summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog5
-rw-r--r--modules/pam_unix/support.c4
-rw-r--r--modules/pam_unix/unix_chkpwd.c2
3 files changed, 8 insertions, 3 deletions
diff --git a/ChangeLog b/ChangeLog
index 5c02eb4b..41094ad1 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -5,6 +5,11 @@
2007-08-30 Steve Langasek <vorlon@debian.org>
+ * modules/pam_unix/support.c, modules/pam_unix/unix_chkpwd.c:
+ A wrong username doesn't need to be logged at LOG_ALERT;
+ LOG_WARNING should be sufficient.
+ Patch from Sam Hartman <hartmans@debian.org>.
+
* modules/pam_cracklib/pam_cracklib.c:
s/CRACKLIB_DICT/CRACKLIB_DICTS/, for consistency with existing
#define in pam_unix
diff --git a/modules/pam_unix/support.c b/modules/pam_unix/support.c
index fc95f2c0..1472b966 100644
--- a/modules/pam_unix/support.c
+++ b/modules/pam_unix/support.c
@@ -665,12 +665,12 @@ int _unix_verify_password(pam_handle_t * pamh, const char *name
if (on(UNIX_AUDIT, ctrl)) {
/* this might be a typo and the user has given a password
instead of a username. Careful with this. */
- pam_syslog(pamh, LOG_ALERT,
+ pam_syslog(pamh, LOG_WARNING,
"check pass; user (%s) unknown", name);
} else {
name = NULL;
if (on(UNIX_DEBUG, ctrl) || pwd == NULL) {
- pam_syslog(pamh, LOG_ALERT,
+ pam_syslog(pamh, LOG_WARNING,
"check pass; user unknown");
} else {
/* don't log failure as another pam module can succeed */
diff --git a/modules/pam_unix/unix_chkpwd.c b/modules/pam_unix/unix_chkpwd.c
index 236ad5c2..486a8498 100644
--- a/modules/pam_unix/unix_chkpwd.c
+++ b/modules/pam_unix/unix_chkpwd.c
@@ -179,7 +179,7 @@ static int _unix_verify_password(const char *name, const char *p, int nullok)
}
}
if (pwd == NULL || salt == NULL) {
- _log_err(LOG_ALERT, "check pass; user unknown");
+ _log_err(LOG_WARNING, "check pass; user unknown");
p = NULL;
return PAM_USER_UNKNOWN;
}