[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-developers] RE: [cobalt-security] Significant OpenSSH Vulnerability ??
- Subject: Re: [cobalt-developers] RE: [cobalt-security] Significant OpenSSH Vulnerability ??
- From: Michael Stauber <devel@xxxxxxxxxxxxxx>
- Date: Tue Jun 25 13:45:01 2002
- Organization: SOLARSPEED.NET
- List-id: Discussion Forum for developers on Sun Cobalt Networks products <cobalt-developers.list.cobalt.com>
Hi Matthew,
> You guys who are compiling Apache:
> Are you trying to get mod_auth_pam working? If so, what have you done
> to do it? My attempts fail, but I can't find the correct sources for
> it.
Steve Bassi and Chris Burtons use mod_auth_pam from this URL:
http://pam.sourceforge.net/mod_auth_pam/dist/mod_auth_pam.tar.gz
(See: http://camelbackup.com/raq3-apache-1.3.26.html)
I use the regular mod_auth_pam_external which I found in SUN/Cobalt's
apache-1.3.20.srpm for the XTR.
While Steve and Chris use a manual procedure which seems to work fine on the
RaQ3's I'm trying the RPM approach on the RaQ4, using the specfile for the
Cobalt Apache-1.3.20 as a base.
This is how they (SUN) got the PAM working:
# Configure mod_auth_pam_external
cd ../mod_auth_pam_external-%{mod_auth_pam_external_version}
gcc -shared $RPM_BUILD_OPTS -I../apache_%{version}/src/include \
-I ../apache_%{version}/src/os/unix -fPIC -DEAPI \
mod_auth_pam_external.c -o mod_auth_pam_external.so -ldl -lpam
make -C authenticate
For an in-depth look at it download the SRPM and take a look at the included
SPEC file:
ftp://ftp-eng.cobalt.com/pub/unsupported/raq4/srpms/apache-1.3.20-RaQ4_1C1experimental.src.rpm
If you don't know how to take an (S)RPM apart, then use the easy approach:
chmod 644 *.rpm (if it was executable), start Midnight Commander, move the
cursor over the (S)RPM and press return: Voila. The sources, patches and SPEC
file are there and you can either examine them or copy 'em out to a place of
your liking.
--
Mit freundlichen Grüßen / With best regards
Michael Stauber
mstauber@xxxxxxxxxxxxxx
Unix/Linux Support Engineer