Blame openssh-5.8p1-audit0a.patch
|
Jan F |
edc172 |
Don't audit SSH_INVALID_USER twice.
|
|
Jan F |
edc172 |
|
|
Jan F |
edc172 |
PRIVSEP(getpwnamallow()) a few lines above already did this.
|
|
Jan F |
edc172 |
|
|
Jan F |
edc172 |
diff -ur openssh/auth2.c openssh-5.8p1/auth2.c
|
|
Jan F |
edc172 |
--- openssh/auth2.c 2011-03-02 02:32:52.383773622 +0100
|
|
Jan F |
edc172 |
+++ openssh-5.8p1/auth2.c 2011-03-02 03:32:34.585110911 +0100
|
|
Jan F |
edc172 |
@@ -250,9 +250,6 @@
|
|
Jan F |
edc172 |
} else {
|
|
Jan F |
edc172 |
logit("input_userauth_request: invalid user %s", user);
|
|
Jan F |
edc172 |
authctxt->pw = fakepw();
|
|
Jan F |
edc172 |
-#ifdef SSH_AUDIT_EVENTS
|
|
Jan F |
edc172 |
- PRIVSEP(audit_event(SSH_INVALID_USER));
|
|
Jan F |
edc172 |
-#endif
|
|
Jan F |
edc172 |
}
|
|
Jan F |
edc172 |
#ifdef USE_PAM
|
|
Jan F |
edc172 |
if (options.use_pam)
|