Shadowlands Forum 1.9.6.4 (Stable branch)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Software Releases - RSS News Shadowlands Forum 1.9.6.4 (Stable branch)
# 1  
Old 07-04-2008
Shadowlands Forum 1.9.6.4 (Stable branch)

Shadowlands Forum is a flexible, friendly, robust chatroom reachable via any telnet client. It uses UNIX username/password for authentication, and includes the authlocal module to authenticate quickly from localhost. License: GNU General Public License (GPL) Changes:
This release adds a recap of the recent conversation when connecting, runs on Fedora 9/GCC 4.3, and fixes a potential infinite loop in banner printing. For PAM support, it now uses the "login" service, not "slforum", with added logging for PAM errors. For scripting/monitoring, it now writes a user count file, for checking status from outside the room.Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. What is on Your Mind?

Mobile: Advanced Forum Statistics to Forum Home Page

For mobile users, I have just added a "first beta" Advanced Forum Statistics to the home page on mobile using CSS overflow:auto; so you can swipe if you need to see more. Google Search Console mobile usability says this page is "mobile friendly" so perhaps this will be useful for some of our... (12 Replies)
Discussion started by: Neo
12 Replies

2. What is on Your Mind?

Forum Update: Disabled Home Page Forum Statistics for Guests (Not Registered)

Just a quick update; to speed up the forums, I have disabled the forum statistics on the home page for non registered users. No changes for registered users. (0 Replies)
Discussion started by: Neo
0 Replies
Login or Register to Ask a Question
pam_authenticate(3PAM)													    pam_authenticate(3PAM)

NAME
pam_authenticate - perform authentication within the PAM framework SYNOPSIS
cc [ flag ... ] file ... -lpam [ library ... ] #include <security/pam_appl.h> int pam_authenticate(pam_handle_t *pamh, int flags); The pam_authenticate() function is called to authenticate the current user. The user is usually required to enter a password or similar authentication token depending upon the authentication service configured within the system. The user in question should have been speci- fied by a prior call to pam_start() or pam_set_item(). The following flags may be set in the flags field: PAM_SILENT Authentication service should not generate any messages. PAM_DISALLOW_NULL_AUTHTOK The authentication service should return PAM_AUTH_ERR if the user has a null authentication token. Upon successful completion, PAM_SUCCESS is returned. In addition to the error return values described in pam(3PAM), the following values may be returned: PAM_AUTH_ERR Authentication failure. PAM_CRED_INSUFFICIENT Cannot access authentication data due to insufficient credentials. PAM_AUTHINFO_UNAVAIL Underlying authentication service cannot retrieve authentication information. PAM_USER_UNKNOWN User not known to the underlying authentication module. PAM_MAXTRIES An authentication service has maintained a retry count which has been reached. No further retries should be attempted. See attributes(5) for description of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability | Stable | +-----------------------------+-----------------------------+ |MT-Level |MT-Safe with exceptions | +-----------------------------+-----------------------------+ pam(3PAM), pam_open_session(3PAM), pam_set_item(3PAM), pam_setcred(3PAM), pam_start(3PAM), libpam(3LIB), attributes(5) In the case of authentication failures due to an incorrect username or password, it is the responsibility of the application to retry pam_authenticate() and to maintain the retry count. An authentication service module may implement an internal retry count and return an error PAM_MAXTRIES if the module does not want the application to retry. If the PAM framework cannot load the authentication module, then it will return PAM_ABORT. This indicates a serious failure, and the application should not attempt to retry the authentication. For security reasons, the location of authentication failures is hidden from the user. Thus, if several authentication services are stacked and a single service fails, pam_authenticate() requires that the user re-authenticate each of the services. A null authentication token in the authentication database will result in successful authentication unless PAM_DISALLOW_NULL_AUTHTOK was specified. In such cases, there will be no prompt to the user to enter an authentication token. The interfaces in libpam are MT-Safe only if each thread within the multithreaded application uses its own PAM handle. 27 Jan 2005 pam_authenticate(3PAM)