summaryrefslogtreecommitdiff
path: root/auth-krb5.c
diff options
context:
space:
mode:
authordtucker <dtucker>2005-11-22 08:42:42 +0000
committerdtucker <dtucker>2005-11-22 08:42:42 +0000
commit0097560e3513b0422ea8e813f376f6a38b0155e0 (patch)
treeaa59dacff3e46916f7ea066e21567b1c87ad8782 /auth-krb5.c
parent8145477b10cdc15ad4b0c7d28d5713248bf5116b (diff)
downloadopenssh-0097560e3513b0422ea8e813f376f6a38b0155e0.tar.gz
- dtucker@cvs.openbsd.org 2005/11/21 09:42:10
[auth-krb5.c] Perform Kerberos calls even for invalid users to prevent leaking information about account validity. bz #975, patch originally from Senthil Kumar, sanity checked by Simon Wilkinson, tested by djm@, biorn@, ok markus@
Diffstat (limited to 'auth-krb5.c')
-rw-r--r--auth-krb5.c7
1 files changed, 2 insertions, 5 deletions
diff --git a/auth-krb5.c b/auth-krb5.c
index a84e5401..64d61354 100644
--- a/auth-krb5.c
+++ b/auth-krb5.c
@@ -28,7 +28,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth-krb5.c,v 1.15 2003/11/21 11:57:02 djm Exp $");
+RCSID("$OpenBSD: auth-krb5.c,v 1.16 2005/11/21 09:42:10 dtucker Exp $");
#include "ssh.h"
#include "ssh1.h"
@@ -69,9 +69,6 @@ auth_krb5_password(Authctxt *authctxt, const char *password)
krb5_ccache ccache = NULL;
int len;
- if (!authctxt->valid)
- return (0);
-
temporarily_use_uid(authctxt->pw);
problem = krb5_init(authctxt);
@@ -188,7 +185,7 @@ auth_krb5_password(Authctxt *authctxt, const char *password)
else
return (0);
}
- return (1);
+ return (authctxt->valid ? 1 : 0);
}
void