summaryrefslogtreecommitdiffstats
path: root/auth.c
diff options
context:
space:
mode:
authordtucker@openbsd.org <dtucker@openbsd.org>2016-06-15 02:40:40 +0200
committerDarren Tucker <dtucker@zip.com.au>2016-06-15 04:06:33 +0200
commite690fe85750e93fca1fb7c7c8587d4130a4f7aba (patch)
tree42ae40a5cb8fa8564d1006a9b08bc0fe84ab7a0f /auth.c
parentMove platform_disable_tracing into its own file. (diff)
downloadopenssh-e690fe85750e93fca1fb7c7c8587d4130a4f7aba.tar.xz
openssh-e690fe85750e93fca1fb7c7c8587d4130a4f7aba.zip
upstream commit
Remove "POSSIBLE BREAK-IN ATTEMPT!" from log message about forward and reverse DNS not matching. We haven't supported IP-based auth methods for a very long time so it's now misleading. part of bz#2585, ok markus@ Upstream-ID: 5565ef0ee0599b27f0bd1d3bb1f8a323d8274e29
Diffstat (limited to 'auth.c')
-rw-r--r--auth.c7
1 files changed, 3 insertions, 4 deletions
diff --git a/auth.c b/auth.c
index 55629b320..24527dd7c 100644
--- a/auth.c
+++ b/auth.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: auth.c,v 1.114 2016/03/07 19:02:43 djm Exp $ */
+/* $OpenBSD: auth.c,v 1.115 2016/06/15 00:40:40 dtucker Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -857,7 +857,7 @@ remote_hostname(struct ssh *ssh)
hints.ai_socktype = SOCK_STREAM;
if (getaddrinfo(name, NULL, &hints, &aitop) != 0) {
logit("reverse mapping checking getaddrinfo for %.700s "
- "[%s] failed - POSSIBLE BREAK-IN ATTEMPT!", name, ntop);
+ "[%s] failed.", name, ntop);
return strdup(ntop);
}
/* Look for the address from the list of addresses. */
@@ -872,8 +872,7 @@ remote_hostname(struct ssh *ssh)
if (ai == NULL) {
/* Address not found for the host name. */
logit("Address %.100s maps to %.600s, but this does not "
- "map back to the address - POSSIBLE BREAK-IN ATTEMPT!",
- ntop, name);
+ "map back to the address.", ntop, name);
return strdup(ntop);
}
return strdup(name);