24087bf
diff -up openssh-8.6p1/log.c.log-in-chroot openssh-8.6p1/log.c
24087bf
--- openssh-8.6p1/log.c.log-in-chroot	2021-04-16 05:55:25.000000000 +0200
24087bf
+++ openssh-8.6p1/log.c	2021-04-19 14:43:08.544843434 +0200
24087bf
@@ -194,6 +194,11 @@ void
d482358
 log_init(const char *av0, LogLevel level, SyslogFacility facility,
d482358
     int on_stderr)
300c081
 {
300c081
+	log_init_handler(av0, level, facility, on_stderr, 1);
300c081
+}
300c081
+
300c081
+void
d482358
+log_init_handler(const char *av0, LogLevel level, SyslogFacility facility, int on_stderr, int reset_handler) {
300c081
 #if defined(HAVE_OPENLOG_R) && defined(SYSLOG_DATA_INIT)
300c081
 	struct syslog_data sdata = SYSLOG_DATA_INIT;
300c081
 #endif
24087bf
@@ -206,8 +211,10 @@ log_init(const char *av0, LogLevel level
300c081
 		exit(1);
300c081
 	}
300c081
 
300c081
-	log_handler = NULL;
300c081
-	log_handler_ctx = NULL;
300c081
+	if (reset_handler) {
300c081
+		log_handler = NULL;
300c081
+		log_handler_ctx = NULL;
300c081
+	}
300c081
 
300c081
 	log_on_stderr = on_stderr;
300c081
 	if (on_stderr)
24087bf
diff -up openssh-8.6p1/log.h.log-in-chroot openssh-8.6p1/log.h
24087bf
--- openssh-8.6p1/log.h.log-in-chroot	2021-04-19 14:43:08.544843434 +0200
24087bf
+++ openssh-8.6p1/log.h	2021-04-19 14:56:46.931042176 +0200
24087bf
@@ -52,6 +52,7 @@ typedef enum {
24087bf
 typedef void (log_handler_fn)(LogLevel, int, const char *, void *);
300c081
 
d482358
 void     log_init(const char *, LogLevel, SyslogFacility, int);
d482358
+void     log_init_handler(const char *, LogLevel, SyslogFacility, int, int);
5923b7b
 LogLevel log_level_get(void);
c7d42e7
 int      log_change_level(LogLevel);
300c081
 int      log_is_on_stderr(void);
24087bf
diff -up openssh-8.6p1/monitor.c.log-in-chroot openssh-8.6p1/monitor.c
24087bf
--- openssh-8.6p1/monitor.c.log-in-chroot	2021-04-19 14:43:08.526843298 +0200
24087bf
+++ openssh-8.6p1/monitor.c	2021-04-19 14:55:25.286424043 +0200
24087bf
@@ -297,6 +297,8 @@ monitor_child_preauth(struct ssh *ssh, s
33eb081
 		close(pmonitor->m_log_sendfd);
300c081
 	pmonitor->m_log_sendfd = pmonitor->m_recvfd = -1;
300c081
 
300c081
+	pmonitor->m_state = "preauth";
300c081
+
aa3c245
 	authctxt = (Authctxt *)ssh->authctxt;
300c081
 	memset(authctxt, 0, sizeof(*authctxt));
33eb081
 	ssh->authctxt = authctxt;
24087bf
@@ -408,6 +410,8 @@ monitor_child_postauth(struct ssh *ssh,
300c081
 	close(pmonitor->m_recvfd);
300c081
 	pmonitor->m_recvfd = -1;
300c081
 
300c081
+	pmonitor->m_state = "postauth";
300c081
+
300c081
 	monitor_set_child_handler(pmonitor->m_pid);
9549c46
 	ssh_signal(SIGHUP, &monitor_child_handler);
9549c46
 	ssh_signal(SIGTERM, &monitor_child_handler);
24087bf
@@ -480,7 +484,7 @@ monitor_read_log(struct monitor *pmonito
d482358
 	/* Log it */
300c081
 	if (log_level_name(level) == NULL)
d482358
 		fatal_f("invalid log level %u (corrupted message?)", level);
24087bf
-	sshlogdirect(level, forced, "%s [preauth]", msg);
24087bf
+	sshlogdirect(level, forced, "%s [%s]", msg, pmonitor->m_state);
300c081
 
5923b7b
 	sshbuf_free(logmsg);
24087bf
 	free(msg);
24087bf
@@ -1868,13 +1872,28 @@ monitor_init(void)
6995654
 	mon = xcalloc(1, sizeof(*mon));
6995654
 	monitor_openfds(mon, 1);
300c081
 
