search for: _path_privsep_chroot_dir

Displaying 6 results from an estimated 6 matches for "_path_privsep_chroot_dir".

2002 Jun 26
5
[PATCH] improved chroot handling
...-r1.1.1.1 pathnames.h --- pathnames.h 24 Jun 2002 22:46:13 -0000 1.1.1.1 +++ pathnames.h 26 Jun 2002 17:58:59 -0000 @@ -145,11 +145,6 @@ #define _PATH_SFTP_SERVER "/usr/libexec/sftp-server" #endif -/* chroot directory for unprivileged user when UsePrivilegeSeparation=yes */ -#ifndef _PATH_PRIVSEP_CHROOT_DIR -#define _PATH_PRIVSEP_CHROOT_DIR "/var/empty" -#endif - #ifndef _PATH_LS #define _PATH_LS "ls" #endif Index: sshd.c =================================================================== RCS file: /home/ncvs/src/crypto/openssh-portable/sshd.c,v retrieving revision 1.1.1.1 dif...
2002 Jun 26
3
OpenSSH 3.4 released
OpenSSH 3.4 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement. Changes since OpenSSH 3.3: ============================
2002 Jun 25
3
BSD/OS with privsep
I need this for BSD/OS 4.2 + privsep perhaps we should not call do_setusercontext() after chroot(). --- sshd.c.orig Fri Jun 21 03:09:47 2002 +++ sshd.c Tue Jun 25 13:11:03 2002 @@ -548,21 +548,35 @@ /* Change our root directory*/ if (chroot(_PATH_PRIVSEP_CHROOT_DIR) == -1) fatal("chroot(\"%s\"): %s", _PATH_PRIVSEP_CHROOT_DIR, strerror(errno)); if (chdir("/") == -1) fatal("chdir(\"/\"): %s", strerror(errno)); /* Drop our privileges */ debug3("privsep user:group %u:%u", (u_int)pw-&...
2017 Mar 20
12
Announce: OpenSSH 7.5 released
OpenSSH 7.5 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. OpenSSH also includes transitional support for the legacy SSH 1.3 and 1.5 protocols that may be enabled at compile-time. Once again, we would like to thank the OpenSSH community
2017 Mar 27
2
Is support being removed for ordinary users to run sshd?
...> > } else { > > @@ -1767,7 +1768,7 @@ main(int ac, char **av) > > key_type(key)); > > } > > > > - if (use_privsep) { > > + if (use_privsep && (getuid() == 0 || geteuid() == 0)) { > > struct stat st; > > > > if ((stat(_PATH_PRIVSEP_CHROOT_DIR, &st) == -1) || > > === cut before === > > > > Best regards, > > > > -- Lionel > > ----- End forwarded message ----- > > > > Is there a chance this could be reenabled again? > > > > > > Thanks, > > Corinna __________...
2003 Oct 28
2
Privilege separation
...E_PRIVSEP */ static char * list_hostkey_types(void) @@ -1034,6 +1038,7 @@ } } +#ifndef DISABLE_PRIVSEP if (use_privsep) { struct passwd *pw; struct stat st; @@ -1056,6 +1061,7 @@ fatal("%s must be owned by root and not group or " "world-writable.", _PATH_PRIVSEP_CHROOT_DIR); } +#endif /* DISABLE_PRIVSEP */ /* Configuration looks good, so exit if in test mode. */ if (test_flag) @@ -1468,9 +1474,11 @@ /* prepare buffers to collect authentication messages */ buffer_init(&loginmsg); +#ifndef DISABLE_PRIVSEP if (use_privsep) if ((authctxt = p...