reduce stderr spam when using ssh -S /path/mux -O forward -R 0:...
authordjm <djm@openbsd.org>
Fri, 1 May 2015 04:01:58 +0000 (04:01 +0000)
committerdjm <djm@openbsd.org>
Fri, 1 May 2015 04:01:58 +0000 (04:01 +0000)
ok dtucker@

usr.bin/ssh/mux.c

index 73d6597..0ffb105 100644 (file)
@@ -1,4 +1,4 @@
-/* $OpenBSD: mux.c,v 1.51 2015/04/24 01:36:00 deraadt Exp $ */
+/* $OpenBSD: mux.c,v 1.52 2015/05/01 04:01:58 djm Exp $ */
 /*
  * Copyright (c) 2002-2008 Damien Miller <djm@openbsd.org>
  *
@@ -592,7 +592,7 @@ mux_confirm_remote_forward(int type, u_int32_t seq, void *ctxt)
        if (type == SSH2_MSG_REQUEST_SUCCESS) {
                if (rfwd->listen_port == 0) {
                        rfwd->allocated_port = packet_get_int();
-                       logit("Allocated port %u for mux remote forward"
+                       debug("Allocated port %u for mux remote forward"
                            " to %s:%d", rfwd->allocated_port,
                            rfwd->connect_host, rfwd->connect_port);
                        buffer_put_int(&out, MUX_S_REMOTE_PORT);
@@ -1703,7 +1703,7 @@ mux_client_forward(int fd, int cancel_flag, u_int ftype, struct Forward *fwd)
                if (cancel_flag)
                        fatal("%s: got MUX_S_REMOTE_PORT for cancel", __func__);
                fwd->allocated_port = buffer_get_int(&m);
-               logit("Allocated port %u for remote forward to %s:%d",
+               verbose("Allocated port %u for remote forward to %s:%d",
                    fwd->allocated_port,
                    fwd->connect_host ? fwd->connect_host : "",
                    fwd->connect_port);