diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:09:58 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2014-03-19 16:40:05 +0000 |
commit | 0879622ccc5a92902c6ffd88391824cfb2d27924 (patch) | |
tree | 890714d8d78e9a1776e72d12b0f7c59988e0e57f /misc.h | |
parent | f4858fd1a10d1621e5e3ad5f2400dd17d156ced7 (diff) |
Allow harmless group-writability
Allow secure files (~/.ssh/config, ~/.ssh/authorized_keys, etc.) to be
group-writable, provided that the group in question contains only the file's
owner. Rejected upstream for IMO incorrect reasons (e.g. a misunderstanding
about the contents of gr->gr_mem). Given that per-user groups and umask 002
are the default setup in Debian (for good reasons - this makes operating in
setgid directories with other groups much easier), we need to permit this by
default.
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1060
Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=314347
Last-Update: 2013-09-14
Patch-Name: user-group-modes.patch
Diffstat (limited to 'misc.h')
-rw-r--r-- | misc.h | 2 |
1 files changed, 2 insertions, 0 deletions
@@ -106,4 +106,6 @@ char *read_passphrase(const char *, int); | |||
106 | int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2))); | 106 | int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2))); |
107 | int read_keyfile_line(FILE *, const char *, char *, size_t, u_long *); | 107 | int read_keyfile_line(FILE *, const char *, char *, size_t, u_long *); |
108 | 108 | ||
109 | int secure_permissions(struct stat *st, uid_t uid); | ||
110 | |||
109 | #endif /* _MISC_H */ | 111 | #endif /* _MISC_H */ |