Module Name: src Committed By: rin Date: Wed Oct 9 01:49:20 UTC 2024
Modified Files: src/crypto/external/bsd/openssh/dist: auth.c auth2.c Log Message: sshd: Finally fix spurious blocklistd activation (PR bin/58369) Drop one more pfilter_notify() call from userauth_finish(), for single failure in authentication attempt. This happens for users with multiple public keys; e.g., both rsa and ed25519 keys are registered into ssh-agent(1), while only the latter is in remote authorized_keys. Instead, it is called from auth_maxtries_exceeded(), when authentication process is actually failed. This function is called also from input_userauth_request(). But I guess this cannot happen frequently; this path is taken with >= 1024 failed attempts, although MaxAuthTries is 6 by default... To generate a diff of this commit: cvs rdiff -u -r1.36 -r1.37 src/crypto/external/bsd/openssh/dist/auth.c cvs rdiff -u -r1.31 -r1.32 src/crypto/external/bsd/openssh/dist/auth2.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/crypto/external/bsd/openssh/dist/auth.c diff -u src/crypto/external/bsd/openssh/dist/auth.c:1.36 src/crypto/external/bsd/openssh/dist/auth.c:1.37 --- src/crypto/external/bsd/openssh/dist/auth.c:1.36 Tue Sep 24 21:32:18 2024 +++ src/crypto/external/bsd/openssh/dist/auth.c Wed Oct 9 01:49:20 2024 @@ -1,4 +1,4 @@ -/* $NetBSD: auth.c,v 1.36 2024/09/24 21:32:18 christos Exp $ */ +/* $NetBSD: auth.c,v 1.37 2024/10/09 01:49:20 rin Exp $ */ /* $OpenBSD: auth.c,v 1.162 2024/09/15 01:18:26 djm Exp $ */ /* @@ -26,7 +26,7 @@ */ #include "includes.h" -__RCSID("$NetBSD: auth.c,v 1.36 2024/09/24 21:32:18 christos Exp $"); +__RCSID("$NetBSD: auth.c,v 1.37 2024/10/09 01:49:20 rin Exp $"); #include <sys/types.h> #include <sys/stat.h> #include <sys/socket.h> @@ -415,6 +415,7 @@ auth_maxtries_exceeded(struct ssh *ssh) { Authctxt *authctxt = (Authctxt *)ssh->authctxt; + pfilter_notify(1); error("maximum authentication attempts exceeded for " "%s%.100s from %.200s port %d ssh2", authctxt->valid ? "" : "invalid user ", Index: src/crypto/external/bsd/openssh/dist/auth2.c diff -u src/crypto/external/bsd/openssh/dist/auth2.c:1.31 src/crypto/external/bsd/openssh/dist/auth2.c:1.32 --- src/crypto/external/bsd/openssh/dist/auth2.c:1.31 Mon Jul 8 22:33:43 2024 +++ src/crypto/external/bsd/openssh/dist/auth2.c Wed Oct 9 01:49:20 2024 @@ -1,4 +1,4 @@ -/* $NetBSD: auth2.c,v 1.31 2024/07/08 22:33:43 christos Exp $ */ +/* $NetBSD: auth2.c,v 1.32 2024/10/09 01:49:20 rin Exp $ */ /* $OpenBSD: auth2.c,v 1.169 2024/05/17 00:30:23 djm Exp $ */ /* @@ -26,7 +26,7 @@ */ #include "includes.h" -__RCSID("$NetBSD: auth2.c,v 1.31 2024/07/08 22:33:43 christos Exp $"); +__RCSID("$NetBSD: auth2.c,v 1.32 2024/10/09 01:49:20 rin Exp $"); #include <sys/types.h> #include <sys/stat.h> @@ -460,10 +460,8 @@ userauth_finish(struct ssh *ssh, int aut } else { /* Allow initial try of "none" auth without failure penalty */ if (!partial && !authctxt->server_caused_failure && - (authctxt->attempt > 1 || strcmp(method, "none") != 0)) { + (authctxt->attempt > 1 || strcmp(method, "none") != 0)) authctxt->failures++; - pfilter_notify(1); - } if (authctxt->failures >= options.max_authtries) auth_maxtries_exceeded(ssh); methods = authmethods_get(authctxt);