summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@cvs.openbsd.org>2016-06-15 00:40:41 +0000
committerDarren Tucker <dtucker@cvs.openbsd.org>2016-06-15 00:40:41 +0000
commitab503771e3bca3f4915c7ca4ed78a51dd0868d8e (patch)
tree8a57876a363f6948e011840f646a3bd0a25afde0 /usr.bin/ssh
parent642dce1fbc17a55528b832b546ae17d6bd0164de (diff)
Remove "POSSIBLE BREAK-IN ATTEMPT!" from log message about forward and
reverse DNS not matching. We haven't supported IP-based auth methods for a very long time so it's now misleading. part of bz#2585, ok markus@
Diffstat (limited to 'usr.bin/ssh')
-rw-r--r--usr.bin/ssh/auth.c7
1 files changed, 3 insertions, 4 deletions
diff --git a/usr.bin/ssh/auth.c b/usr.bin/ssh/auth.c
index cc9e723588f..9c7e9edb908 100644
--- a/usr.bin/ssh/auth.c
+++ b/usr.bin/ssh/auth.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: auth.c,v 1.114 2016/03/07 19:02:43 djm Exp $ */
+/* $OpenBSD: auth.c,v 1.115 2016/06/15 00:40:40 dtucker Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -721,7 +721,7 @@ remote_hostname(struct ssh *ssh)
hints.ai_socktype = SOCK_STREAM;
if (getaddrinfo(name, NULL, &hints, &aitop) != 0) {
logit("reverse mapping checking getaddrinfo for %.700s "
- "[%s] failed - POSSIBLE BREAK-IN ATTEMPT!", name, ntop);
+ "[%s] failed.", name, ntop);
return strdup(ntop);
}
/* Look for the address from the list of addresses. */
@@ -736,8 +736,7 @@ remote_hostname(struct ssh *ssh)
if (ai == NULL) {
/* Address not found for the host name. */
logit("Address %.100s maps to %.600s, but this does not "
- "map back to the address - POSSIBLE BREAK-IN ATTEMPT!",
- ntop, name);
+ "map back to the address.", ntop, name);
return strdup(ntop);
}
return strdup(name);