diff options
author | Markus Friedl <markus@cvs.openbsd.org> | 2003-08-26 09:58:44 +0000 |
---|---|---|
committer | Markus Friedl <markus@cvs.openbsd.org> | 2003-08-26 09:58:44 +0000 |
commit | fda304b5a80ed890fea222257d74e366f160b8dc (patch) | |
tree | 83b44bab039b08fd6d861409dfe6fa068f9eff91 /usr.bin/ssh/auth2.c | |
parent | d583950be9e490d1bb31e20cb010348fcb444fd0 (diff) |
fix passwd auth for 'username leaks via timing'; with djm@, original patches from solar
Diffstat (limited to 'usr.bin/ssh/auth2.c')
-rw-r--r-- | usr.bin/ssh/auth2.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/usr.bin/ssh/auth2.c b/usr.bin/ssh/auth2.c index 192f4aaddb1..15da377c590 100644 --- a/usr.bin/ssh/auth2.c +++ b/usr.bin/ssh/auth2.c @@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth2.c,v 1.101 2003/08/22 13:22:27 markus Exp $"); +RCSID("$OpenBSD: auth2.c,v 1.102 2003/08/26 09:58:43 markus Exp $"); #include "ssh2.h" #include "xmalloc.h" @@ -164,6 +164,7 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt) debug2("input_userauth_request: setting up authctxt for %s", user); } else { logit("input_userauth_request: illegal user %s", user); + authctxt->pw = fakepw(); } setproctitle("%s%s", authctxt->pw ? user : "unknown", use_privsep ? " [net]" : ""); |