Displaying 13 results from an estimated 13 matches for "key_perm_ok".
2011 Mar 14
2
[Bug 1878] New: error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
Summary: error message in key_perm_ok should be firmer
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
URL: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug
/663455
OS/Version: All
Status: NEW
Severity: minor
Priority...
2015 Mar 26
0
[Bug 1878] error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|CLOSED |REOPENED
CC| |jjelen at redhat.com
Resolution|FIXED
2015 Mar 26
0
[Bug 1878] error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
--- Comment #4 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 2576
--> https://bugzilla.mindrot.org/attachment.cgi?id=2576&action=edit
upstream patch
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
2015 Apr 17
0
[Bug 1878] error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|REOPENED |RESOLVED
Resolution|--- |FIXED
--- Comment #5 from Damien Miller <djm at
2015 Aug 11
0
[Bug 1878] error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #6 from Damien Miller <djm at mindrot.org> ---
Set all RESOLVED bugs to CLOSED with release
2003 Nov 27
2
Question about adding another parameter for OpenSSH
...ese, so that standard
behavior of ssh is not changed, but when option GroupPrivateKey is used
with ssh, it is allowed to have group readable private key?
Thank you very much.
--- authfile.c.orig Thu Nov 27 15:01:01 2003
+++ authfile.c Thu Nov 27 16:50:39 2003
@@ -496,7 +496,7 @@
}
static int
-key_perm_ok(int fd, const char *filename)
+key_perm_ok(int fd, const char *filename, int group_private_key)
{
struct stat st;
@@ -510,7 +510,10 @@
#ifdef HAVE_CYGWIN
if (check_ntsec(filename))
#endif
- if ((st.st_uid == getuid()) && (st.st_mode & 077) != 0) {
+ if ((!group_private_key
+...
2001 Sep 28
1
openssh-2.9.9p2 assumes pid_t, uid_t, etc. are not 'long'
...time on this host, as long and int are the same
width, but it is a problem on other hosts where pid_t is wider than
int. E.g., I've heard that 64-bit AIX has 64-bit pid_t in some
compilation environments.
Here is a patch.
2001-09-28 Paul Eggert <eggert at twinsun.com>
* authfile.c (key_perm_ok):
Work even if system integer types are 'long', not 'int'.
* entropy.c (prng_check_seedfile, prng_write_seedfile,
prng_read_seedfile): Likewise.
* serverloop.c (server_loop, server_loop2): Likewise.
* session.c (session_dump, session_by_pid,
session_exit_mess...
2015 Mar 26
0
[Bug 1845] Bugs intended to be fixed in 5.9
https://bugzilla.mindrot.org/show_bug.cgi?id=1845
Bug 1845 depends on bug 1878, which changed state.
Bug 1878 Summary: error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
What |Removed |Added
----------------------------------------------------------------------------
Status|CLOSED |REOPENED
Resolution|FIXED...
2015 Apr 17
0
[Bug 1845] Bugs intended to be fixed in 5.9
https://bugzilla.mindrot.org/show_bug.cgi?id=1845
Bug 1845 depends on bug 1878, which changed state.
Bug 1878 Summary: error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
What |Removed |Added
----------------------------------------------------------------------------
Status|REOPENED |RESOLVED
Resolution|---...
2004 Mar 30
1
[Bug 565] gcc 3.2.3 compiler warnings for openssh-3.6.1p2 on Solaris 7
...------- Additional Comments From dtucker at zip.com.au 2004-03-30 14:54 -------
(From update of attachment 337)
I re-tested -current (post-3.8p1) on Solaris 2.5.1 w/gcc 3.3.1.
>authfd.c:95: warning: implicit declaration of function `strlcpy'
These are gone.
>authfile.c: In function `key_perm_ok':
>authfile.c:517: warning: unsigned int format, long unsigned int arg (arg 2)
Gone too.
>canohost.c:96: warning: subscript has type `char'
Most of these are still there.
>channels.c:1199: warning: passing arg 4 of `getsockopt' from incompatible pointer type
>channels.c:20...
2001 May 04
1
RSARhosts / Hostbased auth and euid=0 requirement
...low ssh to read alternate key files.
This would allow the ssh client to use keyfiles different from the ones
sshd uses. I know that this can be done now by changing the ones sshd uses,
but I'd rather make ssh the special case.
- Allow said key files to be group readable
Changing authfile.c:key_perm_ok() to allow group readable keys would allow
us to make ssh setgid instead of setuid. Yes, this is insecure if someone
is stupid enough to export their key files via NFS or some other such
sillyness, but is safe for sane admins.
If we do both of the above, ssh can be setgid ssh, and optionally us...
2010 Jan 12
1
[patch] Make keys work again
...evision 1.78
diff -u -N -p authfile.c
--- authfile.c 11 Jan 2010 04:46:45 -0000 1.78
+++ authfile.c 11 Jan 2010 22:35:04 -0000
@@ -552,8 +552,8 @@ key_load_private_type(int type, const char
*filename,
strerror(errno));
if (perm_ok != NULL)
*perm_ok = 0;
- }
return NULL;
+ }
if (!key_perm_ok(fd, filename)) {
if (perm_ok != NULL)
*perm_ok = 0;
2010 Jan 12
2
[patch] Automatically add keys to agent
My keys are secured with a passphrase. That's good for security, but
having to type the passphrase either at every login or at every
invocation of ssh(1) is annoying.
I know I could invoke ssh-add(1) just before invoking ssh(1), if I keep
track of whether I invoked it already, or write some hacky scripts; but
the rest of OpenSSH is wonderfully usable without any hacks.
Hence, this patch.