summaryrefslogtreecommitdiff
path: root/readconf.c
diff options
context:
space:
mode:
authordtucker@openbsd.org <dtucker@openbsd.org>2018-07-19 10:28:47 +0000
committerDamien Miller <djm@mindrot.org>2018-07-19 21:44:21 +1000
commit95d41e90eafcd1286a901e8e361e4a37b98aeb52 (patch)
tree79c13c35f94c8b199b2f0fcabacd30a1474b955a /readconf.c
parent258dc8bb07dfb35a46e52b0822a2c5b7027df60a (diff)
upstream: Deprecate UsePrivilegedPort now that support for running
ssh(1) setuid has been removed, remove supporting code and clean up references to it in the man pages We have not shipped ssh(1) the setuid bit since 2002. If ayone really needs to make connections from a low port number this can be implemented via a small setuid ProxyCommand. ok markus@ jmc@ djm@ OpenBSD-Commit-ID: d03364610b7123ae4c6792f5274bd147b6de717e
Diffstat (limited to 'readconf.c')
-rw-r--r--readconf.c12
1 files changed, 2 insertions, 10 deletions
diff --git a/readconf.c b/readconf.c
index f40eb3803..ce832526a 100644
--- a/readconf.c
+++ b/readconf.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: readconf.c,v 1.293 2018/07/18 11:34:04 dtucker Exp $ */ 1/* $OpenBSD: readconf.c,v 1.294 2018/07/19 10:28:47 dtucker Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -190,6 +190,7 @@ static struct {
190 { "userknownhostsfile2", oDeprecated }, 190 { "userknownhostsfile2", oDeprecated },
191 { "useroaming", oDeprecated }, 191 { "useroaming", oDeprecated },
192 { "usersh", oDeprecated }, 192 { "usersh", oDeprecated },
193 { "useprivilegedport", oDeprecated },
193 194
194 /* Unsupported options */ 195 /* Unsupported options */
195 { "afstokenpassing", oUnsupported }, 196 { "afstokenpassing", oUnsupported },
@@ -222,7 +223,6 @@ static struct {
222 { "exitonforwardfailure", oExitOnForwardFailure }, 223 { "exitonforwardfailure", oExitOnForwardFailure },
223 { "xauthlocation", oXAuthLocation }, 224 { "xauthlocation", oXAuthLocation },
224 { "gatewayports", oGatewayPorts }, 225 { "gatewayports", oGatewayPorts },
225 { "useprivilegedport", oUsePrivilegedPort },
226 { "passwordauthentication", oPasswordAuthentication }, 226 { "passwordauthentication", oPasswordAuthentication },
227 { "kbdinteractiveauthentication", oKbdInteractiveAuthentication }, 227 { "kbdinteractiveauthentication", oKbdInteractiveAuthentication },
228 { "kbdinteractivedevices", oKbdInteractiveDevices }, 228 { "kbdinteractivedevices", oKbdInteractiveDevices },
@@ -949,10 +949,6 @@ parse_time:
949 intptr = &options->exit_on_forward_failure; 949 intptr = &options->exit_on_forward_failure;
950 goto parse_flag; 950 goto parse_flag;
951 951
952 case oUsePrivilegedPort:
953 intptr = &options->use_privileged_port;
954 goto parse_flag;
955
956 case oPasswordAuthentication: 952 case oPasswordAuthentication:
957 intptr = &options->password_authentication; 953 intptr = &options->password_authentication;
958 goto parse_flag; 954 goto parse_flag;
@@ -1822,7 +1818,6 @@ initialize_options(Options * options)
1822 options->fwd_opts.gateway_ports = -1; 1818 options->fwd_opts.gateway_ports = -1;
1823 options->fwd_opts.streamlocal_bind_mask = (mode_t)-1; 1819 options->fwd_opts.streamlocal_bind_mask = (mode_t)-1;
1824 options->fwd_opts.streamlocal_bind_unlink = -1; 1820 options->fwd_opts.streamlocal_bind_unlink = -1;
1825 options->use_privileged_port = -1;
1826 options->pubkey_authentication = -1; 1821 options->pubkey_authentication = -1;
1827 options->challenge_response_authentication = -1; 1822 options->challenge_response_authentication = -1;
1828 options->gss_authentication = -1; 1823 options->gss_authentication = -1;
@@ -1964,8 +1959,6 @@ fill_default_options(Options * options)
1964 options->fwd_opts.streamlocal_bind_mask = 0177; 1959 options->fwd_opts.streamlocal_bind_mask = 0177;
1965 if (options->fwd_opts.streamlocal_bind_unlink == -1) 1960 if (options->fwd_opts.streamlocal_bind_unlink == -1)
1966 options->fwd_opts.streamlocal_bind_unlink = 0; 1961 options->fwd_opts.streamlocal_bind_unlink = 0;
1967 if (options->use_privileged_port == -1)
1968 options->use_privileged_port = 0;
1969 if (options->pubkey_authentication == -1) 1962 if (options->pubkey_authentication == -1)
1970 options->pubkey_authentication = 1; 1963 options->pubkey_authentication = 1;
1971 if (options->challenge_response_authentication == -1) 1964 if (options->challenge_response_authentication == -1)
@@ -2599,7 +2592,6 @@ dump_client_config(Options *o, const char *host)
2599 dump_cfg_fmtint(oStrictHostKeyChecking, o->strict_host_key_checking); 2592 dump_cfg_fmtint(oStrictHostKeyChecking, o->strict_host_key_checking);
2600 dump_cfg_fmtint(oTCPKeepAlive, o->tcp_keep_alive); 2593 dump_cfg_fmtint(oTCPKeepAlive, o->tcp_keep_alive);
2601 dump_cfg_fmtint(oTunnel, o->tun_open); 2594 dump_cfg_fmtint(oTunnel, o->tun_open);
2602 dump_cfg_fmtint(oUsePrivilegedPort, o->use_privileged_port);
2603 dump_cfg_fmtint(oVerifyHostKeyDNS, o->verify_host_key_dns); 2595 dump_cfg_fmtint(oVerifyHostKeyDNS, o->verify_host_key_dns);
2604 dump_cfg_fmtint(oVisualHostKey, o->visual_host_key); 2596 dump_cfg_fmtint(oVisualHostKey, o->visual_host_key);
2605 dump_cfg_fmtint(oUpdateHostkeys, o->update_hostkeys); 2597 dump_cfg_fmtint(oUpdateHostkeys, o->update_hostkeys);