fix spelling mistake s/authentification/authentication/
This commit is contained in:
parent
2f0b279784
commit
a07f001ebd
|
@ -5062,7 +5062,7 @@ ipppd. Please note these hints from NOTES.IPPPD:
|
|||
ie: 'callback 0' -> simple callback (info via auth. etc.)
|
||||
'callback 3,12346' -> us E.164 (tel) number 123456 for callback
|
||||
'callback 6' is different. This value means, that the whole negotiation
|
||||
is done with a separate protocol after the authentification phase. Currently
|
||||
is done with a separate protocol after the authentication phase. Currently
|
||||
it's not possible to set any options in this case. The ipppd accepts
|
||||
everything from the remote side.
|
||||
</verb>
|
||||
|
|
|
@ -51,7 +51,7 @@ glibc2 compatibility and misc other cleanups
|
|||
|
||||
- [chg] src/eft* #include <stdlib.h> where needed for realpath()
|
||||
(for glibc2 support)
|
||||
- [imp] added paranoia check in eftd.c authentification handling.
|
||||
- [imp] added paranoia check in eftd.c authentication handling.
|
||||
- [imp] wuauth/{main,access,acl}.c: reject login if access file is required
|
||||
but opening or reading fails
|
||||
- [imp] wuauth/{*.c,config.h}: changed ordering of #include's and added
|
||||
|
@ -218,8 +218,8 @@ integrated changes provided by ms@msdatec.de
|
|||
- [new] eftd.c, option '-h/-?'
|
||||
- [new] eftd.c, eft_check_user(), main(), show_help()
|
||||
user mapping (option -n)
|
||||
if authentification fails and "eft_map_to_user" is not null,
|
||||
"eft_map_to_user" is tried for authentification (a password isn't
|
||||
if authentication fails and "eft_map_to_user" is not null,
|
||||
"eft_map_to_user" is tried for authentication (a password isn't
|
||||
supported yet)
|
||||
- [imp] eft_dir, eft_store_slist()
|
||||
hardcoded ".++eft_flat" replaced by eft_flat_dir_name
|
||||
|
|
|
@ -41,11 +41,11 @@ on top of this library:
|
|||
|
||||
- An EUROFILE server which can serve multiple connections
|
||||
simulatneously and supports navigation (i.e. changing directories).
|
||||
User authentification is provided by a separate
|
||||
authentification library derived from wu-ftpd which allows for fine
|
||||
User authentication is provided by a separate
|
||||
authentication library derived from wu-ftpd which allows for fine
|
||||
grained access control based on user-id, password, and remote isdn
|
||||
phone number. The design allows for easily exchanging the
|
||||
authentification routines by user-supplied versions.
|
||||
authentication routines by user-supplied versions.
|
||||
|
||||
This is all still alpha test software.
|
||||
That means it does certain tasks well at my site, but I know that
|
||||
|
@ -284,7 +284,7 @@ EUROfile project and I'd like to mention them explicitly:
|
|||
|
||||
Point of Presence GmbH provided ftp server space.
|
||||
|
||||
Georg v.Zezschwitz adapted the authentification code from the wu-ftpd
|
||||
Georg v.Zezschwitz adapted the authentication code from the wu-ftpd
|
||||
which is now used inside the eft server.
|
||||
|
||||
Martin Maurer provided protocol traces in the initial phase of development.
|
||||
|
|
|
@ -93,7 +93,7 @@ if anybody is interested:
|
|||
GUI file managers) or write an eft-http gateway by means
|
||||
of the eftp4linux core library.
|
||||
|
||||
Support other authentification methods (PAM comes to mind)
|
||||
Support other authentication methods (PAM comes to mind)
|
||||
|
||||
|
||||
And the "to do" list is incomplete as well.
