configuration.  PAMAuthenticationViaKbdInt does not function with
 privsep.
 
+On Compaq Tru64 Unix, only the pre-authentication part of privsep is
+supported.  Post-authentication privsep is disabled automatically (so
+you won't see the additional process mentioned below).
+
 Note that for a normal interactive login with a shell, enabling privsep
 will require 1 additional process per login session.
 
 process 6917 is the privileged monitor process, 6919 is the user owned
 sshd process and 6921 is the shell process.
 
-$Id: README.privsep,v 1.10 2002/06/26 00:43:57 stevesk Exp $
+$Id: README.privsep,v 1.11 2003/03/21 01:18:09 mouring Exp $
 
 extern int saved_argc;
 extern char **saved_argv;
 
-extern int errno;
-
 int
 auth_sia_password(Authctxt *authctxt, char *pass)
 {
        int ret;
        SIAENTITY *ent = NULL;
        const char *host;
-       char *user = authctxt->user;
 
        host = get_canonical_hostname(options.verify_reverse_mapping);
 
-       if (pass[0] == '\0')
+       if (!authctxt->user || !pass || pass[0] == '\0')
                return(0);
 
-       if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, NULL, 0,
-           NULL) != SIASUCCESS)
+       if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
+           NULL, 0, NULL) != SIASUCCESS)
                return(0);
 
        if ((ret = sia_ses_authent(NULL, pass, ent)) != SIASUCCESS) {
-               error("Couldn't authenticate %s from %s", user, host);
+               error("Couldn't authenticate %s from %s", authctxt->user,
+                   host);
                if (ret & SIASTOP)
                        sia_ses_release(&ent);
                return(0);
 }
 
 void
-session_setup_sia(char *user, char *tty)
+session_setup_sia(struct passwd *pw, char *tty)
 {
-       struct passwd *pw;
        SIAENTITY *ent = NULL;
        const char *host;
 
-       host = get_canonical_hostname (options.verify_reverse_mapping);
+       host = get_canonical_hostname(options.verify_reverse_mapping);
 
-       if (sia_ses_init(&ent, saved_argc, saved_argv, host, user, tty, 0,
-           NULL) != SIASUCCESS) {
+       if (sia_ses_init(&ent, saved_argc, saved_argv, host, pw->pw_name, tty,
+           0, NULL) != SIASUCCESS)
                fatal("sia_ses_init failed");
-       }
 
-       if ((pw = getpwnam(user)) == NULL) {
-               sia_ses_release(&ent);
-               fatal("getpwnam: no user: %s", user);
-       }
        if (sia_make_entity_pwd(pw, ent) != SIASUCCESS) {
                sia_ses_release(&ent);
                fatal("sia_make_entity_pwd failed");
        }
 
        ent->authtype = SIA_A_NONE;
-       if (sia_ses_estab(sia_collect_trm, ent) != SIASUCCESS) {
-               fatal("Couldn't establish session for %s from %s", user,
-                   host);
-       }
-
-       if (setpriority(PRIO_PROCESS, 0, 0) == -1) {
-               sia_ses_release(&ent);
-               fatal("setpriority: %s", strerror (errno));
-       }
+       if (sia_ses_estab(sia_collect_trm, ent) != SIASUCCESS)
+               fatal("Couldn't establish session for %s from %s",
+                   pw->pw_name, host);
 
-       if (sia_ses_launch(sia_collect_trm, ent) != SIASUCCESS) {
-               fatal("Couldn't launch session for %s from %s", user, host);
-       }
+       if (sia_ses_launch(sia_collect_trm, ent) != SIASUCCESS)
+               fatal("Couldn't launch session for %s from %s", pw->pw_name,
+                   host);
        
        sia_ses_release(&ent);
 
-       if (setreuid(geteuid(), geteuid()) < 0) {
+       if (setreuid(geteuid(), geteuid()) < 0)
                fatal("setreuid: %s", strerror(errno));
-       }
 }
 
 #endif /* HAVE_OSF_SIA */