# HG changeset patch # User Matt Johnston # Date 1519654359 -28800 # Node ID bb55dffab5ba55a8a0f172b8533f7b21c68a9dc3 # Parent 03a42f41cf2c1a7dc44ea915132541d41896f3c6 don't log server listen ports diff -r 03a42f41cf2c -r bb55dffab5ba svr-tcpfwd.c --- a/svr-tcpfwd.c Mon Feb 26 22:08:53 2018 +0800 +++ b/svr-tcpfwd.c Mon Feb 26 22:12:39 2018 +0800 @@ -94,7 +94,7 @@ buf_putbyte(ses.writepayload, SSH_MSG_REQUEST_SUCCESS); buf_putint(ses.writepayload, allocated_listen_port); encrypt_packet(); - wantreply = 0; //so out does not do so + wantreply = 0; /* avoid out: below sending another reply */ } } else if (strcmp("cancel-tcpip-forward", reqname) == 0) { ret = svr_cancelremotetcp(); @@ -212,9 +212,6 @@ if (DROPBEAR_SUCCESS == ret) { tcpinfo->listenport = get_sock_port(ses.listeners[0]->socks[0]); *allocated_listen_port = tcpinfo->listenport; - dropbear_log(LOG_INFO, "tcpip-forward %s:%d '%s'", - ((NULL == tcpinfo->listenaddr)?"localhost":tcpinfo->listenaddr), - tcpinfo->listenport, ses.authstate.pw_name); } out: