Displaying 4 results from an estimated 4 matches for "hostbased_chost".
2006 May 15
0
[PATCH 4/12] bug fix: openssh-4.3p2 memory leak
...-4.3p2/monitor.c openssh-4.3p2-kylie/monitor.c
--- openssh-4.3p2/monitor.c 2005-11-04 22:07:05.000000000 -0600
+++ openssh-4.3p2-kylie/monitor.c 2006-05-08 17:18:15.697809744 -0500
@@ -1010,6 +1010,10 @@ mm_answer_keyallowed(int sock, Buffer *m
key_blobtype = type;
hostbased_cuser = cuser;
hostbased_chost = chost;
+ } else {
+ xfree(blob);
+ xfree(chost);
+ xfree(cuser);
}
debug3("%s: key %p is %s",
2006 Feb 12
1
sshd double-logging
...sa_key_allowed(authctxt->pw,
cuser, chost, key);
+ auth_method = "rsa";
break;
default:
fatal("%s: unknown key type %d", __func__, type);
@@ -1010,6 +1014,9 @@ mm_answer_keyallowed(int sock, Buffer *m
key_blobtype = type;
hostbased_cuser = cuser;
hostbased_chost = chost;
+ } else {
+ /* Log failed attempt */
+ auth_log(authctxt, 0, auth_method, compat20 ? " ssh2" : "");
}
debug3("%s: key %p is %s",
@@ -1374,6 +1381,7 @@ mm_answer_rsa_keyallowed(int sock, Buffe
debug3("%s entering", __func__);
+ auth_met...
2015 Jun 18
7
[Bug 2415] New: Public key failures are not counted and therefore not logged into syslog
...rse
I want to make sure that I didn't miss something from protocol
specification. But everything looks like prepared for this, except it
doesn't work.
diff --git a/monitor.c b/monitor.c
--- a/monitor.c
+++ b/monitor.c
@@ -1267,6 +1267,7 @@ mm_answer_keyallowed(int sock, Buffer *m)
hostbased_chost = chost;
} else {
/* Log failed attempt */
+ authctxt->failures++;
auth_log(authctxt, 0, 0, auth_method, NULL);
free(blob);
free(cuser);
--
You are receiving this mail because:
You are watching the assignee of the bug.
2003 Oct 08
4
OS/390 openssh
...g(m, &bloblen);
- signature = buffer_get_string(m, &signaturelen);
- data = buffer_get_string(m, &datalen);
+ blob = buffer_get_binary(m, &bloblen);
+ signature = buffer_get_binary(m, &signaturelen);
+ data = buffer_get_binary(m, &datalen);
if (hostbased_cuser == NULL || hostbased_chost == NULL ||
!monitor_allowed_key(blob, bloblen))
@@ -1361,7 +1361,7 @@
key->type = KEY_RSA; /* cheat for key_to_blob */
if (key_to_blob(key, &blob, &blen) == 0)
fatal("%s: key_to_blob failed", __func__);
- buffer_put_string(m, blob, blen);
+ buffer_put_binary(m,...