mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-07-31 01:35:11 +02:00
- (djm) OpenBSD CVS Sync
- stevesk@cvs.openbsd.org 2005/12/28 22:46:06 [canohost.c channels.c clientloop.c] use 'break-in' for consistency; ok deraadt@ ok and input jmc@
This commit is contained in:
parent
8db70e2398
commit
5eb137c6d1
@ -1,3 +1,9 @@
|
|||||||
|
20051229
|
||||||
|
- (djm) OpenBSD CVS Sync
|
||||||
|
- stevesk@cvs.openbsd.org 2005/12/28 22:46:06
|
||||||
|
[canohost.c channels.c clientloop.c]
|
||||||
|
use 'break-in' for consistency; ok deraadt@ ok and input jmc@
|
||||||
|
|
||||||
20051229
|
20051229
|
||||||
- (tim) [buildpkg.sh.in] grep for $SSHDUID instead of $SSHDGID on /etc/passwd
|
- (tim) [buildpkg.sh.in] grep for $SSHDUID instead of $SSHDGID on /etc/passwd
|
||||||
|
|
||||||
@ -3552,4 +3558,4 @@
|
|||||||
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
- (djm) Trim deprecated options from INSTALL. Mention UsePAM
|
||||||
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
- (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.4052 2005/12/28 22:28:08 tim Exp $
|
$Id: ChangeLog,v 1.4053 2005/12/31 05:19:53 djm Exp $
|
||||||
|
@ -12,7 +12,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: canohost.c,v 1.47 2005/11/03 13:38:29 dtucker Exp $");
|
RCSID("$OpenBSD: canohost.c,v 1.48 2005/12/28 22:46:06 stevesk Exp $");
|
||||||
|
|
||||||
#include "packet.h"
|
#include "packet.h"
|
||||||
#include "xmalloc.h"
|
#include "xmalloc.h"
|
||||||
@ -102,7 +102,7 @@ get_remote_hostname(int sock, int use_dns)
|
|||||||
hints.ai_socktype = SOCK_STREAM;
|
hints.ai_socktype = SOCK_STREAM;
|
||||||
if (getaddrinfo(name, NULL, &hints, &aitop) != 0) {
|
if (getaddrinfo(name, NULL, &hints, &aitop) != 0) {
|
||||||
logit("reverse mapping checking getaddrinfo for %.700s "
|
logit("reverse mapping checking getaddrinfo for %.700s "
|
||||||
"failed - POSSIBLE BREAKIN ATTEMPT!", name);
|
"failed - POSSIBLE BREAK-IN ATTEMPT!", name);
|
||||||
return xstrdup(ntop);
|
return xstrdup(ntop);
|
||||||
}
|
}
|
||||||
/* Look for the address from the list of addresses. */
|
/* Look for the address from the list of addresses. */
|
||||||
@ -117,7 +117,7 @@ get_remote_hostname(int sock, int use_dns)
|
|||||||
if (!ai) {
|
if (!ai) {
|
||||||
/* Address not found for the host name. */
|
/* Address not found for the host name. */
|
||||||
logit("Address %.100s maps to %.600s, but this does not "
|
logit("Address %.100s maps to %.600s, but this does not "
|
||||||
"map back to the address - POSSIBLE BREAKIN ATTEMPT!",
|
"map back to the address - POSSIBLE BREAK-IN ATTEMPT!",
|
||||||
ntop, name);
|
ntop, name);
|
||||||
return xstrdup(ntop);
|
return xstrdup(ntop);
|
||||||
}
|
}
|
||||||
|
@ -39,7 +39,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: channels.c,v 1.229 2005/12/12 13:46:18 markus Exp $");
|
RCSID("$OpenBSD: channels.c,v 1.230 2005/12/28 22:46:06 stevesk Exp $");
|
||||||
|
|
||||||
#include "ssh.h"
|
#include "ssh.h"
|
||||||
#include "ssh1.h"
|
#include "ssh1.h"
|
||||||
@ -3025,7 +3025,7 @@ deny_input_open(int type, u_int32_t seq, void *ctxt)
|
|||||||
error("deny_input_open: type %d", type);
|
error("deny_input_open: type %d", type);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
error("Warning: this is probably a break in attempt by a malicious server.");
|
error("Warning: this is probably a break-in attempt by a malicious server.");
|
||||||
packet_start(SSH_MSG_CHANNEL_OPEN_FAILURE);
|
packet_start(SSH_MSG_CHANNEL_OPEN_FAILURE);
|
||||||
packet_put_int(rchan);
|
packet_put_int(rchan);
|
||||||
packet_send();
|
packet_send();
|
||||||
|
@ -59,7 +59,7 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: clientloop.c,v 1.147 2005/12/07 03:52:22 djm Exp $");
|
RCSID("$OpenBSD: clientloop.c,v 1.148 2005/12/28 22:46:06 stevesk Exp $");
|
||||||
|
|
||||||
#include "ssh.h"
|
#include "ssh.h"
|
||||||
#include "ssh1.h"
|
#include "ssh1.h"
|
||||||
@ -1688,7 +1688,7 @@ client_request_x11(const char *request_type, int rchan)
|
|||||||
|
|
||||||
if (!options.forward_x11) {
|
if (!options.forward_x11) {
|
||||||
error("Warning: ssh server tried X11 forwarding.");
|
error("Warning: ssh server tried X11 forwarding.");
|
||||||
error("Warning: this is probably a break in attempt by a malicious server.");
|
error("Warning: this is probably a break-in attempt by a malicious server.");
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
originator = packet_get_string(NULL);
|
originator = packet_get_string(NULL);
|
||||||
@ -1721,7 +1721,7 @@ client_request_agent(const char *request_type, int rchan)
|
|||||||
|
|
||||||
if (!options.forward_agent) {
|
if (!options.forward_agent) {
|
||||||
error("Warning: ssh server tried agent forwarding.");
|
error("Warning: ssh server tried agent forwarding.");
|
||||||
error("Warning: this is probably a break in attempt by a malicious server.");
|
error("Warning: this is probably a break-in attempt by a malicious server.");
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
sock = ssh_get_authentication_socket();
|
sock = ssh_get_authentication_socket();
|
||||||
|
Loading…
x
Reference in New Issue
Block a user