summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog7
-rw-r--r--authfd.c8
-rw-r--r--authfd.h3
-rw-r--r--ssh-add.c5
4 files changed, 10 insertions, 13 deletions
diff --git a/ChangeLog b/ChangeLog
index 183733fcb..971225fa8 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -60,6 +60,13 @@
60 [sftp-server.8] 60 [sftp-server.8]
61 allow setting an explicit umask on the commandline to override whatever 61 allow setting an explicit umask on the commandline to override whatever
62 default the user has. bz#1229; ok dtucker@ deraadt@ markus@ 62 default the user has. bz#1229; ok dtucker@ deraadt@ markus@
63 - djm@cvs.openbsd.org 2009/08/27 17:44:52
64 [authfd.c ssh-add.c authfd.h]
65 Do not fall back to adding keys without contraints (ssh-add -c / -t ...)
66 when the agent refuses the constrained add request. This was a useful
67 migration measure back in 2002 when constraints were new, but just
68 adds risk now.
69 bz #1612, report and patch from dkg AT fifthhorseman.net; ok markus@
63 70
6420091002 7120091002
65 - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps. 72 - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps.
diff --git a/authfd.c b/authfd.c
index 61faad123..78a53c7a6 100644
--- a/authfd.c
+++ b/authfd.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: authfd.c,v 1.80 2006/08/03 03:34:41 deraadt Exp $ */ 1/* $OpenBSD: authfd.c,v 1.81 2009/08/27 17:44:52 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -545,12 +545,6 @@ ssh_add_identity_constrained(AuthenticationConnection *auth, Key *key,
545 return decode_reply(type); 545 return decode_reply(type);
546} 546}
547 547
548int
549ssh_add_identity(AuthenticationConnection *auth, Key *key, const char *comment)
550{
551 return ssh_add_identity_constrained(auth, key, comment, 0, 0);
552}
553
554/* 548/*
555 * Removes an identity from the authentication server. This call is not 549 * Removes an identity from the authentication server. This call is not
556 * meant to be used by normal applications. 550 * meant to be used by normal applications.
diff --git a/authfd.h b/authfd.h
index 3da256112..2582a27aa 100644
--- a/authfd.h
+++ b/authfd.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: authfd.h,v 1.36 2006/08/03 03:34:41 deraadt Exp $ */ 1/* $OpenBSD: authfd.h,v 1.37 2009/08/27 17:44:52 djm Exp $ */
2 2
3/* 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi> 4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -75,7 +75,6 @@ void ssh_close_authentication_connection(AuthenticationConnection *);
75int ssh_get_num_identities(AuthenticationConnection *, int); 75int ssh_get_num_identities(AuthenticationConnection *, int);
76Key *ssh_get_first_identity(AuthenticationConnection *, char **, int); 76Key *ssh_get_first_identity(AuthenticationConnection *, char **, int);
77Key *ssh_get_next_identity(AuthenticationConnection *, char **, int); 77Key *ssh_get_next_identity(AuthenticationConnection *, char **, int);
78int ssh_add_identity(AuthenticationConnection *, Key *, const char *);
79int ssh_add_identity_constrained(AuthenticationConnection *, Key *, 78int ssh_add_identity_constrained(AuthenticationConnection *, Key *,
80 const char *, u_int, u_int); 79 const char *, u_int, u_int);
81int ssh_remove_identity(AuthenticationConnection *, Key *); 80int ssh_remove_identity(AuthenticationConnection *, Key *);
diff --git a/ssh-add.c b/ssh-add.c
index 7a43282f2..084478d78 100644
--- a/ssh-add.c
+++ b/ssh-add.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh-add.c,v 1.90 2007/09/09 11:38:01 sobrado Exp $ */ 1/* $OpenBSD: ssh-add.c,v 1.91 2009/08/27 17:44:52 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -195,9 +195,6 @@ add_file(AuthenticationConnection *ac, const char *filename)
195 if (confirm != 0) 195 if (confirm != 0)
196 fprintf(stderr, 196 fprintf(stderr,
197 "The user has to confirm each use of the key\n"); 197 "The user has to confirm each use of the key\n");
198 } else if (ssh_add_identity(ac, private, comment)) {
199 fprintf(stderr, "Identity added: %s (%s)\n", filename, comment);
200 ret = 0;
201 } else { 198 } else {
202 fprintf(stderr, "Could not add identity: %s\n", filename); 199 fprintf(stderr, "Could not add identity: %s\n", filename);
203 } 200 }