Module Name: src Committed By: christos Date: Wed Mar 26 00:08:20 UTC 2025
Modified Files: src/crypto/external/bsd/openssh/dist: auth-pam.c monitor.c Log Message: PR/59214: jlduran: When a failed PAM authentication attempt is received, blocklistd should count it towards the total allowed number of failures. Also there is a probe under monitor.c that often gets logged along with other offenses, effectively counting as two (+2) failures towards the maximum allowed. To generate a diff of this commit: cvs rdiff -u -r1.23 -r1.24 src/crypto/external/bsd/openssh/dist/auth-pam.c cvs rdiff -u -r1.47 -r1.48 src/crypto/external/bsd/openssh/dist/monitor.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/crypto/external/bsd/openssh/dist/auth-pam.c diff -u src/crypto/external/bsd/openssh/dist/auth-pam.c:1.23 src/crypto/external/bsd/openssh/dist/auth-pam.c:1.24 --- src/crypto/external/bsd/openssh/dist/auth-pam.c:1.23 Thu Jul 11 13:26:53 2024 +++ src/crypto/external/bsd/openssh/dist/auth-pam.c Tue Mar 25 20:08:19 2025 @@ -1,4 +1,4 @@ -/* $NetBSD: auth-pam.c,v 1.23 2024/07/11 17:26:53 riastradh Exp $ */ +/* $NetBSD: auth-pam.c,v 1.24 2025/03/26 00:08:19 christos Exp $ */ /*- * Copyright (c) 2002 Networks Associates Technology, Inc. @@ -53,7 +53,7 @@ /* * NetBSD local changes */ -__RCSID("$NetBSD: auth-pam.c,v 1.23 2024/07/11 17:26:53 riastradh Exp $"); +__RCSID("$NetBSD: auth-pam.c,v 1.24 2025/03/26 00:08:19 christos Exp $"); #define _LIB_PTHREAD_H #undef USE_POSIX_THREADS /* Not yet */ #define HAVE_SECURITY_PAM_APPL_H @@ -958,6 +958,7 @@ sshpam_query(void *ctx, char **name, cha sshbuf_free(buffer); return (0); } + pfilter_notify(1); error("PAM: %s for %s%.100s from %.100s", msg, sshpam_authctxt->valid ? "" : "illegal user ", sshpam_authctxt->user, sshpam_rhost); Index: src/crypto/external/bsd/openssh/dist/monitor.c diff -u src/crypto/external/bsd/openssh/dist/monitor.c:1.47 src/crypto/external/bsd/openssh/dist/monitor.c:1.48 --- src/crypto/external/bsd/openssh/dist/monitor.c:1.47 Fri Mar 21 10:04:33 2025 +++ src/crypto/external/bsd/openssh/dist/monitor.c Tue Mar 25 20:08:20 2025 @@ -1,4 +1,4 @@ -/* $NetBSD: monitor.c,v 1.47 2025/03/21 14:04:33 christos Exp $ */ +/* $NetBSD: monitor.c,v 1.48 2025/03/26 00:08:20 christos Exp $ */ /* $OpenBSD: monitor.c,v 1.244 2024/09/15 01:09:40 djm Exp $ */ /* @@ -28,7 +28,7 @@ */ #include "includes.h" -__RCSID("$NetBSD: monitor.c,v 1.47 2025/03/21 14:04:33 christos Exp $"); +__RCSID("$NetBSD: monitor.c,v 1.48 2025/03/26 00:08:20 christos Exp $"); #include <sys/types.h> #include <sys/wait.h> #include <sys/socket.h> @@ -1273,7 +1273,6 @@ mm_answer_keyallowed(struct ssh *ssh, in } else { /* Log failed attempt */ auth_log(ssh, 0, 0, auth_method, NULL); - pfilter_notify(1); free(cuser); free(chost); }