diff options
author | djm <djm> | 2010-06-25 23:39:25 +0000 |
---|---|---|
committer | djm <djm> | 2010-06-25 23:39:25 +0000 |
commit | 5e27a8cfb8c0de14ac7e48f71da4b9b7c3cf3996 (patch) | |
tree | 6870dcc119a2e0a86c57408993650eef2a51e4ab /auth.c | |
parent | 69e7393b0978c232cdd8afafad7f577e6b0e034b (diff) | |
download | openssh-5e27a8cfb8c0de14ac7e48f71da4b9b7c3cf3996.tar.gz |
- djm@cvs.openbsd.org 2010/06/22 04:49:47
[auth.c]
queue auth debug messages for bad ownership or permissions on the user's
keyfiles. These messages will be sent after the user has successfully
authenticated (where our client will display them with LogLevel=debug).
Diffstat (limited to 'auth.c')
-rw-r--r-- | auth.c | 5 |
1 files changed, 4 insertions, 1 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: auth.c,v 1.87 2010/05/07 11:30:29 djm Exp $ */ +/* $OpenBSD: auth.c,v 1.88 2010/06/22 04:49:47 djm Exp $ */ /* * Copyright (c) 2000 Markus Friedl. All rights reserved. * @@ -397,6 +397,8 @@ check_key_in_hostfiles(struct passwd *pw, Key *key, const char *host, logit("Authentication refused for %.100s: " "bad owner or modes for %.200s", pw->pw_name, user_hostfile); + auth_debug_add("Ignored %.200s: bad ownership or modes", + user_hostfile); } else { temporarily_use_uid(pw); host_status = check_host_in_hostfile(user_hostfile, @@ -520,6 +522,7 @@ auth_openfile(const char *file, struct passwd *pw, int strict_modes, secure_filename(f, file, pw, line, sizeof(line)) != 0) { fclose(f); logit("Authentication refused: %s", line); + auth_debug_add("Ignored %s: %s", file_type, line); return NULL; } |