summaryrefslogtreecommitdiff
path: root/ftp/proftpd-devel/files/patch-ae
diff options
context:
space:
mode:
Diffstat (limited to 'ftp/proftpd-devel/files/patch-ae')
-rw-r--r--ftp/proftpd-devel/files/patch-ae201
1 files changed, 164 insertions, 37 deletions
diff --git a/ftp/proftpd-devel/files/patch-ae b/ftp/proftpd-devel/files/patch-ae
index b7525289a45a..406fcb1166c9 100644
--- a/ftp/proftpd-devel/files/patch-ae
+++ b/ftp/proftpd-devel/files/patch-ae
@@ -1,54 +1,181 @@
---- modules/mod_auth.c.orig Thu Mar 4 18:29:19 1999
-+++ modules/mod_auth.c Thu Apr 1 14:36:03 1999
-@@ -65,7 +65,7 @@
- /* Is this the proper behavior when timing out? */
- send_response_async(R_421,"Login Timeout (%d seconds): closing control connection.",
+--- modules/mod_auth.c.orig Fri Oct 22 22:18:49 1999
++++ modules/mod_auth.c Sun Dec 5 11:22:46 1999
+@@ -70,7 +70,7 @@
+ "closing control connection.",
TimeoutLogin);
-- main_exit((void*)LOG_NOTICE,"FTP login timed out, disconnected.",
-+ main_exit((void*)LOG_INFO,"FTP login timed out, disconnected.",
- (void*)0,NULL);
+
+- main_exit((void*) LOG_NOTICE, "FTP login timed out, disconnected.",
++ main_exit((void*) LOG_INFO, "FTP login timed out, disconnected.",
+ (void*) 0, NULL);
+
+ /* should never be reached */
+@@ -541,7 +541,7 @@
+ c = _auth_resolve_user(p,&user,&ourname,&anonname);
- /*
-@@ -787,13 +787,13 @@
+ if(!user) {
+- log_pri(LOG_NOTICE, "USER %s (Login failed): User not a UserAlias.",
++ log_pri(LOG_INFO, "USER %s (Login failed): User not a UserAlias.",
+ origuser);
+ goto auth_failure;
+ }
+@@ -550,7 +550,7 @@
+ aclp = login_check_limits(main_server->conf,FALSE,TRUE,&i);
+
+ if((pw = auth_getpwnam(p,user)) == NULL) {
+- log_pri(LOG_NOTICE, "USER %s (Login failed): Can't find user.", user);
++ log_pri(LOG_INFO, "USER %s (Login failed): Can't find user.", user);
+ goto auth_failure;
+ }
+
+@@ -607,14 +607,14 @@
+ }
+
+ if(!login_check_limits(c->subset,FALSE,TRUE,&i) || (!aclp && !i) ){
+- log_auth(LOG_NOTICE, "ANON %s (Login failed): Limit access denies "
++ log_auth(LOG_INFO, "ANON %s (Login failed): Limit access denies "
+ "login.", origuser);
+ goto auth_failure;
+ }
+ }
+
+ if(!c && !aclp) {
+- log_auth(LOG_NOTICE, "USER %s (Login failed): Limit access denies login.",
++ log_auth(LOG_INFO, "USER %s (Login failed): Limit access denies login.",
+ origuser);
+ goto auth_failure;
+ }
+@@ -628,7 +628,7 @@
+ /* if 'AuthUsingAlias' set and logging in under an alias then auth using that alias */
+ if (origuser && strcasecmp(user,origuser) && get_param_int(c->subset,"AuthUsingAlias",FALSE) == 1) {
+ user_name = origuser;
+- log_auth(LOG_NOTICE,"ANON AUTH: User %s, Auth Alias %s",user,user_name);
++ log_auth(LOG_INFO,"ANON AUTH: User %s, Auth Alias %s",user,user_name);
+ }
+
+ if(c)
+@@ -655,22 +655,22 @@
+
+ switch(authcode) {
+ case AUTH_NOPWD:
+- log_auth(LOG_NOTICE, "USER %s (Login failed): No such user found.",
++ log_auth(LOG_INFO, "USER %s (Login failed): No such user found.",
+ user);
+ goto auth_failure;
+
+ case AUTH_BADPWD:
+- log_auth(LOG_NOTICE, "USER %s (Login failed): Incorrect password.",
++ log_auth(LOG_INFO, "USER %s (Login failed): Incorrect password.",
+ origuser);
+ goto auth_failure;
+
+ case AUTH_AGEPWD:
+- log_auth(LOG_NOTICE, "USER %s (Login failed): Password expired.",
++ log_auth(LOG_INFO, "USER %s (Login failed): Password expired.",
+ user);
+ goto auth_failure;
+
+ case AUTH_DISABLEDPWD:
+- log_auth(LOG_NOTICE, "USER %s (Login failed): Account disabled.",
++ log_auth(LOG_INFO, "USER %s (Login failed): Account disabled.",
+ user);
+ goto auth_failure;
+
+@@ -693,12 +693,12 @@
+ auth_setgrent(p);
+
+ if(!_auth_check_shell((c ? c->subset : main_server->conf),pw->pw_shell)) {
+- log_auth(LOG_NOTICE, "USER %s (Login failed): Invalid shell.", user);
++ log_auth(LOG_INFO, "USER %s (Login failed): Invalid shell.", user);
+ goto auth_failure;
+ }
+
+ if(!_auth_check_ftpusers((c ? c->subset : main_server->conf),pw->pw_name)) {
+- log_auth(LOG_NOTICE, "USER %s (Login failed): User in %s.", FTPUSERS_PATH);
