version 1.273, 2003/07/16 10:34:53 |
version 1.274, 2003/07/22 13:35:22 |
|
|
"originating port %d not trusted.", remote_port); |
"originating port %d not trusted.", remote_port); |
options.rhosts_authentication = 0; |
options.rhosts_authentication = 0; |
} |
} |
#if defined(KRB4) && !defined(KRB5) |
#ifdef KRB5 |
if (!packet_connection_is_ipv4() && |
if (!packet_connection_is_ipv4() && |
options.kerberos_authentication) { |
options.kerberos_authentication) { |
debug("Kerberos Authentication disabled, only available for IPv4."); |
debug("Kerberos Authentication disabled, only available for IPv4."); |
options.kerberos_authentication = 0; |
options.kerberos_authentication = 0; |
} |
} |
#endif /* KRB4 && !KRB5 */ |
#endif |
#ifdef AFS |
|
/* If machine has AFS, set process authentication group. */ |
|
if (k_hasafs()) { |
|
k_setpag(); |
|
k_unlog(); |
|
} |
|
#endif /* AFS */ |
|
|
|
packet_set_nonblocking(); |
packet_set_nonblocking(); |
|
|
|
|
auth_mask |= 1 << SSH_AUTH_RHOSTS_RSA; |
auth_mask |= 1 << SSH_AUTH_RHOSTS_RSA; |
if (options.rsa_authentication) |
if (options.rsa_authentication) |
auth_mask |= 1 << SSH_AUTH_RSA; |
auth_mask |= 1 << SSH_AUTH_RSA; |
#if defined(KRB4) || defined(KRB5) |
#ifdef KRB5 |
if (options.kerberos_authentication) |
if (options.kerberos_authentication) |
auth_mask |= 1 << SSH_AUTH_KERBEROS; |
auth_mask |= 1 << SSH_AUTH_KERBEROS; |
#endif |
|
#if defined(AFS) || defined(KRB5) |
|
if (options.kerberos_tgt_passing) |
if (options.kerberos_tgt_passing) |
auth_mask |= 1 << SSH_PASS_KERBEROS_TGT; |
auth_mask |= 1 << SSH_PASS_KERBEROS_TGT; |
#endif |
|
#ifdef AFS |
|
if (options.afs_token_passing) |
|
auth_mask |= 1 << SSH_PASS_AFS_TOKEN; |
|
#endif |
#endif |
if (options.challenge_response_authentication == 1) |
if (options.challenge_response_authentication == 1) |
auth_mask |= 1 << SSH_AUTH_TIS; |
auth_mask |= 1 << SSH_AUTH_TIS; |