forked from rpms/openssh
18 lines
507 B
Diff
18 lines
507 B
Diff
|
Don't audit SSH_INVALID_USER twice.
|
||
|
|
||
|
PRIVSEP(getpwnamallow()) a few lines above already did this.
|
||
|
|
||
|
diff -ur openssh/auth2.c openssh-5.8p1/auth2.c
|
||
|
--- openssh/auth2.c 2011-03-02 02:32:52.383773622 +0100
|
||
|
+++ openssh-5.8p1/auth2.c 2011-03-02 03:32:34.585110911 +0100
|
||
|
@@ -250,9 +250,6 @@
|
||
|
} else {
|
||
|
logit("input_userauth_request: invalid user %s", user);
|
||
|
authctxt->pw = fakepw();
|
||
|
-#ifdef SSH_AUDIT_EVENTS
|
||
|
- PRIVSEP(audit_event(SSH_INVALID_USER));
|
||
|
-#endif
|
||
|
}
|
||
|
#ifdef USE_PAM
|
||
|
if (options.use_pam)
|