[Ticket#2009013010000513] FreeBSD Port: rancid-2.3.1_3 / Re:
Submit BUG report to FreeBSD for RANCID port with PATCH
Mohacsi Janos
mohacsi at niif.hu
Tue Feb 3 08:45:41 PST 2009
Dear All,
Your reques has been Forwarded to the authors.
Janos Mohacsi
Network Engineer, Research Associate, Head of Network Planning and Projects
NIIF/HUNGARNET, HUNGARY
Key 70EF9882: DEC2 C685 1ED4 C95A 145F 4300 6F64 7B00 70EF 9882
On Mon, 2 Feb 2009, Network Infrastructure Support wrote:
> The following patches, taken from
> 'http://blog.glinskiy.com/2007/03/rancid-and-netscreen-firewall.html' address some
> issues with netscreen firewalls.
>
> Please see inline patches below. Thanks!
>
> Your Ticket-Team
>
> Michael Joyner
>
> --
> Edward Waters College Information Technology
> Tookes Building - 1660 Kings Road, Jacksonville, FL 32209 USA
> Email: support at otrs.ewc.edu - Web: http://otrs.ewc.edu/otrs/customer.pl
> --
> ---- Forwarded message from Network Infrastructure Support <network at otrs.ewc.edu> ---
>
> From:
> Network Infrastructure Support <network at otrs.ewc.edu>
> To:
> it-group at listserv.ewc.edu
> Subject:
> [Ticket#2009013010000513] Submit BUG report to FreeBSD for RANCID port with PATCH
> Created:
> 01/30/2009 13:11:56
>
> http://blog.glinskiy.com/2007/03/rancid-and-netscreen-firewall.html
>
> =================
> [root at netdisco /usr/local/libexec/rancid]# diff -u -C 5 nlogin.dist nlogin
> *** nlogin.dist Fri Jan 30 12:46:12 2009
> --- nlogin Fri Jan 30 12:54:43 2009
> ***************
> *** 483,500 ****
>
> # Login to the firewall
> if {[login $firewall $ruser $userpswd $passwd $enapasswd $prompt $cmethod
> $cyphertype]} {
> continue
> }
> ! if { $enable } {
> ! if {[do_enable $enauser $enapasswd]} {
> ! if { $do_command || $do_script } {
> ! close; wait
> ! continue
> ! }
> ! }
> ! }
> # we are logged in, now figure out the full prompt
> send "\r"
> expect {
> -re "\[\r\n]+" { exp_continue; }
> -re "^.+$prompt" { set junk $expect_out(0,string);
> --- 483,500 ----
>
> # Login to the firewall
> if {[login $firewall $ruser $userpswd $passwd $enapasswd $prompt $cmethod
> $cyphertype]} {
> continue
> }
> ! # if { $enable } {
> ! # if {[do_enable $enauser $enapasswd]} {
> ! # if { $do_command || $do_script } {
> ! # close; wait
> ! # continue
> ! # }
> ! # }
> ! # }
> # we are logged in, now figure out the full prompt
> send "\r"
> expect {
> -re "\[\r\n]+" { exp_continue; }
> -re "^.+$prompt" { set junk $expect_out(0,string);
>
>
>
> [root at netdisco /usr/local/libexec/rancid]# diff -u -C 5 nrancid.dist nrancid
> *** nrancid.dist Fri Jan 30 12:54:49 2009
> --- nrancid Fri Jan 30 12:55:01 2009
> ***************
> *** 195,204 ****
> --- 195,205 ----
> if (/^set admin user (\S+) password (\S+) privilege (\S+)$/ &&
> $filter_pwds >= 1) {
> ProcessHistory("ADMIN","","",
> "!set admin user $1 password <removed> privilege $3\n");
> next;
> + }
> ProcessHistory("","","","$_");
> }
> $found_end=1;
> return(1);
> }
>
>
> Your Ticket-Team
>
> Michael Joyner
More information about the freebsd-ports
mailing list