summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c25
1 files changed, 25 insertions, 0 deletions
diff --git a/sshd.c b/sshd.c
index 539a000fd..673db87f6 100644
--- a/sshd.c
+++ b/sshd.c
@@ -127,6 +127,13 @@
127#include <Security/AuthSession.h> 127#include <Security/AuthSession.h>
128#endif 128#endif
129 129
130#ifdef LIBWRAP
131#include <tcpd.h>
132#include <syslog.h>
133int allow_severity;
134int deny_severity;
135#endif /* LIBWRAP */
136
130/* Re-exec fds */ 137/* Re-exec fds */
131#define REEXEC_DEVCRYPTO_RESERVED_FD (STDERR_FILENO + 1) 138#define REEXEC_DEVCRYPTO_RESERVED_FD (STDERR_FILENO + 1)
132#define REEXEC_STARTUP_PIPE_FD (STDERR_FILENO + 2) 139#define REEXEC_STARTUP_PIPE_FD (STDERR_FILENO + 2)
@@ -2099,6 +2106,24 @@ main(int ac, char **av)
2099#ifdef SSH_AUDIT_EVENTS 2106#ifdef SSH_AUDIT_EVENTS
2100 audit_connection_from(remote_ip, remote_port); 2107 audit_connection_from(remote_ip, remote_port);
2101#endif 2108#endif
2109#ifdef LIBWRAP
2110 allow_severity = options.log_facility|LOG_INFO;
2111 deny_severity = options.log_facility|LOG_WARNING;
2112 /* Check whether logins are denied from this host. */
2113 if (packet_connection_is_on_socket()) {
2114 struct request_info req;
2115
2116 request_init(&req, RQ_DAEMON, __progname, RQ_FILE, sock_in, 0);
2117 fromhost(&req);
2118
2119 if (!hosts_access(&req)) {
2120 debug("Connection refused by tcp wrapper");
2121 refuse(&req);
2122 /* NOTREACHED */
2123 fatal("libwrap refuse returns");
2124 }
2125 }
2126#endif /* LIBWRAP */
2102 2127
2103 rdomain = ssh_packet_rdomain_in(ssh); 2128 rdomain = ssh_packet_rdomain_in(ssh);
2104 2129