summaryrefslogtreecommitdiff
path: root/servconf.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2002-03-22 03:11:49 +0000
committerBen Lindstrom <mouring@eviladmin.org>2002-03-22 03:11:49 +0000
commitc7431341911e911993776c357ca57d1fb7ed1b23 (patch)
tree3e7fec3c3985b8f7584b4a03ce7df035d361c442 /servconf.c
parentf34e4eb6c730fa38640aeef5f6801035caaba460 (diff)
downloadopenssh-git-c7431341911e911993776c357ca57d1fb7ed1b23.tar.gz
- stevesk@cvs.openbsd.org 2002/03/20 19:12:25
[servconf.c servconf.h ssh.h sshd.c] for unprivileged user, group do: pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
Diffstat (limited to 'servconf.c')
-rw-r--r--servconf.c21
1 files changed, 2 insertions, 19 deletions
diff --git a/servconf.c b/servconf.c
index 08585490..8e6ee5bb 100644
--- a/servconf.c
+++ b/servconf.c
@@ -10,7 +10,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: servconf.c,v 1.104 2002/03/19 03:03:43 stevesk Exp $");
+RCSID("$OpenBSD: servconf.c,v 1.105 2002/03/20 19:12:24 stevesk Exp $");
#if defined(KRB4) || defined(KRB5)
#include <krb.h>
@@ -113,9 +113,6 @@ initialize_server_options(ServerOptions *options)
options->authorized_keys_file = NULL;
options->authorized_keys_file2 = NULL;
- options->unprivileged_user = -1;
- options->unprivileged_group = -1;
-
/* Needs to be accessable in many places */
use_privsep = -1;
}
@@ -247,10 +244,6 @@ fill_default_server_options(ServerOptions *options)
/* Turn privilege separation _off_ by default */
if (use_privsep == -1)
use_privsep = 0;
- if (options->unprivileged_user == -1)
- options->unprivileged_user = 32767;
- if (options->unprivileged_group == -1)
- options->unprivileged_group = 32767;
}
/* Keyword tokens. */
@@ -283,7 +276,7 @@ typedef enum {
sBanner, sVerifyReverseMapping, sHostbasedAuthentication,
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval,
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
- sUsePrivilegeSeparation, sUnprivUser, sUnprivGroup,
+ sUsePrivilegeSeparation,
sDeprecated
} ServerOpCodes;
@@ -360,8 +353,6 @@ static struct {
{ "authorizedkeysfile", sAuthorizedKeysFile },
{ "authorizedkeysfile2", sAuthorizedKeysFile2 },
{ "useprivilegeseparation", sUsePrivilegeSeparation},
- { "unprivuser", sUnprivUser},
- { "unprivgroup", sUnprivGroup},
{ NULL, sBadOption }
};
@@ -742,14 +733,6 @@ parse_flag:
intptr = &use_privsep;
goto parse_flag;
- case sUnprivUser:
- intptr = &options->unprivileged_user;
- goto parse_int;
-
- case sUnprivGroup:
- intptr = &options->unprivileged_group;
- goto parse_int;
-
case sAllowUsers:
while ((arg = strdelim(&cp)) && *arg != '\0') {
if (options->num_allow_users >= MAX_ALLOW_USERS)