summaryrefslogtreecommitdiff
path: root/README.privsep
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2002-06-22 00:45:50 +1000
committerDamien Miller <djm@mindrot.org>2002-06-22 00:45:50 +1000
commit263d68fc567c831e1e16d5c49efb4964ed144f64 (patch)
treefbe3833debc6238e4442f5dbc497c4833be176ac /README.privsep
parentc7d6d5552160c657cb173105216cbfa5853c1eba (diff)
- (djm) Update README.privsep; spotted by fries@
Diffstat (limited to 'README.privsep')
-rw-r--r--README.privsep21
1 files changed, 10 insertions, 11 deletions
diff --git a/README.privsep b/README.privsep
index 89b9d0457..79ea62783 100644
--- a/README.privsep
+++ b/README.privsep
@@ -1,13 +1,12 @@
1Privilege separation, or privsep, is an experimental feature in 1Privilege separation, or privsep, is method in OpenSSH by which
2OpenSSH in which operations that require root privilege are performed 2operations that require root privilege are performed by a separate
3by a separate privileged monitor process. Its purpose is to prevent 3privileged monitor process. Its purpose is to prevent privilege
4privilege escalation by containing corruption to an unprivileged 4escalation by containing corruption to an unprivileged process.
5process. More information is available at: 5More information is available at:
6 http://www.citi.umich.edu/u/provos/ssh/privsep.html 6 http://www.citi.umich.edu/u/provos/ssh/privsep.html
7 7
8Privilege separation is not enabled by default, and may be enabled by 8Privilege separation is now enabled by default; see the
9specifying "UsePrivilegeSeparation yes" in sshd_config; see the 9UsePrivilegeSeparation option in sshd_config(5).
10UsePrivilegeSeparation option in sshd(8).
11 10
12When privsep is enabled, the pre-authentication sshd process will 11When privsep is enabled, the pre-authentication sshd process will
13chroot(2) to "/var/empty" and change its privileges to the "sshd" user 12chroot(2) to "/var/empty" and change its privileges to the "sshd" user
@@ -34,8 +33,8 @@ privsep user and chroot directory:
34Privsep requires operating system support for file descriptor passing 33Privsep requires operating system support for file descriptor passing
35and mmap(MAP_ANON). 34and mmap(MAP_ANON).
36 35
37PAM-enabled OpenSSH is known to function with privsep on Linux and 36PAM-enabled OpenSSH is known to function with privsep on Linux.
38Solaris 8. It does not function on HP-UX with a trusted system 37It does not function on HP-UX with a trusted system
39configuration. PAMAuthenticationViaKbdInt does not function with 38configuration. PAMAuthenticationViaKbdInt does not function with
40privsep. 39privsep.
41 40
@@ -54,4 +53,4 @@ process 1005 is the sshd process listening for new connections.
54process 6917 is the privileged monitor process, 6919 is the user owned 53process 6917 is the privileged monitor process, 6919 is the user owned
55sshd process and 6921 is the shell process. 54sshd process and 6921 is the shell process.
56 55
57$Id: README.privsep,v 1.5 2002/05/22 01:02:15 djm Exp $ 56$Id: README.privsep,v 1.6 2002/06/21 14:45:50 djm Exp $