diff options
author | dtucker@openbsd.org <dtucker@openbsd.org> | 2018-07-19 10:28:47 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-07-19 21:44:21 +1000 |
commit | 95d41e90eafcd1286a901e8e361e4a37b98aeb52 (patch) | |
tree | 79c13c35f94c8b199b2f0fcabacd30a1474b955a /ssh.c | |
parent | 258dc8bb07dfb35a46e52b0822a2c5b7027df60a (diff) |
upstream: Deprecate UsePrivilegedPort now that support for running
ssh(1) setuid has been removed, remove supporting code and clean up
references to it in the man pages
We have not shipped ssh(1) the setuid bit since 2002. If ayone
really needs to make connections from a low port number this can
be implemented via a small setuid ProxyCommand.
ok markus@ jmc@ djm@
OpenBSD-Commit-ID: d03364610b7123ae4c6792f5274bd147b6de717e
Diffstat (limited to 'ssh.c')
-rw-r--r-- | ssh.c | 10 |
1 files changed, 2 insertions, 8 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh.c,v 1.487 2018/07/18 11:34:04 dtucker Exp $ */ | 1 | /* $OpenBSD: ssh.c,v 1.488 2018/07/19 10:28:47 dtucker Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -733,7 +733,6 @@ main(int ac, char **av) | |||
733 | fatal("Invalid multiplex command."); | 733 | fatal("Invalid multiplex command."); |
734 | break; | 734 | break; |
735 | case 'P': /* deprecated */ | 735 | case 'P': /* deprecated */ |
736 | options.use_privileged_port = 0; | ||
737 | break; | 736 | break; |
738 | case 'Q': | 737 | case 'Q': |
739 | cp = NULL; | 738 | cp = NULL; |
@@ -1236,10 +1235,6 @@ main(int ac, char **av) | |||
1236 | } | 1235 | } |
1237 | if (options.connection_attempts <= 0) | 1236 | if (options.connection_attempts <= 0) |
1238 | fatal("Invalid number of ConnectionAttempts"); | 1237 | fatal("Invalid number of ConnectionAttempts"); |
1239 | #ifndef HAVE_CYGWIN | ||
1240 | if (original_effective_uid != 0) | ||
1241 | options.use_privileged_port = 0; | ||
1242 | #endif | ||
1243 | 1238 | ||
1244 | if (sshbuf_len(command) != 0 && options.remote_command != NULL) | 1239 | if (sshbuf_len(command) != 0 && options.remote_command != NULL) |
1245 | fatal("Cannot execute command-line and remote command."); | 1240 | fatal("Cannot execute command-line and remote command."); |
@@ -1376,8 +1371,7 @@ main(int ac, char **av) | |||
1376 | /* Open a connection to the remote host. */ | 1371 | /* Open a connection to the remote host. */ |
1377 | if (ssh_connect(ssh, host, addrs, &hostaddr, options.port, | 1372 | if (ssh_connect(ssh, host, addrs, &hostaddr, options.port, |
1378 | options.address_family, options.connection_attempts, | 1373 | options.address_family, options.connection_attempts, |
1379 | &timeout_ms, options.tcp_keep_alive, | 1374 | &timeout_ms, options.tcp_keep_alive) != 0) |
1380 | options.use_privileged_port) != 0) | ||
1381 | exit(255); | 1375 | exit(255); |
1382 | 1376 | ||
1383 | if (addrs != NULL) | 1377 | if (addrs != NULL) |