300c081
+	mon->m_state = "";
300c081
+
300c081
 	return mon;
300c081
 }
300c081
 
300c081
 void
300c081
-monitor_reinit(struct monitor *mon)
300c081
+monitor_reinit(struct monitor *mon, const char *chroot_dir)
300c081
 {
300c081
-	monitor_openfds(mon, 0);
300c081
+	struct stat dev_log_stat;
300c081
+	char *dev_log_path;
300c081
+	int do_logfds = 0;
300c081
+
300c081
+	if (chroot_dir != NULL) {
300c081
+		xasprintf(&dev_log_path, "%s/dev/log", chroot_dir);
300c081
+
300c081
+		if (stat(dev_log_path, &dev_log_stat) != 0) {
d482358
+			debug_f("/dev/log doesn't exist in %s chroot - will try to log via monitor using [postauth] suffix", chroot_dir);
300c081
+			do_logfds = 1;
300c081
+		}
300c081
+		free(dev_log_path);
300c081
+	}
300c081
+	monitor_openfds(mon, do_logfds);
300c081
 }
300c081
 
300c081
 #ifdef GSSAPI
24087bf
diff -up openssh-8.6p1/monitor.h.log-in-chroot openssh-8.6p1/monitor.h
24087bf
--- openssh-8.6p1/monitor.h.log-in-chroot	2021-04-19 14:43:08.527843305 +0200
24087bf
+++ openssh-8.6p1/monitor.h	2021-04-19 14:43:08.545843441 +0200
24087bf
@@ -80,10 +80,11 @@ struct monitor {
6995654
 	int			 m_log_sendfd;
04aef64
 	struct kex		**m_pkex;
300c081
 	pid_t			 m_pid;
300c081
+	char		*m_state;
300c081
 };
300c081
 
300c081
 struct monitor *monitor_init(void);
300c081
-void monitor_reinit(struct monitor *);
300c081
+void monitor_reinit(struct monitor *, const char *);
300c081
 
300c081
 struct Authctxt;
aa3c245
 void monitor_child_preauth(struct ssh *, struct monitor *);
24087bf
diff -up openssh-8.6p1/session.c.log-in-chroot openssh-8.6p1/session.c
24087bf
--- openssh-8.6p1/session.c.log-in-chroot	2021-04-19 14:43:08.534843358 +0200
24087bf
+++ openssh-8.6p1/session.c	2021-04-19 14:43:08.545843441 +0200
6995654
@@ -160,6 +160,7 @@ login_cap_t *lc;
300c081
 
300c081
 static int is_child = 0;
845bd87
 static int in_chroot = 0;
300c081
+static int have_dev_log = 1;
845bd87
 
c7d42e7
 /* File containing userauth info, if ExposeAuthInfo set */
c7d42e7
 static char *auth_info_file = NULL;
24087bf
@@ -661,6 +662,7 @@ do_exec(struct ssh *ssh, Session *s, con
300c081
 	int ret;
845bd87
 	const char *forced = NULL, *tty = NULL;
845bd87
 	char session_type[1024];
300c081
+	struct stat dev_log_stat;
300c081
 
300c081
 	if (options.adm_forced_command) {
300c081
 		original_command = command;
24087bf
@@ -720,6 +722,10 @@ do_exec(struct ssh *ssh, Session *s, con
300c081
 			tty += 5;
300c081
 	}
300c081
 
300c081
+	if (lstat("/dev/log", &dev_log_stat) != 0) {
300c081
+		have_dev_log = 0;
300c081
+	}
300c081
+
845bd87
 	verbose("Starting session: %s%s%s for %s from %.200s port %d id %d",
300c081
 	    session_type,
300c081
 	    tty == NULL ? "" : " on ",
24087bf
@@ -1524,14 +1530,6 @@ child_close_fds(struct ssh *ssh)
79afa4b
 
79afa4b
 	/* Stop directing logs to a high-numbered fd before we close it */
79afa4b
 	log_redirect_stderr_to(NULL);
300c081
-
300c081
-	/*
300c081
-	 * Close any extra open file descriptors so that we don't have them
300c081
-	 * hanging around in clients.  Note that we want to do this after
300c081
-	 * initgroups, because at least on Solaris 2.3 it leaves file
300c081
-	 * descriptors open.
300c081
-	 */
300c081
-	closefrom(STDERR_FILENO + 1);
300c081
 }
300c081
 
300c081
 /*
24087bf
@@ -1665,8 +1663,6 @@ do_child(struct ssh *ssh, Session *s, co
300c081
 			exit(1);
300c081
 	}
300c081
 
300c081
-	closefrom(STDERR_FILENO + 1);
300c081
-
33eb081
 	do_rc_files(ssh, s, shell);
300c081
 
6995654
 	/* restore SIGPIPE for child */
24087bf
@@ -1691,9 +1687,17 @@ do_child(struct ssh *ssh, Session *s, co
300c081
 		argv[i] = NULL;
300c081
 		optind = optreset = 1;
300c081
 		__progname = argv[0];
300c081
-		exit(sftp_server_main(i, argv, s->pw));
300c081
+		exit(sftp_server_main(i, argv, s->pw, have_dev_log));
300c081
 	}
300c081
 
