diff options
author | Matt Johnston <matt@ucc.asn.au> | 2018-02-26 22:12:39 +0800 |
---|---|---|
committer | Matt Johnston <matt@ucc.asn.au> | 2018-02-26 22:12:39 +0800 |
commit | 0fc20c70af11512b219bb17d3aefd9be436cd83e (patch) | |
tree | d2355fc8dc1e6ad0fc1e12c2cef35fbcba2cd908 /svr-tcpfwd.c | |
parent | ebc915baaedfdf667e729d95370adcc5361fe04c (diff) |
don't log server listen ports
Diffstat (limited to 'svr-tcpfwd.c')
-rw-r--r-- | svr-tcpfwd.c | 5 |
1 files changed, 1 insertions, 4 deletions
diff --git a/svr-tcpfwd.c b/svr-tcpfwd.c index 1fb94a7..83f233d 100644 --- a/svr-tcpfwd.c +++ b/svr-tcpfwd.c @@ -94,7 +94,7 @@ void recv_msg_global_request_remotetcp() { buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS); buf_putint(ses.writepayload, allocated_listen_port); encrypt_packet(); - wantreply = 0; //so out does not do so + wantreply = 0; /* avoid out: below sending another reply */ } } else if (strcmp("cancel-tcpip-forward", reqname) == 0) { ret = svr_cancelremotetcp(); @@ -212,9 +212,6 @@ static int svr_remotetcpreq(int *allocated_listen_port) { if (DROPBEAR_SUCCESS == ret) { tcpinfo->listenport = get_sock_port(ses.listeners[0]->socks[0]); *allocated_listen_port = tcpinfo->listenport; - dropbear_log(LOG_INFO, "tcpip-forward %s:%d '%s'", - ((NULL == tcpinfo->listenaddr)?"localhost":tcpinfo->listenaddr), - tcpinfo->listenport, ses.authstate.pw_name); } out: |