--- loncom/lond 2002/08/22 20:00:00 1.91 +++ loncom/lond 2002/09/03 02:01:14 1.94 @@ -2,7 +2,7 @@ # The LearningOnline Network # lond "LON Daemon" Server (port "LOND" 5663) # -# $Id: lond,v 1.91 2002/08/22 20:00:00 albertel Exp $ +# $Id: lond,v 1.94 2002/09/03 02:01:14 albertel Exp $ # # Copyright Michigan State University Board of Trustees # @@ -501,6 +501,8 @@ sub make_new_child { # ============================================================================= # do something with the connection # ----------------------------------------------------------------------------- + $client->sockopt(SO_KEEPALIVE, 1);# Enable monitoring of + # connection liveness. # see if we know client and check for spoof IP by challenge my $caller=getpeername($client); my ($port,$iaddr)=unpack_sockaddr_in($caller); @@ -660,7 +662,6 @@ sub make_new_child { $null=pack("C",0); unless ($upass=~/$null/) { my $krbclient=&Authen::Krb5::parse_name($uname.'@'.$contentpwd); - &logthis("Realm ".$krbclient->realm); my $krbservice="krbtgt/".$contentpwd."\@".$contentpwd; my $krbserver=&Authen::Krb5::parse_name($krbservice); my $credentials=&Authen::Krb5::cc_default(); @@ -668,10 +669,10 @@ sub make_new_child { my $krbreturn = &Authen::Krb5::get_in_tkt_with_password( $krbclient,$krbserver,$upass,$credentials); - unless ($krbreturn) { - &logthis("Krb5 Error: ". - &Authen::Krb5::error()); - } +# unless ($krbreturn) { +# &logthis("Krb5 Error: ". +# &Authen::Krb5::error()); +# } $pwdcorrect = ($krbreturn == 1); } else { $pwdcorrect=0; } } elsif ($howpwd eq 'localauth') { @@ -815,7 +816,8 @@ sub make_new_child { if ($udom ne $perlvar{'lonDefDomain'}) { print $client "not_right_domain\n"; } else { - &make_passwd_file($umode,$npass,$passfilename); + my $result=&make_passwd_file($umode,$npass, + $passfilename); print $client $result; } } else {