Telnet Updates – NET+OS 6.3

 

 

 

Last Updated: 06/18/07         Fix Count: 5

 

 

Title
Telnet callback issue

 

Case: 23230

 

Date Fixed:  06/18/07

Description

Unpredictable behavior occurs when executing a soft reset after the application has returned an error condition in the telnet receive callback.

 

Solution

Corrected defect in receive_callback error handler that caused a RESET vector overwrite at address 0.

                                                                                            

 

Title
Login retry limit exceeded

 

Case: 20734

 

Date Fixed:  02/06/07

Description

A username that has a valid password defined in the sysAccess database could be used in a telnet login along with carriage return as the password. The user would not be logged in, but the user would be given an infinite number of retires instead of the 3 to which he is supposed to be limited.

 

Solution

The code that decrements the retry count was not being called (executed). This has been corrected.

                                                                                            

 

Title

Buffer limitation in callback function
 

Case: 1218515

 

Date fixed: 10/06/06

 

Description

When using the XMODEM 1K protocol over telnet, some messages could exceed the buffer limit causing the error

"Input buffer overflow , disconnecting" to be generated.

 

Solution

Increased TS_BUFFER_SIZE to 2048 to accommodate the larger messages of the protocol 
 
 

Title

Password restriction removed

 

Case: 1215608

 

Date Fixed:  08/08/06

Description

All users were required to have a username and password.

 

Solution

We now allow a telnet user to be declared to have username only (no password)
and ensure that the user is not prompted for a password on login

 

 

Title
Login failures not properly handled

 

Case: 17109

 

Date Fixed:  10/17/06

Description

NARegisterTraceFailure() function's parameter function  is not called when login failure detected

Solution

validate_userandpass uses the function NACheckAuthentication for username and password authentication. If an invalid username was entered, the code as implemented, would never get to the point to call the validation failure callback.  This has been corrected.

 

 

Files:   netos\src\bsp\common\sysAccess.c

            netos\lib\arm7\32b\ghs\libtelnsvr.a
            netos\lib\arm9\32b\gnu\libtelnsvr.a
            netos\lib\arm7\32b\ghs\
libtelnsvr.a
            netos\lib\arm9\32b\gnu\libtelnsvr.a

Special Instructions

 

 

Patch Link:  TelnetUpdates_63

 

Dependencies

This patch also requires the installation of the following patch(es):

None