Simon Josefsson <si...@josefsson.org> writes:

> Thanks -- I have changed shishid to use LOG_AUTHPRIV now (we'll see how
> portable that is compared to LOG_AUTH...).

You should only use LOG_AUTHPRIV for auth logs that have a substantial
risk of recording someone's password.  I'm not sure if this situation
applies.  It's normally used by PAM modules, but not by Kerberos KDCs.

Anyway, every piece of code I've ever seen that uses LOG_AUTHPRIV has in
it something akin to:

#ifndef LOG_AUTHPRIV
# define LOG_AUTHPRIV LOG_AUTH
#endif

-- 
Russ Allbery (r...@stanford.edu)             <http://www.eyrie.org/~eagle/>

_______________________________________________
Help-shishi mailing list
Help-shishi@gnu.org
https://lists.gnu.org/mailman/listinfo/help-shishi

Reply via email to