Re: NEW: Tacacs+ port - shrubbery.net version

2019-06-30 Thread Gleydson Soares
Hi sthen, > Slightly tweaked version attached, this one's ok with me: > > - https homepage > - PERMIT_*_CDROM is not used for new ports > - whitespace nit in Makefile > - tweak comment in patch > - place @extraunexec above the @sample line, that way pkg_delete -c doesn't > complain about a

Re: NEW: Tacacs+ port - shrubbery.net version

2019-06-30 Thread Stuart Henderson
On 2019/05/23 20:09, Jan Vlach wrote: > Hi Gleydson, Stuart, ports, > > I'm running tac_plus with 200+ boxes with IOS, IOS-XE and IOS-XR. > > please see attached tgz for updated port. > > - I've taken Gleydson's latest work from openbsd-wip (I don't see the > unexec and/or doc/shared

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-25 Thread Jan Vlach
Hi, tac_plus compiles and runs fine on octeon too. (Edge Router Lite, -current) Tested slightly with py_tacacs_plus. Encrypted and cleartext logins work, and authentication both to syslog and dedicated file. jvl On Fri, May 24, 2019 at 01:49:29PM +0200, Ampie Niemand wrote: > This does the

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-24 Thread Ampie Niemand
This does the trick and installs perfectly on macppc, will test i386 and amd64 when I get home. My thoughts are that because all the TACACS+ ports were obsolete after 6.2, the _tacacs user was sort of "deauthorized" in the infrastructure userlist. Reading the error message properly this time it

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-24 Thread Gleydson Soares
Try with the change below and Let us know if it works for you, Thank you sent from my mobile device On Fri, May 24, 2019, at 7:43 AM, Gleydson Soares wrote: > it requires _tacacs user due to privdrop, so you need to uncomment the > folllwing line: > {x250} /usr/ports $ grep -rn tacacs

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-24 Thread Gleydson Soares
it requires _tacacs user due to privdrop, so you need to uncomment the folllwing line: {x250} /usr/ports $ grep -rn tacacs /usr/ports/infrastructure/* /usr/ports/infrastructure/db/user.list:22:#511 _tacacs _tacacs net/tacacs+ i'm with limited internet access till tomorrow

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-24 Thread Ampie Niemand
Hi, all. Thanks for reviving this awesome service. I'm failing at the last hurdle with both macppc and amd64: .. .. ===> Building package for tacacs+-4.0.4.28v0 Create /usr/ports/packages/powerpc/all/tacacs+-4.0.4.28v0.tgz Creating package tacacs+-4.0.4.28v0 Error: newgroup _tacacs:

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-23 Thread Pierre Emeriaud
> > Also should be nice sent patches upstream. Jan Vlach, what do you think > > about? > > not sure there's an upstream at all: fwiw, there is some faint activity at tac_p...@shrubbery.net, with mostly John Heasley helping poor souls. Patches should be welcomed here I guess. many thanks for

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-23 Thread Jan Vlach
Gleydson, > Done. > Thanks for the feedback, i'm pushing it to openbsd-wip. is this the correct openbsd-wip? https://github.com/jasperla/openbsd-wip I don't see the changes sthen@ pointed out there ... > PS.: I'm running it and works just fine It has a dozen of Cisco Nexus > switches

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-23 Thread Jan Vlach
Hi Gleydson, Stuart, ports, I'm running tac_plus with 200+ boxes with IOS, IOS-XE and IOS-XR. please see attached tgz for updated port. - I've taken Gleydson's latest work from openbsd-wip (I don't see the unexec and/or doc/shared implemented in PLIST) * - provided simplified

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-23 Thread Gleydson Soares
> Can you use the standard locations for doc/examples please rather > than /usr/local/share/tacacs? Yep. > Needs @extraunexec rm -f /var/log/tac_plus/* for pkg_delete -c. Done. Thanks for the feedback, i'm pushing it to openbsd-wip. PS.: I'm running it and works just fine It has a dozen of

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-22 Thread Stuart Henderson
On 2019/05/20 16:55, Gleydson Soares wrote: > Hi Jan, > > thank you for your effort on this port. > i've pushed it to openbsd-wip at > https://github.com/jasperla/openbsd-wip/tree/master/net/tacacs%2B > it addresses the joint work of you and sthen@ > > are you still ok regarding of taking

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-21 Thread Jan Vlach
Hi Gleydson, thank you for getting in touch! I'm running it in production, so yes, taking maintainer is ok. I haven't tried to rebuild with 6.5 yet, that's on my TODO list though. Could do that in next few days for both 6.5 and -current. Thank you, Jan On Mon, May 20, 2019 at 04:55:33PM

Re: NEW: Tacacs+ port - shrubbery.net version

2019-05-20 Thread Gleydson Soares
Hi Jan, thank you for your effort on this port. i've pushed it to openbsd-wip at https://github.com/jasperla/openbsd-wip/tree/master/net/tacacs%2B it addresses the joint work of you and sthen@ are you still ok regarding of taking maintanership? i will give some extra tests and double review

Re: NEW: Tacacs+ port - shrubbery.net version

2018-10-30 Thread Jan Vlach
Hello Stuart, thank you for fixing and feedback on the tacacs+ port. I've learned a lot here. Sorry for late response, I was missing some commmands in accounting log and command denies were not enforced properly and I needed to find out why. I was missing part of config on the catalyst side, so

Re: NEW: Tacacs+ port - shrubbery.net version

2018-10-25 Thread Stuart Henderson
On 2018/10/25 11:33, Jan Vlach wrote: > Hi, > > this is NEW port of tacacs+ based on the version from people at > shrubbery.net (as hinted in net/tacacs+ in attic) > > * I've patched out tac_pwd, so it is not being built. It just > segfaults, can generate md5 and des passwords. encrypt(1)

NEW: Tacacs+ port - shrubbery.net version

2018-10-25 Thread Jan Vlach
Hi, this is NEW port of tacacs+ based on the version from people at shrubbery.net (as hinted in net/tacacs+ in attic) * I've patched out tac_pwd, so it is not being built. It just segfaults, can generate md5 and des passwords. encrypt(1) is better choice to get supported hash. *