upstream: Remove comment referencing now-removed
RhostsRSAAuthentication. ok djm@ OpenBSD-Commit-ID: 3d864bfbd99a1d4429a58e301688f3be464827a9
This commit is contained in:
parent
b67eb12f01
commit
b75624f873
6
auth.c
6
auth.c
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: auth.c,v 1.152 2021/04/03 06:18:40 djm Exp $ */
|
/* $OpenBSD: auth.c,v 1.153 2021/07/05 00:50:25 dtucker Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
* Copyright (c) 2000 Markus Friedl. All rights reserved.
|
||||||
*
|
*
|
||||||
|
@ -734,9 +734,7 @@ fakepw(void)
|
||||||
* be freed. NB. this will usually trigger a DNS query the first time it is
|
* be freed. NB. this will usually trigger a DNS query the first time it is
|
||||||
* called.
|
* called.
|
||||||
* This function does additional checks on the hostname to mitigate some
|
* This function does additional checks on the hostname to mitigate some
|
||||||
* attacks on legacy rhosts-style authentication.
|
* attacks on based on conflation of hostnames and IP addresses.
|
||||||
* XXX is RhostsRSAAuthentication vulnerable to these?
|
|
||||||
* XXX Can we remove these checks? (or if not, remove RhostsRSAAuthentication?)
|
|
||||||
*/
|
*/
|
||||||
|
|
||||||
static char *
|
static char *
|
||||||
|
|
Loading…
Reference in New Issue