diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2002-06-09 20:00:09 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2002-06-09 20:00:09 +0000 |
commit | ece420413bbcc272300bc14f8944bb2679e4afd2 (patch) | |
tree | f6070a210cdcb12a3a03fd9938416ada7f6edcef | |
parent | 5a6abdae0f6f2312d8bfd60b8bf2420a3393428d (diff) |
- markus@cvs.openbsd.org 2002/06/08 05:07:56
[ssh.c]
nuke ptrace comment
-rw-r--r-- | ChangeLog | 8 | ||||
-rw-r--r-- | ssh.c | 10 |
2 files changed, 8 insertions, 10 deletions
@@ -1,3 +1,9 @@ | |||
1 | 20020609 | ||
2 | - (bal) OpenBSD CVS Sync | ||
3 | - markus@cvs.openbsd.org 2002/06/08 05:07:56 | ||
4 | [ssh.c] | ||
5 | nuke ptrace comment | ||
6 | |||
1 | 20020607 | 7 | 20020607 |
2 | - (bal) Removed --{enable/disable}-suid-ssh | 8 | - (bal) Removed --{enable/disable}-suid-ssh |
3 | - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au | 9 | - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au |
@@ -828,4 +834,4 @@ | |||
828 | - (stevesk) entropy.c: typo in debug message | 834 | - (stevesk) entropy.c: typo in debug message |
829 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ | 835 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ |
830 | 836 | ||
831 | $Id: ChangeLog,v 1.2188 2002/06/07 16:49:11 mouring Exp $ | 837 | $Id: ChangeLog,v 1.2189 2002/06/09 20:00:09 mouring Exp $ |
@@ -40,7 +40,7 @@ | |||
40 | */ | 40 | */ |
41 | 41 | ||
42 | #include "includes.h" | 42 | #include "includes.h" |
43 | RCSID("$OpenBSD: ssh.c,v 1.174 2002/05/23 19:39:34 markus Exp $"); | 43 | RCSID("$OpenBSD: ssh.c,v 1.175 2002/06/08 05:07:56 markus Exp $"); |
44 | 44 | ||
45 | #include <openssl/evp.h> | 45 | #include <openssl/evp.h> |
46 | #include <openssl/err.h> | 46 | #include <openssl/err.h> |
@@ -717,14 +717,6 @@ again: | |||
717 | * user's home directory if it happens to be on a NFS volume where | 717 | * user's home directory if it happens to be on a NFS volume where |
718 | * root is mapped to nobody. | 718 | * root is mapped to nobody. |
719 | */ | 719 | */ |
720 | |||
721 | /* | ||
722 | * Note that some legacy systems need to postpone the following call | ||
723 | * to permanently_set_uid() until the private hostkey is destroyed | ||
724 | * with RSA_free(). Otherwise the calling user could ptrace() the | ||
725 | * process, read the private hostkey and impersonate the host. | ||
726 | * OpenBSD does not allow ptracing of setuid processes. | ||
727 | */ | ||
728 | permanently_set_uid(pw); | 720 | permanently_set_uid(pw); |
729 | 721 | ||
730 | /* | 722 | /* |