summaryrefslogtreecommitdiffhomepage
path: root/svr-tcpfwd.c
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2018-02-26 22:12:39 +0800
committerMatt Johnston <matt@ucc.asn.au>2018-02-26 22:12:39 +0800
commit0fc20c70af11512b219bb17d3aefd9be436cd83e (patch)
treed2355fc8dc1e6ad0fc1e12c2cef35fbcba2cd908 /svr-tcpfwd.c
parentebc915baaedfdf667e729d95370adcc5361fe04c (diff)
don't log server listen ports
Diffstat (limited to 'svr-tcpfwd.c')
-rw-r--r--svr-tcpfwd.c5
1 files changed, 1 insertions, 4 deletions
diff --git a/svr-tcpfwd.c b/svr-tcpfwd.c
index 1fb94a7..83f233d 100644
--- a/svr-tcpfwd.c
+++ b/svr-tcpfwd.c
@@ -94,7 +94,7 @@ void recv_msg_global_request_remotetcp() {
buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS);
buf_putint(ses.writepayload, allocated_listen_port);
encrypt_packet();
- wantreply = 0; //so out does not do so
+ wantreply = 0; /* avoid out: below sending another reply */
}
} else if (strcmp("cancel-tcpip-forward", reqname) == 0) {
ret = svr_cancelremotetcp();
@@ -212,9 +212,6 @@ static int svr_remotetcpreq(int *allocated_listen_port) {
if (DROPBEAR_SUCCESS == ret) {
tcpinfo->listenport = get_sock_port(ses.listeners[0]->socks[0]);
*allocated_listen_port = tcpinfo->listenport;
- dropbear_log(LOG_INFO, "tcpip-forward %s:%d '%s'",
- ((NULL == tcpinfo->listenaddr)?"localhost":tcpinfo->listenaddr),
- tcpinfo->listenport, ses.authstate.pw_name);
}
out: