=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/auth.c,v retrieving revision 1.41.2.3 retrieving revision 1.41.2.4 diff -u -r1.41.2.3 -r1.41.2.4 --- src/usr.bin/ssh/auth.c 2002/06/26 15:30:37 1.41.2.3 +++ src/usr.bin/ssh/auth.c 2002/10/11 14:51:51 1.41.2.4 @@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth.c,v 1.41.2.3 2002/06/26 15:30:37 jason Exp $"); +RCSID("$OpenBSD: auth.c,v 1.41.2.4 2002/10/11 14:51:51 miod Exp $"); #include @@ -323,7 +323,7 @@ /* * Check a given file for security. This is defined as all components - * of the path to the file must either be owned by either the owner of + * of the path to the file must be owned by either the owner of * of the file or root and no directories must be group or world writable. * * XXX Should any specific check be done for sym links ? @@ -407,7 +407,12 @@ struct passwd *pw; pw = getpwnam(user); - if (pw == NULL || !allowed_user(pw)) + if (pw == NULL) { + log("Illegal user %.100s from %.100s", + user, get_remote_ipaddr()); + return (NULL); + } + if (!allowed_user(pw)) return (NULL); #ifdef HAVE_LOGIN_CAP if ((lc = login_getclass(pw->pw_class)) == NULL) {