712ccf3395
- Update of the underlying OpenSSH to 6.4p1 - Update to 6.4p1 Features since 6.2p2: * ssh-agent(1) support in sshd(8); allows encrypted hostkeys, or hostkeys on smartcards. * ssh(1)/sshd(8): allow optional time-based rekeying via a second argument to the existing RekeyLimit option. RekeyLimit is now supported in sshd_config as well as on the client. * sshd(8): standardise logging of information during user authentication. * The presented key/cert and the remote username (if available) is now logged in the authentication success/failure message on the same log line as the local username, remote host/port and protocol in use. Certificates contents and the key fingerprint of the signing CA are logged too. * ssh(1) ability to query what cryptographic algorithms are supported in the binary. * ssh(1): ProxyCommand=- for cases where stdin and stdout already point to the proxy. * ssh(1): allow IdentityFile=none * ssh(1)/sshd(8): -E option to append debugging logs to a specified file instead of stderr or syslog. * sftp(1): support resuming partial downloads with the "reget" command and on the sftp commandline or on the "get" commandline with the "-a" (append) option. * ssh(1): "IgnoreUnknown" configuration option to selectively suppress errors arising from unknown configuration directives. * sshd(8): support for submethods to be appended to required authentication methods listed via AuthenticationMethods. OBS-URL: https://build.opensuse.org/request/show/220466 OBS-URL: https://build.opensuse.org/package/show/network/openssh?expand=0&rev=58
48 lines
1.8 KiB
Diff
48 lines
1.8 KiB
Diff
# bnc#752354, bnc#757360
|
|
# prevent timeouts in libaudit code caused by DNS misconfiguration by
|
|
# explicitely disabling DNS lookups in libaudit when UseDNS is false.
|
|
# Note that this particular solution causes the logs to always contain
|
|
# "hostname=?, addr=?" when DNS lookups are disabled.
|
|
|
|
diff --git a/openssh-6.4p1/audit-linux.c b/openssh-6.4p1/audit-linux.c
|
|
--- a/openssh-6.4p1/audit-linux.c
|
|
+++ b/openssh-6.4p1/audit-linux.c
|
|
@@ -62,17 +62,17 @@ linux_audit_user_logxxx(int uid, const c
|
|
if (errno == EINVAL || errno == EPROTONOSUPPORT ||
|
|
errno == EAFNOSUPPORT)
|
|
return; /* No audit support in kernel */
|
|
else
|
|
goto fatal_report; /* Must prevent login */
|
|
}
|
|
rc = audit_log_acct_message(audit_fd, event,
|
|
NULL, "login", username ? username : "(unknown)",
|
|
- username == NULL ? uid : -1, hostname, ip, ttyn, success);
|
|
+ username == NULL ? uid : -1, options.use_dns ? hostname : NULL, ip, ttyn, success);
|
|
saved_errno = errno;
|
|
close(audit_fd);
|
|
/*
|
|
* Do not report error if the error is EPERM and sshd is run as non
|
|
* root user.
|
|
*/
|
|
if ((rc == -EPERM) && (geteuid() != 0))
|
|
rc = 0;
|
|
@@ -114,17 +114,17 @@ linux_audit_user_auth(int uid, const cha
|
|
goto fatal_report; /* Must prevent login */
|
|
}
|
|
|
|
if ((event < 0) || (event > SSH_AUDIT_UNKNOWN))
|
|
event = SSH_AUDIT_UNKNOWN;
|
|
|
|
rc = audit_log_acct_message(audit_fd, AUDIT_USER_AUTH,
|
|
NULL, event_name[event], username ? username : "(unknown)",
|
|
- username == NULL ? uid : -1, hostname, ip, ttyn, success);
|
|
+ username == NULL ? uid : -1, options.use_dns ? hostname : NULL, ip, ttyn, success);
|
|
saved_errno = errno;
|
|
close(audit_fd);
|
|
/*
|
|
* Do not report error if the error is EPERM and sshd is run as non
|
|
* root user.
|
|
*/
|
|
if ((rc == -EPERM) && (geteuid() != 0))
|
|
rc = 0;
|