summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog5
-rw-r--r--README.privsep21
2 files changed, 14 insertions, 12 deletions
diff --git a/ChangeLog b/ChangeLog
index 9c8cafe94..a88e338cc 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,6 @@
120020622
2 - (djm) Update README.privsep; spotted by fries@
3
120020621 420020621
2 - (djm) Sync: 5 - (djm) Sync:
3 - djm@cvs.openbsd.org 2002/06/21 05:50:51 6 - djm@cvs.openbsd.org 2002/06/21 05:50:51
@@ -1000,4 +1003,4 @@
1000 - (stevesk) entropy.c: typo in debug message 1003 - (stevesk) entropy.c: typo in debug message
1001 - (djm) ssh-keygen -i needs seeded RNG; report from markus@ 1004 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
1002 1005
1003$Id: ChangeLog,v 1.2238 2002/06/21 06:42:41 djm Exp $ 1006$Id: ChangeLog,v 1.2239 2002/06/21 14:45:50 djm Exp $
diff --git a/README.privsep b/README.privsep
index 89b9d0457..79ea62783 100644
--- a/README.privsep
+++ b/README.privsep
@@ -1,13 +1,12 @@
1Privilege separation, or privsep, is an experimental feature in 1Privilege separation, or privsep, is method in OpenSSH by which
2OpenSSH in which operations that require root privilege are performed 2operations that require root privilege are performed by a separate
3by a separate privileged monitor process. Its purpose is to prevent 3privileged monitor process. Its purpose is to prevent privilege
4privilege escalation by containing corruption to an unprivileged 4escalation by containing corruption to an unprivileged process.
5process. More information is available at: 5More information is available at:
6 http://www.citi.umich.edu/u/provos/ssh/privsep.html 6 http://www.citi.umich.edu/u/provos/ssh/privsep.html
7 7
8Privilege separation is not enabled by default, and may be enabled by 8Privilege separation is now enabled by default; see the
9specifying "UsePrivilegeSeparation yes" in sshd_config; see the 9UsePrivilegeSeparation option in sshd_config(5).
10UsePrivilegeSeparation option in sshd(8).
11 10
12When privsep is enabled, the pre-authentication sshd process will 11When privsep is enabled, the pre-authentication sshd process will
13chroot(2) to "/var/empty" and change its privileges to the "sshd" user 12chroot(2) to "/var/empty" and change its privileges to the "sshd" user
@@ -34,8 +33,8 @@ privsep user and chroot directory:
34Privsep requires operating system support for file descriptor passing 33Privsep requires operating system support for file descriptor passing
35and mmap(MAP_ANON). 34and mmap(MAP_ANON).
36 35
37PAM-enabled OpenSSH is known to function with privsep on Linux and 36PAM-enabled OpenSSH is known to function with privsep on Linux.
38Solaris 8. It does not function on HP-UX with a trusted system 37It does not function on HP-UX with a trusted system
39configuration. PAMAuthenticationViaKbdInt does not function with 38configuration. PAMAuthenticationViaKbdInt does not function with
40privsep. 39privsep.
41 40
@@ -54,4 +53,4 @@ process 1005 is the sshd process listening for new connections.
54process 6917 is the privileged monitor process, 6919 is the user owned 53process 6917 is the privileged monitor process, 6919 is the user owned
55sshd process and 6921 is the shell process. 54sshd process and 6921 is the shell process.
56 55
57$Id: README.privsep,v 1.5 2002/05/22 01:02:15 djm Exp $ 56$Id: README.privsep,v 1.6 2002/06/21 14:45:50 djm Exp $