diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:09:58 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2014-02-09 23:43:40 +0000 |
commit | 2bb37315c1e077bc176e703fbf0028a1f6315d37 (patch) | |
tree | 8c0fc9e5af8b442fbfa6688bfa03ca05fc9f0c19 /platform.c | |
parent | 05609b1cb381eafb999214bf4a95138e63abdbf2 (diff) |
Allow harmless group-writability
Allow secure files (~/.ssh/config, ~/.ssh/authorized_keys, etc.) to be
group-writable, provided that the group in question contains only the file's
owner. Rejected upstream for IMO incorrect reasons (e.g. a misunderstanding
about the contents of gr->gr_mem). Given that per-user groups and umask 002
are the default setup in Debian (for good reasons - this makes operating in
setgid directories with other groups much easier), we need to permit this by
default.
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1060
Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=314347
Last-Update: 2013-09-14
Patch-Name: user-group-modes.patch
Diffstat (limited to 'platform.c')
-rw-r--r-- | platform.c | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/platform.c b/platform.c index a962f15b5..0b3bee147 100644 --- a/platform.c +++ b/platform.c | |||
@@ -194,19 +194,3 @@ platform_krb5_get_principal_name(const char *pw_name) | |||
194 | return NULL; | 194 | return NULL; |
195 | #endif | 195 | #endif |
196 | } | 196 | } |
197 | |||
198 | /* | ||
199 | * return 1 if the specified uid is a uid that may own a system directory | ||
200 | * otherwise 0. | ||
201 | */ | ||
202 | int | ||
203 | platform_sys_dir_uid(uid_t uid) | ||
204 | { | ||
205 | if (uid == 0) | ||
206 | return 1; | ||
207 | #ifdef PLATFORM_SYS_DIR_UID | ||
208 | if (uid == PLATFORM_SYS_DIR_UID) | ||
209 | return 1; | ||
210 | #endif | ||
211 | return 0; | ||
212 | } | ||