search for: hostbased_chost

Displaying 4 results from an estimated 4 matches for "hostbased_chost".

2006 May 15
0
[PATCH 4/12] bug fix: openssh-4.3p2 memory leak
...-4.3p2/monitor.c openssh-4.3p2-kylie/monitor.c --- openssh-4.3p2/monitor.c 2005-11-04 22:07:05.000000000 -0600 +++ openssh-4.3p2-kylie/monitor.c 2006-05-08 17:18:15.697809744 -0500 @@ -1010,6 +1010,10 @@ mm_answer_keyallowed(int sock, Buffer *m key_blobtype = type; hostbased_cuser = cuser; hostbased_chost = chost; + } else { + xfree(blob); + xfree(chost); + xfree(cuser); } debug3("%s: key %p is %s",
2006 Feb 12
1
sshd double-logging
...sa_key_allowed(authctxt->pw, cuser, chost, key); + auth_method = "rsa"; break; default: fatal("%s: unknown key type %d", __func__, type); @@ -1010,6 +1014,9 @@ mm_answer_keyallowed(int sock, Buffer *m key_blobtype = type; hostbased_cuser = cuser; hostbased_chost = chost; + } else { + /* Log failed attempt */ + auth_log(authctxt, 0, auth_method, compat20 ? " ssh2" : ""); } debug3("%s: key %p is %s", @@ -1374,6 +1381,7 @@ mm_answer_rsa_keyallowed(int sock, Buffe debug3("%s entering", __func__); + auth_met...
2015 Jun 18
7
[Bug 2415] New: Public key failures are not counted and therefore not logged into syslog
...rse I want to make sure that I didn't miss something from protocol specification. But everything looks like prepared for this, except it doesn't work. diff --git a/monitor.c b/monitor.c --- a/monitor.c +++ b/monitor.c @@ -1267,6 +1267,7 @@ mm_answer_keyallowed(int sock, Buffer *m) hostbased_chost = chost; } else { /* Log failed attempt */ + authctxt->failures++; auth_log(authctxt, 0, 0, auth_method, NULL); free(blob); free(cuser); -- You are receiving this mail because: You are watching the assignee of the bug.
2003 Oct 08
4
OS/390 openssh
...g(m, &bloblen); - signature = buffer_get_string(m, &signaturelen); - data = buffer_get_string(m, &datalen); + blob = buffer_get_binary(m, &bloblen); + signature = buffer_get_binary(m, &signaturelen); + data = buffer_get_binary(m, &datalen); if (hostbased_cuser == NULL || hostbased_chost == NULL || !monitor_allowed_key(blob, bloblen)) @@ -1361,7 +1361,7 @@ key->type = KEY_RSA; /* cheat for key_to_blob */ if (key_to_blob(key, &blob, &blen) == 0) fatal("%s: key_to_blob failed", __func__); - buffer_put_string(m, blob, blen); + buffer_put_binary(m,...