View | Details | Raw Unified | Return to bug 2245 | Differences between
and this patch

Collapse All | Expand All

(-)a/auth.c (-3 lines)
Lines 642-650 getpwnamallow(const char *user) Link Here
642
               record_failed_login(user,
642
               record_failed_login(user,
643
                   get_canonical_hostname(options.use_dns), "ssh");
643
                   get_canonical_hostname(options.use_dns), "ssh");
644
#endif
644
#endif
645
#ifdef SSH_AUDIT_EVENTS
646
               audit_event(SSH_INVALID_USER);
647
#endif /* SSH_AUDIT_EVENTS */
648
               return (NULL);
645
               return (NULL);
649
       }
646
       }
650
       if (!allowed_user(pw))
647
       if (!allowed_user(pw))
(-)a/auth2.c (-3 lines)
Lines 240-248 input_userauth_request(int type, u_int32_t seq, void *ctxt) Link Here
240
               } else {
240
               } else {
241
                       logit("input_userauth_request: invalid user %s", user);
241
                       logit("input_userauth_request: invalid user %s", user);
242
                       authctxt->pw = fakepw();
242
                       authctxt->pw = fakepw();
243
#ifdef SSH_AUDIT_EVENTS
244
                       PRIVSEP(audit_event(SSH_INVALID_USER));
245
#endif
246
               }
243
               }
247
#ifdef USE_PAM
244
#ifdef USE_PAM
248
               if (options.use_pam)
245
               if (options.use_pam)

Return to bug 2245