summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2002-11-09 16:11:10 +0000
committerBen Lindstrom <mouring@eviladmin.org>2002-11-09 16:11:10 +0000
commitf5397c081d790a3758e1ee65eca1ab7b3632b0d0 (patch)
tree910102c3abc6a4435377a5a8716f8638f54a9d46
parent224313cdaedbcad4f3453895fa7d8de66e133f47 (diff)
- (bal) AIX does not log login attempts for unknown users (bug #432).
patch by dtucker@zip.com.au
-rw-r--r--ChangeLog4
-rw-r--r--auth.c5
2 files changed, 8 insertions, 1 deletions
diff --git a/ChangeLog b/ChangeLog
index af7ba9e79..4a49a8c27 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -39,6 +39,8 @@
39 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c 39 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
40 ntsec now default if cygwin version beginning w/ version 56. Patch 40 ntsec now default if cygwin version beginning w/ version 56. Patch
41 by Corinna Vinschen <vinschen@redhat.com> 41 by Corinna Vinschen <vinschen@redhat.com>
42 - (bal) AIX does not log login attempts for unknown users (bug #432).
43 patch by dtucker@zip.com.au
42 44
4320021021 4520021021
44 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from 46 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from
@@ -816,4 +818,4 @@
816 save auth method before monitor_reset_key_state(); bugzilla bug #284; 818 save auth method before monitor_reset_key_state(); bugzilla bug #284;
817 ok provos@ 819 ok provos@
818 820
819$Id: ChangeLog,v 1.2510 2002/11/09 15:59:27 mouring Exp $ 821$Id: ChangeLog,v 1.2511 2002/11/09 16:11:10 mouring Exp $
diff --git a/auth.c b/auth.c
index 021174f97..ee001283f 100644
--- a/auth.c
+++ b/auth.c
@@ -491,6 +491,11 @@ getpwnamallow(const char *user)
491 if (pw == NULL) { 491 if (pw == NULL) {
492 log("Illegal user %.100s from %.100s", 492 log("Illegal user %.100s from %.100s",
493 user, get_remote_ipaddr()); 493 user, get_remote_ipaddr());
494#ifdef WITH_AIXAUTHENTICATE
495 loginfailed(user,
496 get_canonical_hostname(options.verify_reverse_mapping),
497 "ssh");
498#endif
494 return (NULL); 499 return (NULL);
495 } 500 }
496 if (!allowed_user(pw)) 501 if (!allowed_user(pw))