Displaying 7 results from an estimated 7 matches for "log_authpriv".
2000 May 29
1
Syslog facility in Linux
Hi !
While browsing Linux manpages (man 3 syslog) I noticed that the manual
says that the LOG_AUTH facility is deprecated use LOG_AUTHPRIV instead.
Is there a good reason why OpenSSH doesn't have an option to use
LOG_AUTHPRIV facility ? (Looks like that tcpd/telnet etc. use the AUTHPRIV
facility (in RH6.2)).
Shouldn't be too hard to add the AUTH_PRIV facility ?
Cheers,
-Jarno
--
,,,,
/'^'\
( o o...
2003 Apr 01
1
LOG_AUTHPRIV and the default syslog.conf
Hello,
Some time ago I wrote PR conf/48170, which discussed
the following problem:
Syslog messages of facility LOG_AUTHPRIV and priority LOG_NOTICE
(or higher) are sent by default to the world-readable log file
/var/log/messages. That seems unacceptable since the facility
LOG_AUTHPRIV is for hiding sensitive log messages inside a protected
file, e.g., /var/log/auth.log.
For example, login(1) and ftpd(8) send messages...
2018 May 11
2
vfs_full_audit and facility 'auth'...
On Fri, 11 May 2018 13:17:52 -0700
Jeremy Allison <jra at samba.org> wrote:
> On Fri, May 11, 2018 at 09:56:47PM +0200, Timur I. Bakeyev via samba
> wrote:
> > >
> > Fixing it in both ways is easy, but it would be nice to hear from
> > the developers, why did they choose such a limited set of syslog
> > facilities.
>
> I don't know. The limited
2018 May 11
3
vfs_full_audit and facility 'auth'...
...OCAL3, },
{ "local4", LOG_LOCAL4, },
{ "local5", LOG_LOCAL5, },
{ "local6", LOG_LOCAL6, },
{ "local7", LOG_LOCAL7, },
{ NULL, -1, }
};
I've explicitly removed LOG_AUTHPRIV from this list.
With regards,
Timur.
1997 May 26
1
an anti-overflow wrapper
...in %s. Please notify the system\n"
"administration.\n", CFGFILE);
}
int main(int argc, char *argv[])
{
FILE *cfgfile;
char buff[BUFFSIZE];
char *f = NULL;
char *s;
char *t;
char *u;
char *key;
char *value;
char **e;
size_t len;
int i;
openlog(argv[0], 0, LOG_AUTHPRIV);
if(!(cfgfile = fopen(CFGFILE, "r"))) {
syslog(LOG_ERR, "WRAPPER: Can''t open %s: %m.", CFGFILE);
exit(1);
}
while(fgets(buff, sizeof(buff), cfgfile)) {
if(!(s = strchr(buff, ''\n''))) {
syntax("Long line.");
exi...
2006 Jun 01
1
mac_bsdextended log information
Hey everyone,
I'm hoping someone can point me in the right direction. I'm running a 6.1 box with mac_bsdextended compiled. I've created my ugidfw rules, and all seems well in the universe.
I've got rules set up so the web process uid 80 and gid 80 can only read uid 1010 and gid 1010 owned files. When the web server tries to do something else, it throws an error such as:
2020 Jul 21
11
[RFC PATCH 0/4] PAM module for ssh-agent user authentication
Hi,
The main (and probably the only) use case of this PAM module is to let
sudo authenticate users via their ssh-agent, therefore without having
to type any password and without being tempted to use the NOPASSWD sudo
option for such convenience.
The principle is originally implemented by an existing module [0][1]
and many pages that explain how to use it for such purpose can be
found online.