diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2002-03-22 03:11:49 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2002-03-22 03:11:49 +0000 |
commit | c7431341911e911993776c357ca57d1fb7ed1b23 (patch) | |
tree | 3e7fec3c3985b8f7584b4a03ce7df035d361c442 /servconf.c | |
parent | f34e4eb6c730fa38640aeef5f6801035caaba460 (diff) | |
download | openssh-git-c7431341911e911993776c357ca57d1fb7ed1b23.tar.gz |
- stevesk@cvs.openbsd.org 2002/03/20 19:12:25
[servconf.c servconf.h ssh.h sshd.c]
for unprivileged user, group do:
pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
Diffstat (limited to 'servconf.c')
-rw-r--r-- | servconf.c | 21 |
1 files changed, 2 insertions, 19 deletions
@@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: servconf.c,v 1.104 2002/03/19 03:03:43 stevesk Exp $"); +RCSID("$OpenBSD: servconf.c,v 1.105 2002/03/20 19:12:24 stevesk Exp $"); #if defined(KRB4) || defined(KRB5) #include <krb.h> @@ -113,9 +113,6 @@ initialize_server_options(ServerOptions *options) options->authorized_keys_file = NULL; options->authorized_keys_file2 = NULL; - options->unprivileged_user = -1; - options->unprivileged_group = -1; - /* Needs to be accessable in many places */ use_privsep = -1; } @@ -247,10 +244,6 @@ fill_default_server_options(ServerOptions *options) /* Turn privilege separation _off_ by default */ if (use_privsep == -1) use_privsep = 0; - if (options->unprivileged_user == -1) - options->unprivileged_user = 32767; - if (options->unprivileged_group == -1) - options->unprivileged_group = 32767; } /* Keyword tokens. */ @@ -283,7 +276,7 @@ typedef enum { sBanner, sVerifyReverseMapping, sHostbasedAuthentication, sHostbasedUsesNameFromPacketOnly, sClientAliveInterval, sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2, - sUsePrivilegeSeparation, sUnprivUser, sUnprivGroup, + sUsePrivilegeSeparation, sDeprecated } ServerOpCodes; @@ -360,8 +353,6 @@ static struct { { "authorizedkeysfile", sAuthorizedKeysFile }, { "authorizedkeysfile2", sAuthorizedKeysFile2 }, { "useprivilegeseparation", sUsePrivilegeSeparation}, - { "unprivuser", sUnprivUser}, - { "unprivgroup", sUnprivGroup}, { NULL, sBadOption } }; @@ -742,14 +733,6 @@ parse_flag: intptr = &use_privsep; goto parse_flag; - case sUnprivUser: - intptr = &options->unprivileged_user; - goto parse_int; - - case sUnprivGroup: - intptr = &options->unprivileged_group; - goto parse_int; - case sAllowUsers: while ((arg = strdelim(&cp)) && *arg != '\0') { if (options->num_allow_users >= MAX_ALLOW_USERS) |