From owner-freebsd-security Mon Feb 19 21:28:11 2001 Delivered-To: freebsd-security@freebsd.org Received: from daedalus.cs.brandeis.edu (daedalus.cs.brandeis.edu [129.64.3.179]) by hub.freebsd.org (Postfix) with ESMTP id 1FB9837B401 for ; Mon, 19 Feb 2001 21:28:09 -0800 (PST) Received: from localhost (meshko@localhost) by daedalus.cs.brandeis.edu (8.9.3/8.9.3) with ESMTP id AAA19180; Tue, 20 Feb 2001 00:28:06 -0500 Date: Tue, 20 Feb 2001 00:28:05 -0500 (EST) From: Mikhail Kruk To: Dominick LaTrappe Cc: Subject: Re: OpenSSH 2.3.0 "tvp" messages In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org As far as I can tell it's a normal condition which should happen alot. if (child_terminated && packet_not_very_much_data_to_write()) if (max_time_milliseconds == 0) max_time_milliseconds = 100; if (max_time_milliseconds == 0) tvp = NULL; else { tv.tv_sec = max_time_milliseconds / 1000; tv.tv_usec = 1000 * (max_time_milliseconds % 1000); tvp = &tv; } if (tvp!=NULL) debug("tvp!=NULL kid %d mili %d", child_terminated, max_time_milliseconds); /* Wait for something to happen, or the timeout to expire. */ ret = select(max_fd + 1, readset, writeset, NULL, tvp); On Tue, 20 Feb 2001, Dominick LaTrappe wrote: > I run several machines on FreeBSD 4.2-STABLE, with the base system's > OpenSSH 2.3.0 on "LogLevel DEBUG". I get a lot of messages in syslog like > these: > > debug1: tvp!=NULL kid 0 mili 10 > debug1: tvp!=NULL kid 1 mili 10 > debug1: tvp!=NULL kid 1 mili 100 > > These come from both the SSH daemons and the per-session children, and > come in bursts. Can anyone tell me if this should be cause for concern? > > Thanks all, > > ||| Dominick > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message