--- loncom/lond 2002/08/22 20:00:00 1.91 +++ loncom/lond 2002/09/13 02:46:12 1.96 @@ -2,7 +2,7 @@ # The LearningOnline Network # lond "LON Daemon" Server (port "LOND" 5663) # -# $Id: lond,v 1.91 2002/08/22 20:00:00 albertel Exp $ +# $Id: lond,v 1.96 2002/09/13 02:46:12 foxr Exp $ # # Copyright Michigan State University Board of Trustees # @@ -83,6 +83,34 @@ my $DEBUG = 0; # Non zero to ena my $status=''; my $lastlog=''; +# +# The array below are password error strings." +# +my $lasterror = 10; # Largest error number from lcpasswd. +my @passwderrors = ("ok", + "lcpasswd must be run as user 'www'", + "lcpasswd got incorrect number of arguments", + "lcpasswd did not get the right nubmer of input text lines", + "lcpasswd too many simultaneous pwd changes in progress", + "lcpasswd User does not exist.", + "lcpasswd Incorrect current passwd", + "lcpasswd Unable to su to root.", + "lcpasswd Cannot set new passwd.", + "lcpasswd Username has invalid characters", + "lcpasswd Invalid characters in password"); + +# +# Convert an error return code from lcpasswd to a string value. +# +sub lcpasswdstrerror { + my $ErrorCode = shift; + if(($ErrorCode < 0) || ($ErrorCode > $lasterror)) { + return "lcpasswd Unrecognized error return value ".$ErrorCode; + } else { + return $passwderrors($ErrorCode); + } +} + # grabs exception and records it to log before exiting sub catchexception { my ($error)=@_; @@ -107,9 +135,8 @@ $SIG{'QUIT'}=\&catchexception; $SIG{__DIE__}=\&catchexception; # ---------------------------------- Read loncapa_apache.conf and loncapa.conf -&status("Read loncapa_apache.conf and loncapa.conf"); -my $perlvarref=LONCAPA::Configuration::read_conf('loncapa_apache.conf', - 'loncapa.conf'); +&status("Read loncapa.conf and loncapa_apache.conf"); +my $perlvarref=LONCAPA::Configuration::read_conf('loncapa.conf'); my %perlvar=%{$perlvarref}; undef $perlvarref; @@ -501,6 +528,8 @@ sub make_new_child { # ============================================================================= # do something with the connection # ----------------------------------------------------------------------------- + $client->sockopt(SO_KEEPALIVE, 1);# Enable monitoring of + # connection liveness. # see if we know client and check for spoof IP by challenge my $caller=getpeername($client); my ($port,$iaddr)=unpack_sockaddr_in($caller); @@ -660,7 +689,6 @@ sub make_new_child { $null=pack("C",0); unless ($upass=~/$null/) { my $krbclient=&Authen::Krb5::parse_name($uname.'@'.$contentpwd); - &logthis("Realm ".$krbclient->realm); my $krbservice="krbtgt/".$contentpwd."\@".$contentpwd; my $krbserver=&Authen::Krb5::parse_name($krbservice); my $credentials=&Authen::Krb5::cc_default(); @@ -668,10 +696,10 @@ sub make_new_child { my $krbreturn = &Authen::Krb5::get_in_tkt_with_password( $krbclient,$krbserver,$upass,$credentials); - unless ($krbreturn) { - &logthis("Krb5 Error: ". - &Authen::Krb5::error()); - } +# unless ($krbreturn) { +# &logthis("Krb5 Error: ". +# &Authen::Krb5::error()); +# } $pwdcorrect = ($krbreturn == 1); } else { $pwdcorrect=0; } } elsif ($howpwd eq 'localauth') { @@ -743,7 +771,8 @@ sub make_new_child { close $pf; my $result = ($?>0 ? 'pwchange_failure' : 'ok'); - &logthis("Result of password change for $uname: $result"); + &logthis("Result of password change for $uname: ". + &lcpasswdstrerror($?)); print $client "$result\n"; } else { print $client "non_authorized\n"; @@ -815,7 +844,8 @@ sub make_new_child { if ($udom ne $perlvar{'lonDefDomain'}) { print $client "not_right_domain\n"; } else { - &make_passwd_file($umode,$npass,$passfilename); + my $result=&make_passwd_file($umode,$npass, + $passfilename); print $client $result; } } else {