From owner-freebsd-hackers Sun Aug 31 22:26:48 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id WAA07567 for hackers-outgoing; Sun, 31 Aug 1997 22:26:48 -0700 (PDT) Received: from blackhole.iceworld.org (griffin@blackhole.iceworld.org [204.246.64.101]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id WAA07562 for ; Sun, 31 Aug 1997 22:26:45 -0700 (PDT) Received: from localhost (griffin@localhost) by blackhole.iceworld.org (8.8.5/8.8.5) with SMTP id AAA00202 for ; Mon, 1 Sep 1997 00:26:40 -0500 (CDT) Date: Mon, 1 Sep 1997 00:26:39 -0500 (CDT) From: Jimbo Bahooli To: freebsd-hackers@freebsd.org Subject: Patch to sshd to maintain consistency when using libwrap. Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk This patch to sshd only affects it when using libwrap. One would expect sshd to log accepted connections just as tcpd, but that is not that case until this patch is added. A long term solution I see is to add an opposite to refuse() to libwrap that will provide logging as refuse() does. --- sshd-old.c Tue Apr 22 19:40:08 1997 +++ sshd.c Mon Sep 1 00:01:20 1997 @@ -1020,7 +1020,14 @@ request_init(&req, RQ_DAEMON, av0, RQ_FILE, newsock, NULL); fromhost(&req); if (!hosts_access(&req)) - refuse(&req); + { + refuse(&req); + } + else + { + syslog(allow_severity,"connect from %s", eval_client(&req)); + } + } #endif /* LIBWRAP */