summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c25
1 files changed, 25 insertions, 0 deletions
diff --git a/sshd.c b/sshd.c
index 2e453cdf8..71c360da0 100644
--- a/sshd.c
+++ b/sshd.c
@@ -127,6 +127,13 @@
127#include <Security/AuthSession.h> 127#include <Security/AuthSession.h>
128#endif 128#endif
129 129
130#ifdef LIBWRAP
131#include <tcpd.h>
132#include <syslog.h>
133int allow_severity;
134int deny_severity;
135#endif /* LIBWRAP */
136
130/* Re-exec fds */ 137/* Re-exec fds */
131#define REEXEC_DEVCRYPTO_RESERVED_FD (STDERR_FILENO + 1) 138#define REEXEC_DEVCRYPTO_RESERVED_FD (STDERR_FILENO + 1)
132#define REEXEC_STARTUP_PIPE_FD (STDERR_FILENO + 2) 139#define REEXEC_STARTUP_PIPE_FD (STDERR_FILENO + 2)
@@ -2100,6 +2107,24 @@ main(int ac, char **av)
2100#ifdef SSH_AUDIT_EVENTS 2107#ifdef SSH_AUDIT_EVENTS
2101 audit_connection_from(remote_ip, remote_port); 2108 audit_connection_from(remote_ip, remote_port);
2102#endif 2109#endif
2110#ifdef LIBWRAP
2111 allow_severity = options.log_facility|LOG_INFO;
2112 deny_severity = options.log_facility|LOG_WARNING;
2113 /* Check whether logins are denied from this host. */
2114 if (packet_connection_is_on_socket()) {
2115 struct request_info req;
2116
2117 request_init(&req, RQ_DAEMON, __progname, RQ_FILE, sock_in, 0);
2118 fromhost(&req);
2119
2120 if (!hosts_access(&req)) {
2121 debug("Connection refused by tcp wrapper");
2122 refuse(&req);
2123 /* NOTREACHED */
2124 fatal("libwrap refuse returns");
2125 }
2126 }
2127#endif /* LIBWRAP */
2103 2128
2104 rdomain = ssh_packet_rdomain_in(ssh); 2129 rdomain = ssh_packet_rdomain_in(ssh);
2105 2130