summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2018-04-10 00:10:49 +0000
committerDamien Miller <djm@mindrot.org>2018-04-10 10:17:15 +1000
commit001aa55484852370488786bd40e9fdad4b465811 (patch)
tree8b98f20603dea5362f66fbfcc8c400e29c7492bb /sshd.c
parent260ede2787fe80b18b8d5920455b4fb268519c7d (diff)
upstream: lots of typos in comments/docs. Patch from Karsten Weiss
after checking with codespell tool (https://github.com/lucasdemarchi/codespell) OpenBSD-Commit-ID: 373222f12d7ab606598a2d36840c60be93568528
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/sshd.c b/sshd.c
index fd95b681b..f0ba35074 100644
--- a/sshd.c
+++ b/sshd.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: sshd.c,v 1.506 2018/03/03 03:15:51 djm Exp $ */ 1/* $OpenBSD: sshd.c,v 1.507 2018/04/10 00:10:49 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -1336,7 +1336,7 @@ server_accept_loop(int *sock_in, int *sock_out, int *newsock, int *config_s)
1336 * return an error if any are found). Basically we are worried about 1336 * return an error if any are found). Basically we are worried about
1337 * source routing; it can be used to pretend you are somebody 1337 * source routing; it can be used to pretend you are somebody
1338 * (ip-address) you are not. That itself may be "almost acceptable" 1338 * (ip-address) you are not. That itself may be "almost acceptable"
1339 * under certain circumstances, but rhosts autentication is useless 1339 * under certain circumstances, but rhosts authentication is useless
1340 * if source routing is accepted. Notice also that if we just dropped 1340 * if source routing is accepted. Notice also that if we just dropped
1341 * source routing here, the other side could use IP spoofing to do 1341 * source routing here, the other side could use IP spoofing to do
1342 * rest of the interaction and could still bypass security. So we 1342 * rest of the interaction and could still bypass security. So we