300c081
+	/*
300c081
+	 * Close any extra open file descriptors so that we don't have them
300c081
+	 * hanging around in clients.  Note that we want to do this after
300c081
+	 * initgroups, because at least on Solaris 2.3 it leaves file
300c081
+	 * descriptors open.
300c081
+	 */
300c081
+	closefrom(STDERR_FILENO + 1);
300c081
+
300c081
 	fflush(NULL);
300c081
 
6995654
 	/* Get the last component of the shell name. */
24087bf
diff -up openssh-8.6p1/sftp.h.log-in-chroot openssh-8.6p1/sftp.h
24087bf
--- openssh-8.6p1/sftp.h.log-in-chroot	2021-04-16 05:55:25.000000000 +0200
24087bf
+++ openssh-8.6p1/sftp.h	2021-04-19 14:43:08.545843441 +0200
6995654
@@ -97,5 +97,5 @@
300c081
 
6995654
 struct passwd;
6995654
 
6995654
-int	sftp_server_main(int, char **, struct passwd *);
6995654
+int	sftp_server_main(int, char **, struct passwd *, int);
6995654
 void	sftp_server_cleanup_exit(int) __attribute__((noreturn));
24087bf
diff -up openssh-8.6p1/sftp-server.c.log-in-chroot openssh-8.6p1/sftp-server.c
24087bf
--- openssh-8.6p1/sftp-server.c.log-in-chroot	2021-04-16 05:55:25.000000000 +0200
24087bf
+++ openssh-8.6p1/sftp-server.c	2021-04-19 14:43:08.545843441 +0200
24087bf
@@ -1644,7 +1644,7 @@ sftp_server_usage(void)
300c081
 }
300c081
 
300c081
 int
300c081
-sftp_server_main(int argc, char **argv, struct passwd *user_pw)
300c081
+sftp_server_main(int argc, char **argv, struct passwd *user_pw, int reset_handler)
300c081
 {
300c081
 	fd_set *rset, *wset;
04aef64
 	int i, r, in, out, max, ch, skipargs = 0, log_stderr = 0;
24087bf
@@ -1657,7 +1657,7 @@ sftp_server_main(int argc, char **argv,
03327bb
 	extern char *__progname;
300c081
 
300c081
 	__progname = ssh_get_progname(argv[0]);
300c081
-	log_init(__progname, log_level, log_facility, log_stderr);
300c081
+	log_init_handler(__progname, log_level, log_facility, log_stderr, reset_handler);
300c081
 
300c081
 	pw = pwcopy(user_pw);
300c081
 
24087bf
@@ -1730,7 +1730,7 @@ sftp_server_main(int argc, char **argv,
300c081
 		}
300c081
 	}
300c081
 
300c081
-	log_init(__progname, log_level, log_facility, log_stderr);
300c081
+	log_init_handler(__progname, log_level, log_facility, log_stderr, reset_handler);
300c081
 
04aef64
 	/*
a0915d8
 	 * On platforms where we can, avoid making /proc/self/{mem,maps}
24087bf
diff -up openssh-8.6p1/sftp-server-main.c.log-in-chroot openssh-8.6p1/sftp-server-main.c
24087bf
--- openssh-8.6p1/sftp-server-main.c.log-in-chroot	2021-04-16 05:55:25.000000000 +0200
24087bf
+++ openssh-8.6p1/sftp-server-main.c	2021-04-19 14:43:08.545843441 +0200
24087bf
@@ -50,5 +50,5 @@ main(int argc, char **argv)
6995654
 		return 1;
6995654
 	}
300c081
 
6995654
-	return (sftp_server_main(argc, argv, user_pw));
6995654
+	return (sftp_server_main(argc, argv, user_pw, 0));
6995654
 }
24087bf
diff -up openssh-8.6p1/sshd.c.log-in-chroot openssh-8.6p1/sshd.c
24087bf
--- openssh-8.6p1/sshd.c.log-in-chroot	2021-04-19 14:43:08.543843426 +0200
24087bf
+++ openssh-8.6p1/sshd.c	2021-04-19 14:43:08.545843441 +0200
24087bf
@@ -559,7 +559,7 @@ privsep_postauth(struct ssh *ssh, Authct
300c081
 	}
300c081
 
300c081
 	/* New socket pair */
300c081
-	monitor_reinit(pmonitor);
300c081
+	monitor_reinit(pmonitor, options.chroot_directory);
300c081
 
300c081
 	pmonitor->m_pid = fork();
300c081
 	if (pmonitor->m_pid == -1)
24087bf
@@ -578,6 +578,11 @@ privsep_postauth(struct ssh *ssh, Authct
300c081
 
300c081
 	close(pmonitor->m_sendfd);
300c081
 	pmonitor->m_sendfd = -1;
300c081
+	close(pmonitor->m_log_recvfd);
300c081
+	pmonitor->m_log_recvfd = -1;
300c081
+
300c081
+	if (pmonitor->m_log_sendfd != -1)
300c081
+		set_log_handler(mm_log_handler, pmonitor);
300c081
 
300c081
 	/* Demote the private keys to public keys. */
300c081
 	demote_sensitive_data();