summaryrefslogtreecommitdiff
path: root/monitor_wrap.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2010-03-07 23:05:17 +1100
committerDarren Tucker <dtucker@zip.com.au>2010-03-07 23:05:17 +1100
commitcd70e1b8137023539df57b175b733341d8f4d776 (patch)
tree03efa18fa906f725b07eee451fe96ec9117a3138 /monitor_wrap.c
parentac0c4c9c1d511839b2c86ebe5994298b524ceffd (diff)
- dtucker@cvs.openbsd.org 2010/03/07 11:57:13
[auth-rhosts.c monitor.c monitor_wrap.c session.c auth-options.c sshd.c] Hold authentication debug messages until after successful authentication. Fixes an info leak of environment variables specified in authorized_keys, reported by Jacob Appelbaum. ok djm@
Diffstat (limited to 'monitor_wrap.c')
-rw-r--r--monitor_wrap.c19
1 files changed, 1 insertions, 18 deletions
diff --git a/monitor_wrap.c b/monitor_wrap.c
index b8e8710f7..faeb02cfa 100644
--- a/monitor_wrap.c
+++ b/monitor_wrap.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: monitor_wrap.c,v 1.68 2009/06/22 05:39:28 dtucker Exp $ */ 1/* $OpenBSD: monitor_wrap.c,v 1.69 2010/03/07 11:57:13 dtucker Exp $ */
2/* 2/*
3 * Copyright 2002 Niels Provos <provos@citi.umich.edu> 3 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
4 * Copyright 2002 Markus Friedl <markus@openbsd.org> 4 * Copyright 2002 Markus Friedl <markus@openbsd.org>
@@ -347,19 +347,6 @@ mm_auth_rhosts_rsa_key_allowed(struct passwd *pw, char *user,
347 return (ret); 347 return (ret);
348} 348}
349 349
350static void
351mm_send_debug(Buffer *m)
352{
353 char *msg;
354
355 while (buffer_len(m)) {
356 msg = buffer_get_string(m, NULL);
357 debug3("%s: Sending debug: %s", __func__, msg);
358 packet_send_debug("%s", msg);
359 xfree(msg);
360 }
361}
362
363int 350int
364mm_key_allowed(enum mm_keytype type, char *user, char *host, Key *key) 351mm_key_allowed(enum mm_keytype type, char *user, char *host, Key *key)
365{ 352{
@@ -393,9 +380,6 @@ mm_key_allowed(enum mm_keytype type, char *user, char *host, Key *key)
393 have_forced = buffer_get_int(&m); 380 have_forced = buffer_get_int(&m);
394 forced_command = have_forced ? xstrdup("true") : NULL; 381 forced_command = have_forced ? xstrdup("true") : NULL;
395 382
396 /* Send potential debug messages */
397 mm_send_debug(&m);
398
399 buffer_free(&m); 383 buffer_free(&m);
400 384
401 return (allowed); 385 return (allowed);
@@ -1085,7 +1069,6 @@ mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey)
1085 *rkey = key; 1069 *rkey = key;
1086 xfree(blob); 1070 xfree(blob);
1087 } 1071 }
1088 mm_send_debug(&m);
1089 buffer_free(&m); 1072 buffer_free(&m);
1090 1073
1091 return (allowed); 1074 return (allowed);