Displaying 14 results from an estimated 14 matches for "log_stderr".
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...-orig/session.c 2002-12-18 10:10:13.000000000 -0500
+++ openssh-3.5p1/session.c 2002-12-18 10:42:37.000000000 -0500
@@ -466,7 +466,7 @@
fatal_remove_all_cleanups();
/* Child. Reinitialize the log since the pid has changed. */
- log_init(__progname, options.log_level, options.log_facility, log_stderr);
+ log_init(__progname, options.log_level, options.log_facility, log_stderr,NULL);
/*
* Create a new session and process group since the 4.4BSD
@@ -590,7 +590,7 @@
fatal_remove_all_cleanups();
/* Child. Reinitialize the log because the pid has changed. */
- log_init(__progname,...
2002 Oct 15
0
[Bug 414] New: sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414
Summary: sshd initially ignores -e (log_stderr) if -i
(inetd_flag) is given
Product: Portable OpenSSH
Version: -current
Platform: All
URL: http://marc.theaimsgroup.com/?l=openssh-unix-
dev&m=102469253706346&w=2
OS/Version: Linux
St...
2002 Nov 05
2
[Bug 414] sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414
------- Additional Comments From markus at openbsd.org 2002-11-06 07:01 -------
Created an attachment (id=164)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=164&action=view)
proposed patch
what about this? (more in line with the rest of the code).
------- You are receiving this mail because: -------
You are the assignee for the
2002 Jun 21
0
sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
A non-text attachment was scrubbed...
Name: sshd-stderr.patch
Type: text/x-patch
Size: 424 bytes
Desc: make sshd honor -e even with -i
Url : http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20020621/b29eef76/attachment.bin
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
...!= 1);
/* Read server configuration options from the configuration file. */
read_server_config(&options, config_file_name);
***************
*** 633,639 ****
}
/* Initialize the log (it is reinitialized below in case we forked). */
! if (debug_flag && !inetd_flag)
log_stderr = 1;
log_init(av0, options.log_level, options.log_facility, log_stderr);
--- 633,639 ----
}
/* Initialize the log (it is reinitialized below in case we forked). */
! if (debug_flag && !inetd_flag && getppid() != 1)
log_stderr = 1;
log_init(av0, options.log_lev...
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...e_server_options(&options);
/* Parse command-line arguments. */
! while ((opt = getopt(ac, av, "f:p:b:k:h:g:V:u:o:dDeiIqtQ46")) != -1) {
switch (opt) {
case '4':
IPv4or6 = AF_INET;
***************
*** 636,641 ****
--- 640,648 ----
case 'e':
log_stderr = 1;
break;
+ case 'I':
+ init_flag = 1;
+ break;
case 'i':
inetd_flag = 1;
break;
***************
*** 706,719 ****
/*
* Force logging to stderr until we have loaded the private host
! * key (unless started from inetd)
*/
log_init...
2017 Feb 20
3
[Bug 2681] New: postauth processes to log via monitor
https://bugzilla.mindrot.org/show_bug.cgi?id=2681
Bug ID: 2681
Summary: postauth processes to log via monitor
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2007 Dec 26
1
sshd's -e doesn't work as expected
...flag || inetd_flag || no_daemon_flag)) {
int fd;
- if (daemon(0, 0) < 0)
+ if (daemon(0, 1) < 0)
fatal("daemon() failed: %.200s", strerror(errno));
+ close(STDIN_FILENO);
+ open(_PATH_DEVNULL, O_RDONLY);
+ close(STDOUT_FILENO);
+ open(_PATH_DEVNULL, O_WRONLY);
+ if (!log_stderr) {
+ close(STDERR_FILENO);
+ open(_PATH_DEVNULL, O_WRONLY);
+ }
/* Disconnect from the controlling tty. */
fd = open(_PATH_TTY, O_RDWR | O_NOCTTY);
--
Julio M. Merino Vidal <jmmv at NetBSD.org>
1999 Nov 20
1
openssh and DOS
...- the accepted socket. Reinitialize logging (since our
- pid has changed). We break out of the loop to handle
- the connection. */
- close(listen_sock);
- sock_in = newsock;
- sock_out = newsock;
- log_init(av0, options.log_level, options.log_facility, log_stderr);
- break;
+ /* Make sure we don't have too many connections. */
+ if (options.max_connections > 0
+ && current_connections >= options.max_connections)
+ error ("Maximum number of connections (%d) reached",
+ options.max_connections);
+...
2007 Jun 18
0
[PATCH] sftp-server argument error handling
...printing the more useful error to
stderr and not blundering on afterwards.
--- sftp-server.c.orig Mon Jun 18 16:37:46 2007
+++ sftp-server.c Mon Jun 18 16:39:14 2007
@@ -1220,7 +1220,8 @@
sanitise_stdfd();
__progname = ssh_get_progname(argv[0]);
- log_init(__progname, log_level, log_facility, log_stderr);
+ /* Send any argument errors to stderr */
+ log_init(__progname, log_level, log_facility, 1);
while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) {
switch (ch) {
@@ -1237,12 +1238,12 @@
case 'l':
log_level = log_level_number(optarg);
if (l...
2008 Sep 11
3
ZFS Crypto [Prelim] Codereview
...e to be good enough for caller */
124 if (nread == 0 && errno == EAGAIN)
125 break;
126
127 /* anything else is an error */
128 ret = errno;
129 cryptoerror(LOG_STDERR,
130 gettext("error reading file %s: %s"), filename,
131 strerror(ret));
132 goto error;
133 }
DEA-3 read() can return 0 when there''s no data available at the moment.
ret will be...
2007 Nov 11
1
ftp-server patch - restrict user to directory
..._t len, olen, set_size;
SyslogFacility log_facility = SYSLOG_FACILITY_AUTH;
char *cp, buf[4*4096];
+ int config_file_mandatory = 0;
extern char *optarg;
extern char *__progname;
@@ -1225,7 +1406,7 @@
__progname = ssh_get_progname(argv[0]);
log_init(__progname, log_level, log_facility, log_stderr);
- while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) {
+ while (!skipargs && (ch = getopt(argc, argv, "C:f:F:l:che")) != -1) {
switch (ch) {
case 'c':
/*
@@ -1247,12 +1428,18 @@
if (log_level == SYSLOG_FACILITY_NOT_SET)...
2006 Oct 09
1
About sftp-server root path
Hi,
I saw in archive that some people made a patch to sftp-server, and that patch
sets a root path.
I'd like to know if there's an ideia to apply that patch in main tree of
openssh?
With the use of SSHFS [wich uses sftp-server], it would be interesting to
have someting like that, because as we have netboot workstations, the access
to devices [such as, floppy, cdrom and usb data] are
2015 Jul 06
3
[PATCH v2 1/1] paint visual host key with unicode box-drawing characters
...level, const char *fmt, va_list args)
tmp_handler(level, fmtbuf, log_handler_ctx);
log_handler = tmp_handler;
} else if (log_on_stderr) {
- snprintf(msgbuf, sizeof msgbuf, "%s\r\n", fmtbuf);
+ /* we want unicode multi byte characters, so do not use fmtbuf here */
(void)write(log_stderr_fd, msgbuf, strlen(msgbuf));
} else {
#if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
diff --git a/sshkey.c b/sshkey.c
index cfe5980..326bc29 100644
--- a/sshkey.c
+++ b/sshkey.c
@@ -44,6 +44,9 @@
#include <stdio.h>
#include <string.h>
#include <resolv.h>
+#...