diff options
author | Damien Miller <djm@mindrot.org> | 2001-11-13 23:46:18 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2001-11-13 23:46:18 +1100 |
commit | e49d0966b5e8e4ff4eb993f1b8511932dfcf7bf8 (patch) | |
tree | 8f89c9cfa2f0af078577106fd3492c7af192caf9 | |
parent | 056ca1eb473e2d4bd9fa867feb26f94a36f5d877 (diff) |
- (djm) AIX login{success,failed} changes. Move loginsuccess call to
do_authenticated. Call loginfailed for protocol 2 failures > MAX like
we do for protocol 1. Reports from Ralf Wenk <wera0003@fh-karlsruhe.de>,
K.Wolkersdorfer@fz-juelich.de and others
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | auth1.c | 12 | ||||
-rw-r--r-- | auth2.c | 12 | ||||
-rw-r--r-- | session.c | 9 |
4 files changed, 20 insertions, 19 deletions
@@ -1,6 +1,10 @@ 20011113 - (djm) Fix early (and double) free of remote user when using Kerberos. Patch from Simon Wilkinson <simon@sxw.org.uk> + - (djm) AIX login{success,failed} changes. Move loginsuccess call to + do_authenticated. Call loginfailed for protocol 2 failures > MAX like + we do for protocol 1. Reports from Ralf Wenk <wera0003@fh-karlsruhe.de>, + K.Wolkersdorfer@fz-juelich.de and others 20011112 - (djm) Makefile correctness fix from Mark D. Baushke <mdb@juniper.net> @@ -6891,4 +6895,4 @@ - Wrote replacements for strlcpy and mkdtemp - Released 1.0pre1 -$Id: ChangeLog,v 1.1658 2001/11/13 00:20:07 djm Exp $ +$Id: ChangeLog,v 1.1659 2001/11/13 12:46:18 djm Exp $ @@ -29,10 +29,6 @@ RCSID("$OpenBSD: auth1.c,v 1.25 2001/06/26 16:15:23 dugsong Exp $"); /* import */ extern ServerOptions options; -#ifdef WITH_AIXAUTHENTICATE -extern char *aixloginmsg; -#endif /* WITH_AIXAUTHENTICATE */ - /* * convert ssh auth msg type into description */ @@ -428,14 +424,6 @@ do_authentication() packet_send(); packet_write_wait(); -#ifdef WITH_AIXAUTHENTICATE - /* We don't have a pty yet, so just label the line as "ssh" */ - if (loginsuccess(authctxt->user, - get_canonical_hostname(options.reverse_mapping_check), - "ssh", &aixloginmsg) < 0) - aixloginmsg = NULL; -#endif /* WITH_AIXAUTHENTICATE */ - /* Perform session preparation. */ do_authenticated(authctxt); } @@ -57,10 +57,6 @@ extern ServerOptions options; extern u_char *session_id2; extern int session_id2_len; -#ifdef WITH_AIXAUTHENTICATE -extern char *aixloginmsg; -#endif - static Authctxt *x_authctxt = NULL; static int one = 1; @@ -282,8 +278,14 @@ userauth_finish(Authctxt *authctxt, int authenticated, char *method) /* now we can break out */ authctxt->success = 1; } else { - if (authctxt->failures++ > AUTH_FAIL_MAX) + if (authctxt->failures++ > AUTH_FAIL_MAX) { +#ifdef WITH_AIXAUTHENTICATE + loginfailed(authctxt->user, + get_canonical_hostname(options.reverse_mapping_check), + "ssh"); +#endif /* WITH_AIXAUTHENTICATE */ packet_disconnect(AUTH_FAIL_MSG, authctxt->user); + } methods = authmethods_get(); packet_start(SSH2_MSG_USERAUTH_FAILURE); packet_put_cstring(methods); @@ -159,7 +159,6 @@ const char *original_command = NULL; Session sessions[MAX_SESSIONS]; #ifdef WITH_AIXAUTHENTICATE -/* AIX's lastlogin message, set in auth1.c */ char *aixloginmsg; #endif /* WITH_AIXAUTHENTICATE */ @@ -191,6 +190,14 @@ do_authenticated(Authctxt *authctxt) } #endif #endif +#ifdef WITH_AIXAUTHENTICATE + /* We don't have a pty yet, so just label the line as "ssh" */ + if (loginsuccess(authctxt->user, + get_canonical_hostname(options.reverse_mapping_check), + "ssh", &aixloginmsg) < 0) + aixloginmsg = NULL; +#endif /* WITH_AIXAUTHENTICATE */ + /* setup the channel layer */ if (!no_port_forwarding_flag && options.allow_tcp_forwarding) channel_permit_all_opens(); |