diff options
author | dtucker@openbsd.org <dtucker@openbsd.org> | 2018-07-19 10:28:47 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-07-19 21:44:21 +1000 |
commit | 95d41e90eafcd1286a901e8e361e4a37b98aeb52 (patch) | |
tree | 79c13c35f94c8b199b2f0fcabacd30a1474b955a /readconf.c | |
parent | 258dc8bb07dfb35a46e52b0822a2c5b7027df60a (diff) |
upstream: Deprecate UsePrivilegedPort now that support for running
ssh(1) setuid has been removed, remove supporting code and clean up
references to it in the man pages
We have not shipped ssh(1) the setuid bit since 2002. If ayone
really needs to make connections from a low port number this can
be implemented via a small setuid ProxyCommand.
ok markus@ jmc@ djm@
OpenBSD-Commit-ID: d03364610b7123ae4c6792f5274bd147b6de717e
Diffstat (limited to 'readconf.c')
-rw-r--r-- | readconf.c | 12 |
1 files changed, 2 insertions, 10 deletions
diff --git a/readconf.c b/readconf.c index f40eb3803..ce832526a 100644 --- a/readconf.c +++ b/readconf.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: readconf.c,v 1.293 2018/07/18 11:34:04 dtucker Exp $ */ | 1 | /* $OpenBSD: readconf.c,v 1.294 2018/07/19 10:28:47 dtucker Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -190,6 +190,7 @@ static struct { | |||
190 | { "userknownhostsfile2", oDeprecated }, | 190 | { "userknownhostsfile2", oDeprecated }, |
191 | { "useroaming", oDeprecated }, | 191 | { "useroaming", oDeprecated }, |
192 | { "usersh", oDeprecated }, | 192 | { "usersh", oDeprecated }, |
193 | { "useprivilegedport", oDeprecated }, | ||
193 | 194 | ||
194 | /* Unsupported options */ | 195 | /* Unsupported options */ |
195 | { "afstokenpassing", oUnsupported }, | 196 | { "afstokenpassing", oUnsupported }, |
@@ -222,7 +223,6 @@ static struct { | |||
222 | { "exitonforwardfailure", oExitOnForwardFailure }, | 223 | { "exitonforwardfailure", oExitOnForwardFailure }, |
223 | { "xauthlocation", oXAuthLocation }, | 224 | { "xauthlocation", oXAuthLocation }, |
224 | { "gatewayports", oGatewayPorts }, | 225 | { "gatewayports", oGatewayPorts }, |
225 | { "useprivilegedport", oUsePrivilegedPort }, | ||
226 | { "passwordauthentication", oPasswordAuthentication }, | 226 | { "passwordauthentication", oPasswordAuthentication }, |
227 | { "kbdinteractiveauthentication", oKbdInteractiveAuthentication }, | 227 | { "kbdinteractiveauthentication", oKbdInteractiveAuthentication }, |
228 | { "kbdinteractivedevices", oKbdInteractiveDevices }, | 228 | { "kbdinteractivedevices", oKbdInteractiveDevices }, |
@@ -949,10 +949,6 @@ parse_time: | |||
949 | intptr = &options->exit_on_forward_failure; | 949 | intptr = &options->exit_on_forward_failure; |
950 | goto parse_flag; | 950 | goto parse_flag; |
951 | 951 | ||
952 | case oUsePrivilegedPort: | ||
953 | intptr = &options->use_privileged_port; | ||
954 | goto parse_flag; | ||
955 | |||
956 | case oPasswordAuthentication: | 952 | case oPasswordAuthentication: |
957 | intptr = &options->password_authentication; | 953 | intptr = &options->password_authentication; |
958 | goto parse_flag; | 954 | goto parse_flag; |
@@ -1822,7 +1818,6 @@ initialize_options(Options * options) | |||
1822 | options->fwd_opts.gateway_ports = -1; | 1818 | options->fwd_opts.gateway_ports = -1; |
1823 | options->fwd_opts.streamlocal_bind_mask = (mode_t)-1; | 1819 | options->fwd_opts.streamlocal_bind_mask = (mode_t)-1; |
1824 | options->fwd_opts.streamlocal_bind_unlink = -1; | 1820 | options->fwd_opts.streamlocal_bind_unlink = -1; |
1825 | options->use_privileged_port = -1; | ||
1826 | options->pubkey_authentication = -1; | 1821 | options->pubkey_authentication = -1; |
1827 | options->challenge_response_authentication = -1; | 1822 | options->challenge_response_authentication = -1; |
1828 | options->gss_authentication = -1; | 1823 | options->gss_authentication = -1; |
@@ -1964,8 +1959,6 @@ fill_default_options(Options * options) | |||
1964 | options->fwd_opts.streamlocal_bind_mask = 0177; | 1959 | options->fwd_opts.streamlocal_bind_mask = 0177; |
1965 | if (options->fwd_opts.streamlocal_bind_unlink == -1) | 1960 | if (options->fwd_opts.streamlocal_bind_unlink == -1) |
1966 | options->fwd_opts.streamlocal_bind_unlink = 0; | 1961 | options->fwd_opts.streamlocal_bind_unlink = 0; |
1967 | if (options->use_privileged_port == -1) | ||
1968 | options->use_privileged_port = 0; | ||
1969 | if (options->pubkey_authentication == -1) | 1962 | if (options->pubkey_authentication == -1) |
1970 | options->pubkey_authentication = 1; | 1963 | options->pubkey_authentication = 1; |
1971 | if (options->challenge_response_authentication == -1) | 1964 | if (options->challenge_response_authentication == -1) |
@@ -2599,7 +2592,6 @@ dump_client_config(Options *o, const char *host) | |||
2599 | dump_cfg_fmtint(oStrictHostKeyChecking, o->strict_host_key_checking); | 2592 | dump_cfg_fmtint(oStrictHostKeyChecking, o->strict_host_key_checking); |
2600 | dump_cfg_fmtint(oTCPKeepAlive, o->tcp_keep_alive); | 2593 | dump_cfg_fmtint(oTCPKeepAlive, o->tcp_keep_alive); |
2601 | dump_cfg_fmtint(oTunnel, o->tun_open); | 2594 | dump_cfg_fmtint(oTunnel, o->tun_open); |
2602 | dump_cfg_fmtint(oUsePrivilegedPort, o->use_privileged_port); | ||
2603 | dump_cfg_fmtint(oVerifyHostKeyDNS, o->verify_host_key_dns); | 2595 | dump_cfg_fmtint(oVerifyHostKeyDNS, o->verify_host_key_dns); |
2604 | dump_cfg_fmtint(oVisualHostKey, o->visual_host_key); | 2596 | dump_cfg_fmtint(oVisualHostKey, o->visual_host_key); |
2605 | dump_cfg_fmtint(oUpdateHostkeys, o->update_hostkeys); | 2597 | dump_cfg_fmtint(oUpdateHostkeys, o->update_hostkeys); |