Discussion:
[rancid] Re: [Ticket#2009013010000513] FreeBSD Port: rancid-2.3.1_3 / Re: Submit BUG report to FreeBSD for RANCID port with PATCH (fwd)
Mohacsi Janos
2009-02-03 16:42:01 UTC
Permalink
Dear All,
As a maintainer of FreeBSD port of rancid I received the following
report. I believe this should be addressed in the main distibution level.

Janos Mohacsi
Network Engineer, Research Associate, Head of Network Planning and Projects
NIIF/HUNGARNET, HUNGARY
Key 70EF9882: DEC2 C685 1ED4 C95A 145F 4300 6F64 7B00 70EF 9882

---------- Forwarded message ----------
Date: Mon, 2 Feb 2009 12:54:29 -0500
From: Network Infrastructure Support <***@otrs.ewc.edu>
To: ***@bsd.hu
Cc: ***@FreeBSD.org
Subject: Re: [Ticket#2009013010000513] FreeBSD Port: rancid-2.3.1_3 / Re: Submit
BUG report to FreeBSD for RANCID port with PATCH

The following patches, taken from
'http://blog.glinskiy.com/2007/03/rancid-and-netscreen-firewall.html' address some
issues with netscreen firewalls.

Please see inline patches below. Thanks!

Your Ticket-Team

Michael Joyner

--
Edward Waters College Information Technology
Tookes Building - 1660 Kings Road, Jacksonville, FL 32209 USA
Email: ***@otrs.ewc.edu - Web: http://otrs.ewc.edu/otrs/customer.pl
--
---- Forwarded message from Network Infrastructure Support <***@otrs.ewc.edu> ---

From:
Network Infrastructure Support <***@otrs.ewc.edu>
To:
it-***@listserv.ewc.edu
Subject:
[Ticket#2009013010000513] Submit BUG report to FreeBSD for RANCID port with PATCH
Created:
01/30/2009 13:11:56

http://blog.glinskiy.com/2007/03/rancid-and-netscreen-firewall.html

=================
[***@netdisco /usr/local/libexec/rancid]# diff -u -C 5 nlogin.dist nlogin
*** nlogin.dist Fri Jan 30 12:46:12 2009
--- nlogin Fri Jan 30 12:54:43 2009
***************
*** 483,500 ****

# Login to the firewall
if {[login $firewall $ruser $userpswd $passwd $enapasswd $prompt $cmethod
$cyphertype]} {
continue
}
! if { $enable } {
! if {[do_enable $enauser $enapasswd]} {
! if { $do_command || $do_script } {
! close; wait
! continue
! }
! }
! }
# we are logged in, now figure out the full prompt
send "\r"
expect {
-re "\[\r\n]+" { exp_continue; }
-re "^.+$prompt" { set junk $expect_out(0,string);
--- 483,500 ----

# Login to the firewall
if {[login $firewall $ruser $userpswd $passwd $enapasswd $prompt $cmethod
$cyphertype]} {
continue
}
! # if { $enable } {
! # if {[do_enable $enauser $enapasswd]} {
! # if { $do_command || $do_script } {
! # close; wait
! # continue
! # }
! # }
! # }
# we are logged in, now figure out the full prompt
send "\r"
expect {
-re "\[\r\n]+" { exp_continue; }
-re "^.+$prompt" { set junk $expect_out(0,string);



[***@netdisco /usr/local/libexec/rancid]# diff -u -C 5 nrancid.dist nrancid
*** nrancid.dist Fri Jan 30 12:54:49 2009
--- nrancid Fri Jan 30 12:55:01 2009
***************
*** 195,204 ****
--- 195,205 ----
if (/^set admin user (\S+) password (\S+) privilege (\S+)$/ &&
$filter_pwds >= 1) {
ProcessHistory("ADMIN","","",
"!set admin user $1 password <removed> privilege $3\n");
next;
+ }
ProcessHistory("","","","$_");
}
$found_end=1;
return(1);
}


Your Ticket-Team

Michael Joyner

Loading...