c54a8b0
diff -up openssh-5.3p1/auth1.c.skip-initial openssh-5.3p1/auth1.c
c54a8b0
--- openssh-5.3p1/auth1.c.skip-initial	2009-03-08 01:40:28.000000000 +0100
c54a8b0
+++ openssh-5.3p1/auth1.c	2009-10-02 13:55:00.000000000 +0200
09510ad
@@ -244,7 +244,7 @@ do_authloop(Authctxt *authctxt)
09510ad
 	    authctxt->valid ? "" : "invalid user ", authctxt->user);
cvsdist ffdec57
 
cvsdist ffdec57
 	/* If the user has no password, accept authentication immediately. */
cvsdist ffdec57
-	if (options.password_authentication &&
cvsdist ffdec57
+	if (options.permit_empty_passwd && options.password_authentication &&
cvsdist ffdec57
 #ifdef KRB5
cvsdist ffdec57
 	    (!options.kerberos_authentication || options.kerberos_or_local_passwd) &&
cvsdist ffdec57
 #endif
c54a8b0
diff -up openssh-5.3p1/auth2-none.c.skip-initial openssh-5.3p1/auth2-none.c
c54a8b0
--- openssh-5.3p1/auth2-none.c.skip-initial	2009-03-08 01:40:28.000000000 +0100
c54a8b0
+++ openssh-5.3p1/auth2-none.c	2009-10-02 13:56:21.000000000 +0200
c54a8b0
@@ -61,7 +61,7 @@ userauth_none(Authctxt *authctxt)
c54a8b0
 {
c54a8b0
 	none_enabled = 0;
c54a8b0
 	packet_check_eom();
cvsdist ffdec57
-	if (options.password_authentication)
cvsdist ffdec57
+	if (options.permit_empty_passwd && options.password_authentication)
cvsdist ffdec57
 		return (PRIVSEP(auth_password(authctxt, "")));
cvsdist ffdec57
 	return (0);
cvsdist ffdec57
 }