diff options
author | Damien Miller <djm@mindrot.org> | 2008-11-03 19:23:10 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2008-11-03 19:23:10 +1100 |
commit | 51bde6000ac9887e071dcbbaa99bce68ee42020f (patch) | |
tree | af4bd13e0363234964d5b0f84e96734205c06e00 | |
parent | e272a5bb2937f1a8297c412c9312c38133f829c1 (diff) |
- djm@cvs.openbsd.org 2008/10/09 03:50:54
[servconf.c sshd_config.5]
support setting PermitEmptyPasswords in a Match block
requested in PR3891; ok dtucker@
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | servconf.c | 5 | ||||
-rw-r--r-- | sshd_config.5 | 5 |
3 files changed, 11 insertions, 5 deletions
@@ -52,6 +52,10 @@ | |||
52 | Add -y option to force logging via syslog rather than stderr. | 52 | Add -y option to force logging via syslog rather than stderr. |
53 | Useful for daemonised ssh connection (ssh -f). Patch originally from | 53 | Useful for daemonised ssh connection (ssh -f). Patch originally from |
54 | and ok'd by markus@ | 54 | and ok'd by markus@ |
55 | - djm@cvs.openbsd.org 2008/10/09 03:50:54 | ||
56 | [servconf.c sshd_config.5] | ||
57 | support setting PermitEmptyPasswords in a Match block | ||
58 | requested in PR3891; ok dtucker@ | ||
55 | 59 | ||
56 | 20080906 | 60 | 20080906 |
57 | - (dtucker) [config.guess config.sub] Update to latest versions from | 61 | - (dtucker) [config.guess config.sub] Update to latest versions from |
@@ -4786,4 +4790,4 @@ | |||
4786 | OpenServer 6 and add osr5bigcrypt support so when someone migrates | 4790 | OpenServer 6 and add osr5bigcrypt support so when someone migrates |
4787 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ | 4791 | passwords between UnixWare and OpenServer they will still work. OK dtucker@ |
4788 | 4792 | ||
4789 | $Id: ChangeLog,v 1.5110 2008/11/03 08:22:37 djm Exp $ | 4793 | $Id: ChangeLog,v 1.5111 2008/11/03 08:23:10 djm Exp $ |
diff --git a/servconf.c b/servconf.c index 53e964dee..547f757a0 100644 --- a/servconf.c +++ b/servconf.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: servconf.c,v 1.187 2008/07/23 07:36:55 djm Exp $ */ | 1 | /* $OpenBSD: servconf.c,v 1.188 2008/10/09 03:50:54 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 3 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
4 | * All rights reserved | 4 | * All rights reserved |
@@ -380,7 +380,7 @@ static struct { | |||
380 | { "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL }, | 380 | { "x11uselocalhost", sX11UseLocalhost, SSHCFG_ALL }, |
381 | { "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL }, | 381 | { "xauthlocation", sXAuthLocation, SSHCFG_GLOBAL }, |
382 | { "strictmodes", sStrictModes, SSHCFG_GLOBAL }, | 382 | { "strictmodes", sStrictModes, SSHCFG_GLOBAL }, |
383 | { "permitemptypasswords", sEmptyPasswd, SSHCFG_GLOBAL }, | 383 | { "permitemptypasswords", sEmptyPasswd, SSHCFG_ALL }, |
384 | { "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL }, | 384 | { "permituserenvironment", sPermitUserEnvironment, SSHCFG_GLOBAL }, |
385 | { "uselogin", sUseLogin, SSHCFG_GLOBAL }, | 385 | { "uselogin", sUseLogin, SSHCFG_GLOBAL }, |
386 | { "compression", sCompression, SSHCFG_GLOBAL }, | 386 | { "compression", sCompression, SSHCFG_GLOBAL }, |
@@ -1378,6 +1378,7 @@ copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth) | |||
1378 | M_CP_INTOPT(hostbased_authentication); | 1378 | M_CP_INTOPT(hostbased_authentication); |
1379 | M_CP_INTOPT(kbd_interactive_authentication); | 1379 | M_CP_INTOPT(kbd_interactive_authentication); |
1380 | M_CP_INTOPT(permit_root_login); | 1380 | M_CP_INTOPT(permit_root_login); |
1381 | M_CP_INTOPT(permit_empty_passwd); | ||
1381 | 1382 | ||
1382 | M_CP_INTOPT(allow_tcp_forwarding); | 1383 | M_CP_INTOPT(allow_tcp_forwarding); |
1383 | M_CP_INTOPT(allow_agent_forwarding); | 1384 | M_CP_INTOPT(allow_agent_forwarding); |
diff --git a/sshd_config.5 b/sshd_config.5 index 7255b1c22..06fe5fd38 100644 --- a/sshd_config.5 +++ b/sshd_config.5 | |||
@@ -34,8 +34,8 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: sshd_config.5,v 1.96 2008/07/02 02:24:18 djm Exp $ | 37 | .\" $OpenBSD: sshd_config.5,v 1.97 2008/10/09 03:50:54 djm Exp $ |
38 | .Dd $Mdocdate: July 2 2008 $ | 38 | .Dd $Mdocdate: October 9 2008 $ |
39 | .Dt SSHD_CONFIG 5 | 39 | .Dt SSHD_CONFIG 5 |
40 | .Os | 40 | .Os |
41 | .Sh NAME | 41 | .Sh NAME |
@@ -605,6 +605,7 @@ Available keywords are | |||
605 | .Cm MaxAuthTries , | 605 | .Cm MaxAuthTries , |
606 | .Cm MaxSessions , | 606 | .Cm MaxSessions , |
607 | .Cm PasswordAuthentication , | 607 | .Cm PasswordAuthentication , |
608 | .Cm PermitEmptyPasswords , | ||
608 | .Cm PermitOpen , | 609 | .Cm PermitOpen , |
609 | .Cm PermitRootLogin , | 610 | .Cm PermitRootLogin , |
610 | .Cm RhostsRSAAuthentication , | 611 | .Cm RhostsRSAAuthentication , |