diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:09:58 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2018-08-24 17:49:07 +0100 |
commit | 840f43066f9cdf5f6bb07992aca1c5f43be8eb80 (patch) | |
tree | eada7af8840576ed8b715b291101bc150914d004 /misc.h | |
parent | d47fa6fefb418c6d8f5a6d3dd49fd9dc7fce0c74 (diff) |
Allow harmless group-writability
Allow secure files (~/.ssh/config, ~/.ssh/authorized_keys, etc.) to be
group-writable, provided that the group in question contains only the file's
owner. Rejected upstream for IMO incorrect reasons (e.g. a misunderstanding
about the contents of gr->gr_mem). Given that per-user groups and umask 002
are the default setup in Debian (for good reasons - this makes operating in
setgid directories with other groups much easier), we need to permit this by
default.
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1060
Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=314347
Last-Update: 2017-10-04
Patch-Name: user-group-modes.patch
Diffstat (limited to 'misc.h')
-rw-r--r-- | misc.h | 2 |
1 files changed, 2 insertions, 0 deletions
@@ -167,6 +167,8 @@ int safe_path_fd(int, const char *, struct passwd *, | |||
167 | char *read_passphrase(const char *, int); | 167 | char *read_passphrase(const char *, int); |
168 | int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2))); | 168 | int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2))); |
169 | 169 | ||
170 | int secure_permissions(struct stat *st, uid_t uid); | ||
171 | |||
170 | #define MINIMUM(a, b) (((a) < (b)) ? (a) : (b)) | 172 | #define MINIMUM(a, b) (((a) < (b)) ? (a) : (b)) |
171 | #define MAXIMUM(a, b) (((a) > (b)) ? (a) : (b)) | 173 | #define MAXIMUM(a, b) (((a) > (b)) ? (a) : (b)) |
172 | #define ROUNDUP(x, y) ((((x)+((y)-1))/(y))*(y)) | 174 | #define ROUNDUP(x, y) ((((x)+((y)-1))/(y))*(y)) |