summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2002-06-09 20:00:09 +0000
committerBen Lindstrom <mouring@eviladmin.org>2002-06-09 20:00:09 +0000
commitece420413bbcc272300bc14f8944bb2679e4afd2 (patch)
treef6070a210cdcb12a3a03fd9938416ada7f6edcef
parent5a6abdae0f6f2312d8bfd60b8bf2420a3393428d (diff)
- markus@cvs.openbsd.org 2002/06/08 05:07:56
[ssh.c] nuke ptrace comment
-rw-r--r--ChangeLog8
-rw-r--r--ssh.c10
2 files changed, 8 insertions, 10 deletions
diff --git a/ChangeLog b/ChangeLog
index 3eb4100a0..9e48cbbab 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
120020609
2 - (bal) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2002/06/08 05:07:56
4 [ssh.c]
5 nuke ptrace comment
6
120020607 720020607
2 - (bal) Removed --{enable/disable}-suid-ssh 8 - (bal) Removed --{enable/disable}-suid-ssh
3 - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au 9 - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au
@@ -828,4 +834,4 @@
828 - (stevesk) entropy.c: typo in debug message 834 - (stevesk) entropy.c: typo in debug message
829 - (djm) ssh-keygen -i needs seeded RNG; report from markus@ 835 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
830 836
831$Id: ChangeLog,v 1.2188 2002/06/07 16:49:11 mouring Exp $ 837$Id: ChangeLog,v 1.2189 2002/06/09 20:00:09 mouring Exp $
diff --git a/ssh.c b/ssh.c
index 0afdba7b5..8b77a8101 100644
--- a/ssh.c
+++ b/ssh.c
@@ -40,7 +40,7 @@
40 */ 40 */
41 41
42#include "includes.h" 42#include "includes.h"
43RCSID("$OpenBSD: ssh.c,v 1.174 2002/05/23 19:39:34 markus Exp $"); 43RCSID("$OpenBSD: ssh.c,v 1.175 2002/06/08 05:07:56 markus Exp $");
44 44
45#include <openssl/evp.h> 45#include <openssl/evp.h>
46#include <openssl/err.h> 46#include <openssl/err.h>
@@ -717,14 +717,6 @@ again:
717 * user's home directory if it happens to be on a NFS volume where 717 * user's home directory if it happens to be on a NFS volume where
718 * root is mapped to nobody. 718 * root is mapped to nobody.
719 */ 719 */
720
721 /*
722 * Note that some legacy systems need to postpone the following call
723 * to permanently_set_uid() until the private hostkey is destroyed
724 * with RSA_free(). Otherwise the calling user could ptrace() the
725 * process, read the private hostkey and impersonate the host.
726 * OpenBSD does not allow ptracing of setuid processes.
727 */
728 permanently_set_uid(pw); 720 permanently_set_uid(pw);
729 721
730 /* 722 /*