summaryrefslogtreecommitdiff
path: root/misc.h
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2014-02-09 16:09:58 +0000
committerColin Watson <cjwatson@debian.org>2016-08-07 12:18:43 +0100
commit563974a78e937c4844e1198b5f6d79b8b2b5c600 (patch)
treeab2b821031f9b3d4dac7123b677dd6e8a93ac4d3 /misc.h
parent173d65e72989cba82502604da3f1336766c0cf0f (diff)
Allow harmless group-writability
Allow secure files (~/.ssh/config, ~/.ssh/authorized_keys, etc.) to be group-writable, provided that the group in question contains only the file's owner. Rejected upstream for IMO incorrect reasons (e.g. a misunderstanding about the contents of gr->gr_mem). Given that per-user groups and umask 002 are the default setup in Debian (for good reasons - this makes operating in setgid directories with other groups much easier), we need to permit this by default. Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1060 Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=314347 Last-Update: 2013-09-14 Patch-Name: user-group-modes.patch
Diffstat (limited to 'misc.h')
-rw-r--r--misc.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/misc.h b/misc.h
index 7c76a6a72..42cd95e42 100644
--- a/misc.h
+++ b/misc.h
@@ -139,4 +139,6 @@ char *read_passphrase(const char *, int);
139int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2))); 139int ask_permission(const char *, ...) __attribute__((format(printf, 1, 2)));
140int read_keyfile_line(FILE *, const char *, char *, size_t, u_long *); 140int read_keyfile_line(FILE *, const char *, char *, size_t, u_long *);
141 141
142int secure_permissions(struct stat *st, uid_t uid);
143
142#endif /* _MISC_H */ 144#endif /* _MISC_H */