|
||||
|
|
|
@ -1199,7 +1199,7 @@ fi
|
|||
# Default config options to be applied when configuring stand-alone
|
||||
#
|
||||
CONFIG_EFTD=${CONFIG_EFTD:-y}
|
||||
# Shall eurofile daemon use authentification modules from wu-ftpd?
|
||||
# Shall eurofile daemon use authentication modules from wu-ftpd?
|
||||
CONFIG_EFTD_WUAUTH=${CONFIG_EFTD_WUAUTH:-y}
|
||||
CONFIG_EFTP=${CONFIG_EFTP:-y}
|
||||
# This will be redefined to "n" by the configure script if no readline
|
||||
|
|
|
@ -27,7 +27,7 @@ fi
|
|||
# Default config options to be applied when configuring stand-alone
|
||||
#
|
||||
CONFIG_EFTD=${CONFIG_EFTD:-y}
|
||||
# Shall eurofile daemon use authentification modules from wu-ftpd?
|
||||
# Shall eurofile daemon use authentication modules from wu-ftpd?
|
||||
CONFIG_EFTD_WUAUTH=${CONFIG_EFTD_WUAUTH:-y}
|
||||
CONFIG_EFTP=${CONFIG_EFTP:-y}
|
||||
# This will be redefined to "n" by the configure script if no readline
|
||||
|
|
|
@ -134,7 +134,7 @@ OPTIONS
|
|||
limits might be imposed by the mumber of physically
|
||||
available isdn B-channels, the number of running
|
||||
incoming isdn network interfaces configured with
|
||||
"encap x25iface", or by the authentification procedure
|
||||
"encap x25iface", or by the authentication procedure
|
||||
(i.e. group limits configured in /etc/isdn/eftaccess).
|
||||
|
||||
When multi mode is activated, the server forks an
|
||||
|
|
|
@ -110,7 +110,7 @@ static int assoc_ind( struct tdu_user *usr, struct tdu_param *par)
|
|||
* passwd database.
|
||||
*
|
||||
* FIXME:
|
||||
* This check might be inappropriate if other authentification
|
||||
* This check might be inappropriate if other authentication
|
||||
* methods (not based on /etc/passwd) are used.
|
||||
*/
|
||||
|
||||
|
@ -126,7 +126,7 @@ static int assoc_ind( struct tdu_user *usr, struct tdu_param *par)
|
|||
|
||||
if( ! pw ){
|
||||
/* user is unknown (not in /etc/passwd).*/
|
||||
tdu_printf(TDU_LOG_LOG, "user %s not known, trying alternate authentification as user \"%s\" instead\n",
|
||||
tdu_printf(TDU_LOG_LOG, "user %s not known, trying alternate authentication as user \"%s\" instead\n",
|
||||
user, eft_map_to_user);
|
||||
user = eft_map_to_user;
|
||||
pass = "";
|
||||
|
|
|
@ -33,7 +33,7 @@ AUTH_LIB = -lwuauth
|
|||
ifdef EFT_AUTHDIR
|
||||
EFT_LIBDIR_FLAGS += -L $(EFT_AUTHDIR)
|
||||
eftd: $(EFT_AUTHDIR)/libwuauth.a
|
||||
# there is no header file for interfacing the authentification library yet
|
||||
# there is no header file for interfacing the authentication library yet
|
||||
endif
|
||||
endif
|
||||
|
||||
|
|
|
@ -109,11 +109,11 @@ static int eft_check_user( struct eft *eft, char* user, char* pass, char *isdn_n
|
|||
verified = wuftp_check_user(user, pass, isdn_no);
|
||||
printf("user check: ruid=%d, euid=%d\n",getuid(),geteuid());
|
||||
/*
|
||||
* Be paranoid about buggy authentification functions that claim
|
||||
* Be paranoid about buggy authentication functions that claim
|
||||
* success but are still running with super user priviliges.
|
||||
*/
|
||||
if (verified && !geteuid()){
|
||||
tdu_printf(TDU_LOG_ERR, "eftd: BUG in authentification procedure.\n (claims success, but process runs still with root priviliges).\nRejecting login for security reasons.\n");
|
||||
tdu_printf(TDU_LOG_ERR, "eftd: BUG in authentication procedure.\n (claims success, but process runs still with root priviliges).\nRejecting login for security reasons.\n");
|
||||
verified=0;
|
||||
}
|
||||
|
||||
|
|
|
@ -44,7 +44,7 @@ CHANGELOG:
|
|||
ie: 'callback 0' -> simple callback (info via auth. etc.)
|
||||
'callback 3,12346' -> us E.164 (tel) number 123456 for callback
|
||||
'callback 6' is different. This value means, that the whole negotiation
|
||||
is done with a separate protocol after the authentification phase. Currently
|
||||
is done with a separate protocol after the authentication phase. Currently
|
||||
it's not possible to set any options in this case. The ipppd accepts
|
||||
everything from the remote side.
|
||||
- IPX and MS_DNS are now compiled into the binary without additional option
|
||||
|
|
|
@ -347,7 +347,7 @@ static void network_phase(int linkunit)
|
|||
syslog(LOG_INFO,"ipppd[%d]: passed 2\n",linkunit);
|
||||
case 0:
|
||||
/*
|
||||
* login check when peer has authentification
|
||||
* login check when peer has authentication
|
||||
*/
|
||||
if(go->neg_chap)
|
||||
{
|
||||
|
|
Loading…
Reference in New Issue