++ log_auth(LOG_INFO, "USER %s (Login failed): User in %s.", FTPUSERS_PATH);
+ goto auth_failure;
+ }
+
+@@ -769,7 +769,7 @@
+
+ if(!login_check_limits((c ? c->subset : main_server->conf),FALSE,TRUE,&i))
+ {
+- log_auth(LOG_NOTICE, "%s: Limit access denies login (DenyGroup).",
++ log_auth(LOG_INFO, "%s: Limit access denies login (DenyGroup).",
+ origuser);
+ goto auth_failure;
+ }
+@@ -784,9 +784,9 @@
resolve_anonymous_dirs(c->subset);
if(c)
-- log_auth(LOG_NOTICE,"ANONYMOUS FTP login as '%s' from %s [%s] to %s:%i",
-+ log_auth(LOG_INFO,"ANONYMOUS FTP login as '%s' from %s [%s] to %s:%i",
- origuser,session.c->remote_name,
- inet_ascii(p,session.c->remote_ipaddr),
- inet_ascii(p,session.c->local_ipaddr),
- session.c->local_port);
+- log_auth(LOG_NOTICE, "ANON %s: Login successful.", origuser);
++ log_auth(LOG_INFO, "ANON %s: Login successful.", origuser);
else
-- log_auth(LOG_NOTICE,"FTP login as '%s' from %s [%s] to %s:%i",
-+ log_auth(LOG_INFO,"FTP login as '%s' from %s [%s] to %s:%i",
- origuser,session.c->remote_name,
- inet_ascii(p,session.c->remote_ipaddr),
- inet_ascii(p,session.c->local_ipaddr),
-@@ -1156,7 +1156,7 @@
- send_response(R_530,"%s",
- sreplace(cmd->tmp_pool,maxstr,"%m",maxn,NULL));
+- log_auth(LOG_NOTICE,"USER %s: Login successful.", origuser);
++ log_auth(LOG_INFO,"USER %s: Login successful.", origuser);
-- log_auth(LOG_NOTICE,"connection refused (max clients per host %d)",
-+ log_auth(LOG_INFO,"connection refused (max clients per host %d)",
- max);
+ /* Write the login to wtmp. This must be done here because we won't
+ * have access after we give up root. This can result in falsified
+@@ -1050,7 +1050,7 @@
+
+ if(failnopwprompt) {
+ if(!user) {
+- log_pri(LOG_NOTICE, "USER %s (Login failed): Not a UserAlias.",
++ log_pri(LOG_INFO, "USER %s (Login failed): Not a UserAlias.",
+ origuser);
+ send_response(R_530,"Login incorrect.");
end_login(0);
+@@ -1067,7 +1067,7 @@
+
+ if(c) {
+ if(!login_check_limits(c->subset,FALSE,TRUE,&i) || (!aclp && !i) ) {
+- log_auth(LOG_NOTICE, "ANON %s: Limit access denies login.",
++ log_auth(LOG_INFO, "ANON %s: Limit access denies login.",
+ origuser);
+ send_response(R_530,"Login incorrect.");
+ end_login(0);
+@@ -1075,7 +1075,7 @@
}
-@@ -1180,7 +1180,7 @@
+
+ if(!c && !aclp) {
+- log_auth(LOG_NOTICE, "USER %s: Limit access denies login.", origuser);
++ log_auth(LOG_INFO, "USER %s: Limit access denies login.", origuser);
+ send_response(R_530,"Login incorrect.");
+ end_login(0);
+ }
+@@ -1146,7 +1146,7 @@
+ "Too many users in your class, "
+ "please try again later.");
+
+- log_auth(LOG_NOTICE, "Connection refused (max clients for class %s).",
++ log_auth(LOG_INFO, "Connection refused (max clients for class %s).",
+ session.class->name);
+
+ end_login(0);
+@@ -1179,7 +1179,7 @@
send_response(R_530,"%s",
sreplace(cmd->tmp_pool,maxstr,"%m",maxn,NULL));
-- log_auth(LOG_NOTICE,"connection refused (max clients %d)",
-+ log_auth(LOG_INFO,"connection refused (max clients %d)",
- max);
+- log_auth(LOG_NOTICE, "Connection refused (max clients per host %d).",
++ log_auth(LOG_INFO, "Connection refused (max clients per host %d).",
+ max);
+
+ end_login(0);
+@@ -1203,7 +1203,7 @@
+ if(cur >= max) {
+ send_response(R_530, "%s",
+ sreplace(cmd->tmp_pool, maxstr, "%m", maxn, NULL));
+- log_auth(LOG_NOTICE, "Connection refused (max clients %d).", max);
++ log_auth(LOG_INFO, "Connection refused (max clients %d).", max);
end_login(0);
}
-@@ -1267,7 +1267,7 @@
+
+@@ -1283,7 +1283,7 @@
if(++auth_tries >= max) {
send_response(R_530,"Login incorrect");
-- log_auth(LOG_NOTICE,"Maximum login attempts exceeded from %s [%s] to %s:%i",
-+ log_auth(LOG_INFO,"Maximum login attempts exceeded from %s [%s] to %s:%i",
- session.c->remote_name,
- inet_ascii(cmd->tmp_pool,session.c->remote_ipaddr),
- inet_ascii(cmd->tmp_pool,session.c->local_ipaddr),
+- log_auth(LOG_NOTICE, "Maximum login attempts exceeded.");
++ log_auth(LOG_INFO, "Maximum login attempts exceeded.");
+ end_login(0);
+ }
+