Displaying 8 results from an estimated 8 matches for "do_log2".
Did you mean:
do_log
2024 Oct 25
1
[PATCH] Memory leak fixed - when lauched as non-root user When we lauch sshd as non-root user, its still able to load public keys but fails to load private keys. So before exiting free the memory allocated for the public key
---
sshd.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/sshd.c b/sshd.c
index dda8d9b77..cbdced5db 100644
--- a/sshd.c
+++ b/sshd.c
@@ -1533,6 +1533,8 @@ main(int ac, char **av)
} else {
do_log2(ll, "Unable to load host key: %s",
options.host_key_files[i]);
+ sshkey_free(pubkey);
+ pubkey = NULL;
sensitive_data.host_keys[i] = NULL;
sensitive_data.host_pubkeys[i] = NULL;
continue;
--
2.45.2
2011 Jun 02
2
preauth privsep logging via monitor
...L;
+ log_handler_ctx = NULL;
+
log_on_stderr = on_stderr;
if (on_stderr)
return;
@@ -327,6 +332,23 @@ log_init(char *av0, LogLevel level, Sysl
#define MSGBUFSIZ 1024
void
+set_log_handler(log_handler_fn *handler, void *ctx)
+{
+ log_handler = handler;
+ log_handler_ctx = ctx;
+}
+
+void
+do_log2(LogLevel level, const char *fmt,...)
+{
+ va_list args;
+
+ va_start(args, fmt);
+ do_log(level, fmt, args);
+ va_end(args);
+}
+
+void
do_log(LogLevel level, const char *fmt, va_list args)
{
#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
@@ -337,6 +359,7 @@ do_log(LogLevel lev...
2025 Jun 02
0
[Bug 3832] New: [PATCH] typo: MaxStartups instead of Maxstartups
...Assignee: unassigned-bugs at mindrot.org
Reporter: mindrot at nerdbynature.de
Created attachment 3883
--> https://bugzilla.mindrot.org/attachment.cgi?id=3883&action=edit
patch
With commit 81c1099d ("upstream: Add a facility to sshd(8) to penalise
particular") the do_log2 function was reworked. Before, log messages
read like the following:
drop connection #10 from ... on ... past MaxStartups
Now sshd logs this:
drop connection #11 from ... on ... Maxstartups
That tripped one of my log file monitors and I was wondering why
"MaxStartups" has been renam...
2019 Aug 06
2
[PATCH v2] Remove sshkey_load_private()
...if ((r = sshkey_load_private(options.host_key_files[i], "",
- &key, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR)
+ if ((r = sshkey_load_private_type(KEY_UNSPEC,
+ options.host_key_files[i], "", &key, NULL)) != 0 &&
+ r != SSH_ERR_SYSTEM_ERROR)
do_log2(ll, "Unable to load host key \"%s\": %s",
options.host_key_files[i], ssh_err(r));
if (r == 0 && (r = sshkey_shield_private(key)) != 0) {
--
2.22.0
2020 Apr 26
5
[Bug 3155] New: openssh support hostkey encrypt
...YSLOG_LEVEL_DEBUG1;
if (options.host_key_files[i] == NULL)
continue;
if ((r = sshkey_load_private(options.host_key_files[i],
"",
&key, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR)
do_log2(ll, "Unable to load host key \"%s\":
%s",
options.host_key_files[i], ssh_err(r));
...
By default, an empty string is used as the password for reading the
hostkey. When the hostkey is stolen, the third party can disguise as
the server to obtain some in...
2018 Sep 06
4
Some wishes regarding revoked keys
Hello.
I am trying to play through the following test scenario about
certificate revocation on Ubuntu 18.04, which has OpenSSH of this version:
OpenSSH_7.6p1 Ubuntu-4, OpenSSL 1.0.2n? 7 Dec 2017
1. A CA key is created
ssh-keygen -t ed25519 -f ca
2. The CA public key is added to ~/.ssh/authorized_keys on some server:
cert-authority ssh-ed25519 AAAA...e ca at yoga
3. A user key is created on a
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...tions.host_key_files[i] == NULL)
??? ??? ??? ?continue;
??? ??? ?if ((r = sshkey_load_private(options.host_key_files[i], "",
-?? ??? ???? &key, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR)
+?? ??? ???? &key, NULL, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR)
??? ??? ??? ?do_log2(ll, "Unable to load host key \"%s\": %s",
??? ??? ??? ???? options.host_key_files[i], ssh_err(r));
??? ??? ?if (sshkey_is_sk(key) &&
diff --git a/sshkey.c b/sshkey.c
index 1571e3d93878..4c1948a3752e 100644
--- a/sshkey.c
+++ b/sshkey.c
@@ -93,6 +93,26 @@ int?? ?sshkey_pr...
2013 Oct 07
4
Feature request: FQDN Host match
Hello!
I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :)
Anyway, my question relates to ssh_config. The problem I find is that
the Host pattern is only applied to the argument given on the command
line, as outlined in the man page:
"The host is the hostname argument given on the command line (i.e. the
name is not converted to a canonicalized host name