From owner-freebsd-hackers Sun Aug 31 23:06:35 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id XAA08815 for hackers-outgoing; Sun, 31 Aug 1997 23:06:35 -0700 (PDT) Received: from counterintelligence.ml.org (mdean.vip.best.com [206.86.94.101]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id XAA08807 for ; Sun, 31 Aug 1997 23:06:08 -0700 (PDT) Received: from localhost (jamil@localhost) by counterintelligence.ml.org (8.8.7/8.8.5) with SMTP id XAA01286; Sun, 31 Aug 1997 23:02:49 -0700 (PDT) Date: Sun, 31 Aug 1997 23:02:48 -0700 (PDT) From: "Jamil J. Weatherbee" To: Jimbo Bahooli cc: freebsd-hackers@FreeBSD.ORG Subject: Re: Patch to sshd to maintain consistency when using libwrap. In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk One thing that I really really need is block encryption on an entire filesystem under freebsd --- does this exist. also can I use ssh to encrypt single files under idea. On Mon, 1 Sep 1997, Jimbo Bahooli wrote: > This patch to sshd only affects it when using libwrap. One would > expect sshd to log accepted connections just as tcpd, but that is not that > case until this patch is added. A long term solution I see is to add an > opposite to refuse() to libwrap that will provide logging as refuse() > does. > > > --- sshd-old.c Tue Apr 22 19:40:08 1997 > +++ sshd.c Mon Sep 1 00:01:20 1997 > @@ -1020,7 +1020,14 @@ > request_init(&req, RQ_DAEMON, av0, RQ_FILE, newsock, NULL); > fromhost(&req); > if (!hosts_access(&req)) > - refuse(&req); > + { > + refuse(&req); > + } > + else > + { > + syslog(allow_severity,"connect from %s", eval_client(&req)); > + } > + > } > #endif /* LIBWRAP */ > >