Displaying 3 results from an estimated 3 matches for "privsep_pw".
2006 Oct 27
1
Requirement for sshd account since 4.4p1
...art a private sshd which allows to logon with their own
account.
Looking into the source code it looks like this patch was never meant
to be something other than temporary:
struct passwd *
fakepw(void)
{
[...]
fake.pw_uid = (uid_t)-1;
fake.pw_gid = (gid_t)-1;
fake.pw_uid = privsep_pw->pw_uid;
fake.pw_gid = privsep_pw->pw_gid;
So my question, are there plans to get this working as before at least
for non-Solaris users?
Thanks,
Corinna
--
Corinna Vinschen
Cygwin Project Co-Leader
Red Hat
2017 Mar 20
12
Announce: OpenSSH 7.5 released
OpenSSH 7.5 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
Once again, we would like to thank the OpenSSH community
2017 Mar 27
2
Is support being removed for ordinary users to run sshd?
...= cut after ===
> > diff --git a/sshd.c b/sshd.c
> > index 010a2c3..4f9b2c8 100644
> > --- a/sshd.c
> > +++ b/sshd.c
> > @@ -1641,7 +1641,8 @@ main(int ac, char **av)
> >
> > /* Store privilege separation user for later use if required. */
> > if ((privsep_pw = getpwnam(SSH_PRIVSEP_USER)) == NULL) {
> > - if (use_privsep || options.kerberos_authentication)
> > + if ((use_privsep || options.kerberos_authentication)
> > + && (getuid() == 0 || geteuid() == 0))
> > fatal("Privilege separation user %s does not e...