diff options
author | dtucker@openbsd.org <dtucker@openbsd.org> | 2016-06-15 02:40:40 +0200 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2016-06-15 04:06:33 +0200 |
commit | e690fe85750e93fca1fb7c7c8587d4130a4f7aba (patch) | |
tree | 42ae40a5cb8fa8564d1006a9b08bc0fe84ab7a0f /auth.c | |
parent | Move platform_disable_tracing into its own file. (diff) | |
download | openssh-e690fe85750e93fca1fb7c7c8587d4130a4f7aba.tar.xz openssh-e690fe85750e93fca1fb7c7c8587d4130a4f7aba.zip |
upstream commit
Remove "POSSIBLE BREAK-IN ATTEMPT!" from log message
about forward and reverse DNS not matching. We haven't supported IP-based
auth methods for a very long time so it's now misleading. part of bz#2585,
ok markus@
Upstream-ID: 5565ef0ee0599b27f0bd1d3bb1f8a323d8274e29
Diffstat (limited to 'auth.c')
-rw-r--r-- | auth.c | 7 |
1 files changed, 3 insertions, 4 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: auth.c,v 1.114 2016/03/07 19:02:43 djm Exp $ */ +/* $OpenBSD: auth.c,v 1.115 2016/06/15 00:40:40 dtucker Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -857,7 +857,7 @@ remote_hostname(struct ssh *ssh) hints.ai_socktype = SOCK_STREAM; if (getaddrinfo(name, NULL, &hints, &aitop) != 0) { logit("reverse mapping checking getaddrinfo for %.700s " - "[%s] failed - POSSIBLE BREAK-IN ATTEMPT!", name, ntop); + "[%s] failed.", name, ntop); return strdup(ntop); } /* Look for the address from the list of addresses. */ @@ -872,8 +872,7 @@ remote_hostname(struct ssh *ssh) if (ai == NULL) { /* Address not found for the host name. */ logit("Address %.100s maps to %.600s, but this does not " - "map back to the address - POSSIBLE BREAK-IN ATTEMPT!", - ntop, name); + "map back to the address.", ntop, name); return strdup(ntop); } return strdup(name); |