summaryrefslogtreecommitdiff
path: root/servconf.h
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2014-02-09 23:45:24 +0000
committerColin Watson <cjwatson@debian.org>2014-02-09 23:47:26 +0000
commitd62fa90d496ae9532d8c1426b177e12d3c5ac03b (patch)
tree3179fea9631a318c8a0782dedc7cd690f201af69 /servconf.h
parentd26565af8589d88f824b26f31da493f1056efcf4 (diff)
parentb65a0ded7a8cfe7d351e28266d7851216d679e05 (diff)
Drop ssh-vulnkey
Drop ssh-vulnkey and the associated ssh/ssh-add/sshd integration code, leaving only basic configuration file compatibility, since it has been nearly six years since the original vulnerability and this code is not likely to be of much value any more. See https://lists.debian.org/debian-devel/2013/09/msg00240.html for my full reasoning.
Diffstat (limited to 'servconf.h')
-rw-r--r--servconf.h1
1 files changed, 0 insertions, 1 deletions
diff --git a/servconf.h b/servconf.h
index fd72ce2a3..1891a95a1 100644
--- a/servconf.h
+++ b/servconf.h
@@ -121,7 +121,6 @@ typedef struct {
121 int challenge_response_authentication; 121 int challenge_response_authentication;
122 int zero_knowledge_password_authentication; 122 int zero_knowledge_password_authentication;
123 /* If true, permit jpake auth */ 123 /* If true, permit jpake auth */
124 int permit_blacklisted_keys; /* If true, permit */
125 int permit_empty_passwd; /* If false, do not permit empty 124 int permit_empty_passwd; /* If false, do not permit empty
126 * passwords. */ 125 * passwords. */
127 int permit_user_env; /* If true, read ~/.ssh/environment */ 126 int permit_user_env; /* If true, read ~/.ssh/environment */