diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:09:58 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2016-08-07 12:18:43 +0100 |
commit | 563974a78e937c4844e1198b5f6d79b8b2b5c600 (patch) | |
tree | ab2b821031f9b3d4dac7123b677dd6e8a93ac4d3 /platform.c | |
parent | 173d65e72989cba82502604da3f1336766c0cf0f (diff) |
Allow harmless group-writability
Allow secure files (~/.ssh/config, ~/.ssh/authorized_keys, etc.) to be
group-writable, provided that the group in question contains only the file's
owner. Rejected upstream for IMO incorrect reasons (e.g. a misunderstanding
about the contents of gr->gr_mem). Given that per-user groups and umask 002
are the default setup in Debian (for good reasons - this makes operating in
setgid directories with other groups much easier), we need to permit this by
default.
Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1060
Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=314347
Last-Update: 2013-09-14
Patch-Name: user-group-modes.patch
Diffstat (limited to 'platform.c')
-rw-r--r-- | platform.c | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/platform.c b/platform.c index 483170680..2ce4dbf81 100644 --- a/platform.c +++ b/platform.c | |||
@@ -199,19 +199,3 @@ platform_krb5_get_principal_name(const char *pw_name) | |||
199 | return NULL; | 199 | return NULL; |
200 | #endif | 200 | #endif |
201 | } | 201 | } |
202 | |||
203 | /* | ||
204 | * return 1 if the specified uid is a uid that may own a system directory | ||
205 | * otherwise 0. | ||
206 | */ | ||
207 | int | ||
208 | platform_sys_dir_uid(uid_t uid) | ||
209 | { | ||
210 | if (uid == 0) | ||
211 | return 1; | ||
212 | #ifdef PLATFORM_SYS_DIR_UID | ||
213 | if (uid == PLATFORM_SYS_DIR_UID) | ||
214 | return 1; | ||
215 | #endif | ||
216 | return 0; | ||
217 | } | ||