Package: sslh
Version: 2.1.4-1+b1
Severity: minor
Tags: patch
Dear Maintainer,
After Debian 12 -> 13 upgrade logcheck started to report log lines like
this:
2026-01-13T00:36:58.261944+01:00 myhost sslh[83128]: tls:connection from
some.host.example.com:60940 to public-address:443 forwarded from
some.host.example.com:60940 to localhost:443
I suggest modification of /etc/logcheck/ignore.d.server/sslh. Patch is
attached.
BR
Gabor Kiss
-- System Information:
Debian Release: 13.3
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500,
'proposed-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 6.12.63+deb13-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages sslh depends on:
ii adduser 3.152
ii debconf 1.5.91
ii init-system-helpers 1.69~deb13u1
ii libc6 2.41-12+deb13u1
ii libcap2 1:2.75-10+b3
ii libconfig11 1.7.3-2
ii libev4t64 1:4.33-2.1+b1
ii libpcre2-8-0 10.46-1~deb13u1
ii libsystemd0 257.9-1~deb13u1
ii libwrap0 7.6.q-36
ii update-inetd 4.53
Versions of packages sslh recommends:
ii apache2 [httpd] 2.4.66-1~deb13u1
ii openssh-server [ssh-server] 1:10.0p1-7
Versions of packages sslh suggests:
ii openbsd-inetd [inet-superserver] 0.20221205-3+b2
-- debconf information excluded
--- sslh 2019-09-05 18:58:56.000000000 +0200
+++ /tmp/sslh 2026-01-13 06:50:16.728306053 +0100
@@ -1 +1 @@
-^\w{3} [ :[:digit:]]{11} [._[:alnum:]-]+ (sslh|sslh-select)\[[[:digit:]]+\]:
connection from [^[:space:]]+:[^[:space:]]+ to [^[:space:]]+:[^[:space:]]+
forwarded from [^[:space:]]+:[^[:space:]]+ to [^[:space:]]+:(https|ssh|openvpn)$
+^(\w{3} [ :0-9]{11}|[0-9T:.+-]{32}) [._[:alnum:]-]+
(sslh|sslh-select)\[[[:digit:]]+\]: (tls:)?connection from
[^[:space:]]+:[^[:space:]]+ to [^[:space:]]+:[^[:space:]]+ forwarded from
[^[:space:]]+:[^[:space:]]+ to [^[:space:]]+:[^[:space:]]+$