The following patches, taken from 'http://blog.glinskiy.com/2007/03/rancid-and-netscreen-firewall.html' address some issues with netscreen firewalls.
Please see inline patches below. Thanks! Your Ticket-Team Michael Joyner -- Edward Waters College Information Technology Tookes Building - 1660 Kings Road, Jacksonville, FL 32209 USA Email: supp...@otrs.ewc.edu - Web: http://otrs.ewc.edu/otrs/customer.pl -- ---- Forwarded message from Network Infrastructure Support <netw...@otrs.ewc.edu> --- From: Network Infrastructure Support <netw...@otrs.ewc.edu> To: it-gr...@listserv.ewc.edu Subject: [Ticket#2009013010000513] Submit BUG report to FreeBSD for RANCID port with PATCH Created: 01/30/2009 13:11:56 http://blog.glinskiy.com/2007/03/rancid-and-netscreen-firewall.html ================= [r...@netdisco /usr/local/libexec/rancid]# diff -u -C 5 nlogin.dist nlogin *** nlogin.dist Fri Jan 30 12:46:12 2009 --- nlogin Fri Jan 30 12:54:43 2009 *************** *** 483,500 **** # Login to the firewall if {[login $firewall $ruser $userpswd $passwd $enapasswd $prompt $cmethod $cyphertype]} { continue } ! if { $enable } { ! if {[do_enable $enauser $enapasswd]} { ! if { $do_command || $do_script } { ! close; wait ! continue ! } ! } ! } # we are logged in, now figure out the full prompt send "\r" expect { -re "\[\r\n]+" { exp_continue; } -re "^.+$prompt" { set junk $expect_out(0,string); --- 483,500 ---- # Login to the firewall if {[login $firewall $ruser $userpswd $passwd $enapasswd $prompt $cmethod $cyphertype]} { continue } ! # if { $enable } { ! # if {[do_enable $enauser $enapasswd]} { ! # if { $do_command || $do_script } { ! # close; wait ! # continue ! # } ! # } ! # } # we are logged in, now figure out the full prompt send "\r" expect { -re "\[\r\n]+" { exp_continue; } -re "^.+$prompt" { set junk $expect_out(0,string); [r...@netdisco /usr/local/libexec/rancid]# diff -u -C 5 nrancid.dist nrancid *** nrancid.dist Fri Jan 30 12:54:49 2009 --- nrancid Fri Jan 30 12:55:01 2009 *************** *** 195,204 **** --- 195,205 ---- if (/^set admin user (\S+) password (\S+) privilege (\S+)$/ && $filter_pwds >= 1) { ProcessHistory("ADMIN","","", "!set admin user $1 password <removed> privilege $3\n"); next; + } ProcessHistory("","","","$_"); } $found_end=1; return(1); } Your Ticket-Team Michael Joyner_______________________________________________ freebsd-ports@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ports To unsubscribe, send any mail to "freebsd-ports-unsubscr...@freebsd.org"