version 1.49, 2003/07/22 13:35:22 |
version 1.50, 2003/08/13 08:46:30 |
|
|
break; |
break; |
#endif |
#endif |
|
|
case SSH_CMSG_AUTH_RHOSTS: |
|
if (!options.rhosts_authentication) { |
|
verbose("Rhosts authentication disabled."); |
|
break; |
|
} |
|
/* |
|
* Get client user name. Note that we just have to |
|
* trust the client; this is one reason why rhosts |
|
* authentication is insecure. (Another is |
|
* IP-spoofing on a local network.) |
|
*/ |
|
client_user = packet_get_string(&ulen); |
|
packet_check_eom(); |
|
|
|
/* Try to authenticate using /etc/hosts.equiv and .rhosts. */ |
|
authenticated = auth_rhosts(pw, client_user); |
|
|
|
snprintf(info, sizeof info, " ruser %.100s", client_user); |
|
xfree(client_user); |
|
break; |
|
|
|
case SSH_CMSG_AUTH_RHOSTS_RSA: |
case SSH_CMSG_AUTH_RHOSTS_RSA: |
if (!options.rhosts_rsa_authentication) { |
if (!options.rhosts_rsa_authentication) { |
verbose("Rhosts with RSA authentication disabled."); |
verbose("Rhosts with RSA authentication disabled."); |