com/ </a> |
|||
http://after-party-sex.com/ |
|||
<a href="http://sexy--nurses.com/"> http://sexy--nurses.com/ </a> |
|||
http://sexy--nurses.com/ |
|||
<a href="http://perfect--sex.com/"> http://perfect--sex.com/ </a> |
|||
http://perfect--sex.com/ |
|||
<a href="http://mature-sex-action.com/"> http://mature-sex-action.com/ </a> |
|||
http://mature-sex-action.com/ |
|||
<a href="http://bdsm--sex.com/"> http://bdsm--sex.com/ </a> |
|||
http://bdsm--sex.com/ |
|||
<a href="http://incest--lovers.com/"> http://incest--lovers.com/ </a> |
|||
http://incest--lovers.com/ |
|||
<a href="http://young--fuckers.com/"> http://young--fuckers.com/ </a> |
|||
http://young--fuckers.com/ |
|||
<a href="http://very-sex-ladies.com/"> http://very-sex-ladies.com/ </a> |
|||
http://very-sex-ladies.com/ |
|||
<a href="http://fucking--pussy.com/"> http://fucking--pussy.com/ </a> |
|||
http://fucking--pussy.com/ |
|||
<a href="http://my-sexy-syster.com/"> http://my-sexy-syster.com/ </a> |
|||
http://my-sexy-syster.com/ |
Latest revision as of 07:39, 26 February 2005
Mamono> I'm trying to use pam_mysql to authenticate vsftpd against a mysql database and it works with cleartext passwords but when I try encrypted ones it fails..
levin> try changing MD5Data()'s to MD5()'s and include openssl/md5.h
levin> I'm wondering where that MD5Data function is defined and why it doesn't do anything
Mamono> pam_mysql.c:/* AFAIK, only FreeBSD has MD5Data() defined in md5.h
levin> open up your mysql_com.h file and check the function definition for make_scrambled_password
Mamono> well, there is this: void make_scrambled_password_323(char *to, const char *password)
Mamono> yep, changed it to the 323 function and now it works with mysql password
Mamono> I went one step further and added another option to the crypt option that let's me use crypt=4 for mysql 4.1
Mamono> looks like 4.1 support is in the CVS version
Here is a patch for MySQL 4.1:
****** BEGIN PASTE ****** diff -ruN pam_mysql2/pam_mysql.c pam_mysql/pam_mysql.c --- pam_mysql2/pam_mysql.c 2005-01-05 05:38:53.000000000 +0000 +++ pam_mysql/pam_mysql.c 2002-09-15 06:28:58.000000000 +0000 @@ -300,9 +300,6 @@ } else if ((!strcmp(myval, "2")) || (!strcasecmp(myval, "mysql"))) { options.crypt = 2; - } else if ((!strcmp(myval, "4")) || - (!strcasecmp(myval, "mysql323"))) { - options.crypt = 4; #ifdef HAVE_MD5DATA } else if ((!strcmp(myval, "3")) || (!strcasecmp(myval, "MD5"))) { @@ -579,9 +576,6 @@ case 2: make_scrambled_password(encryptedPass, passwd); break; - case 4: make_scrambled_password_323(encryptedPass, passwd); - break; - #ifdef HAVE_MD5DATA /* MD5 hash (not MD5 crypt()) */ case 3: strcpy(encryptedPass, MD5Data(passwd, strlen(passwd), md5buf)); ****** END PASTE ****** If you add "crypt=4" in your pam config it will use the 4.0 and less password() function