Simon Josefsson <si...@josefsson.org> writes: > Thanks -- I have changed shishid to use LOG_AUTHPRIV now (we'll see how > portable that is compared to LOG_AUTH...).
You should only use LOG_AUTHPRIV for auth logs that have a substantial risk of recording someone's password. I'm not sure if this situation applies. It's normally used by PAM modules, but not by Kerberos KDCs. Anyway, every piece of code I've ever seen that uses LOG_AUTHPRIV has in it something akin to: #ifndef LOG_AUTHPRIV # define LOG_AUTHPRIV LOG_AUTH #endif -- Russ Allbery (r...@stanford.edu) <http://www.eyrie.org/~eagle/> _______________________________________________ Help-shishi mailing list Help-shishi@gnu.org https://lists.gnu.org/mailman/listinfo/help-shishi