diff options
author | djm <djm> | 2003-09-02 21:32:45 +0000 |
---|---|---|
committer | djm <djm> | 2003-09-02 21:32:45 +0000 |
commit | 1b389e189dc52528148c06137f048a405e0e2e7a (patch) | |
tree | b9f1f03cb62c29a315f3644af00463ff7f7d275f /auth2.c | |
parent | 1674ef27ab36ae681e21871d48c5f530777b4a90 (diff) | |
download | openssh-1b389e189dc52528148c06137f048a405e0e2e7a.tar.gz |
- markus@cvs.openbsd.org 2003/08/26 09:58:43
[auth-passwd.c auth.c auth.h auth1.c auth2-none.c auth2-passwd.c]
[auth2.c monitor.c]
fix passwd auth for 'username leaks via timing'; with djm@, original
patches from solar
Diffstat (limited to 'auth2.c')
-rw-r--r-- | auth2.c | 3 |
1 files changed, 2 insertions, 1 deletions
@@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth2.c,v 1.101 2003/08/22 13:22:27 markus Exp $"); +RCSID("$OpenBSD: auth2.c,v 1.102 2003/08/26 09:58:43 markus Exp $"); #include "ssh2.h" #include "xmalloc.h" @@ -168,6 +168,7 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt) #endif } else { logit("input_userauth_request: illegal user %s", user); + authctxt->pw = fakepw(); #ifdef USE_PAM if (options.use_pam) PRIVSEP(start_pam(user)); |