diff options
-rw-r--r-- | ChangeLog | 7 | ||||
-rw-r--r-- | authfd.c | 8 | ||||
-rw-r--r-- | authfd.h | 3 | ||||
-rw-r--r-- | ssh-add.c | 5 |
4 files changed, 10 insertions, 13 deletions
@@ -60,6 +60,13 @@ | |||
60 | [sftp-server.8] | 60 | [sftp-server.8] |
61 | allow setting an explicit umask on the commandline to override whatever | 61 | allow setting an explicit umask on the commandline to override whatever |
62 | default the user has. bz#1229; ok dtucker@ deraadt@ markus@ | 62 | default the user has. bz#1229; ok dtucker@ deraadt@ markus@ |
63 | - djm@cvs.openbsd.org 2009/08/27 17:44:52 | ||
64 | [authfd.c ssh-add.c authfd.h] | ||
65 | Do not fall back to adding keys without contraints (ssh-add -c / -t ...) | ||
66 | when the agent refuses the constrained add request. This was a useful | ||
67 | migration measure back in 2002 when constraints were new, but just | ||
68 | adds risk now. | ||
69 | bz #1612, report and patch from dkg AT fifthhorseman.net; ok markus@ | ||
63 | 70 | ||
64 | 20091002 | 71 | 20091002 |
65 | - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps. | 72 | - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps. |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: authfd.c,v 1.80 2006/08/03 03:34:41 deraadt Exp $ */ | 1 | /* $OpenBSD: authfd.c,v 1.81 2009/08/27 17:44:52 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -545,12 +545,6 @@ ssh_add_identity_constrained(AuthenticationConnection *auth, Key *key, | |||
545 | return decode_reply(type); | 545 | return decode_reply(type); |
546 | } | 546 | } |
547 | 547 | ||
548 | int | ||
549 | ssh_add_identity(AuthenticationConnection *auth, Key *key, const char *comment) | ||
550 | { | ||
551 | return ssh_add_identity_constrained(auth, key, comment, 0, 0); | ||
552 | } | ||
553 | |||
554 | /* | 548 | /* |
555 | * Removes an identity from the authentication server. This call is not | 549 | * Removes an identity from the authentication server. This call is not |
556 | * meant to be used by normal applications. | 550 | * meant to be used by normal applications. |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: authfd.h,v 1.36 2006/08/03 03:34:41 deraadt Exp $ */ | 1 | /* $OpenBSD: authfd.h,v 1.37 2009/08/27 17:44:52 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 4 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
@@ -75,7 +75,6 @@ void ssh_close_authentication_connection(AuthenticationConnection *); | |||
75 | int ssh_get_num_identities(AuthenticationConnection *, int); | 75 | int ssh_get_num_identities(AuthenticationConnection *, int); |
76 | Key *ssh_get_first_identity(AuthenticationConnection *, char **, int); | 76 | Key *ssh_get_first_identity(AuthenticationConnection *, char **, int); |
77 | Key *ssh_get_next_identity(AuthenticationConnection *, char **, int); | 77 | Key *ssh_get_next_identity(AuthenticationConnection *, char **, int); |
78 | int ssh_add_identity(AuthenticationConnection *, Key *, const char *); | ||
79 | int ssh_add_identity_constrained(AuthenticationConnection *, Key *, | 78 | int ssh_add_identity_constrained(AuthenticationConnection *, Key *, |
80 | const char *, u_int, u_int); | 79 | const char *, u_int, u_int); |
81 | int ssh_remove_identity(AuthenticationConnection *, Key *); | 80 | int ssh_remove_identity(AuthenticationConnection *, Key *); |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-add.c,v 1.90 2007/09/09 11:38:01 sobrado Exp $ */ | 1 | /* $OpenBSD: ssh-add.c,v 1.91 2009/08/27 17:44:52 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -195,9 +195,6 @@ add_file(AuthenticationConnection *ac, const char *filename) | |||
195 | if (confirm != 0) | 195 | if (confirm != 0) |
196 | fprintf(stderr, | 196 | fprintf(stderr, |
197 | "The user has to confirm each use of the key\n"); | 197 | "The user has to confirm each use of the key\n"); |
198 | } else if (ssh_add_identity(ac, private, comment)) { | ||
199 | fprintf(stderr, "Identity added: %s (%s)\n", filename, comment); | ||
200 | ret = 0; | ||
201 | } else { | 198 | } else { |
202 | fprintf(stderr, "Could not add identity: %s\n", filename); | 199 | fprintf(stderr, "Could not add identity: %s\n", filename); |
203 | } | 200 | } |