diff options
author | dtucker@openbsd.org <dtucker@openbsd.org> | 2018-07-27 03:55:22 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-07-27 15:09:59 +1000 |
commit | c12033e102760d043bc5c98e6c8180e4d331b0df (patch) | |
tree | 78558de8ce4d4c884c68dd8f7381d971590f5ad4 | |
parent | 4492e2ec4e1956a277ef507f51d66e5c2aafaaf8 (diff) |
upstream: ssh(1) no longer supports being setuid root. Remove reference
to crc32 which went with protocol 1. Pointed out by deraadt@.
OpenBSD-Commit-ID: f8763c25fd96ed91dd1abdab5667fd2e27e377b6
-rw-r--r-- | OVERVIEW | 10 |
1 files changed, 2 insertions, 8 deletions
@@ -61,7 +61,7 @@ these programs. code in packet.c does not concern itself with packet types or their execution; it contains code to build packets, to receive them and extract data from them, and the code to compress and/or encrypt - packets. CRC code comes from crc32.c. + packets. - The code in packet.c calls the buffer manipulation routines (buffer.c, bufaux.c), compression routines (zlib), and the @@ -105,12 +105,6 @@ these programs. calls client_loop in clientloop.c. This does the real work for the session. - - The client is suid root. It tries to temporarily give up this - rights while reading the configuration data. The root - privileges are only used to make the connection (from a - privileged socket). Any extra privileges are dropped before - calling ssh_login. - Pseudo-tty manipulation and tty modes - Code to allocate and use a pseudo tty is in pty.c. Code to @@ -164,4 +158,4 @@ these programs. uidswap.c uid-swapping xmalloc.c "safe" malloc routines -$OpenBSD: OVERVIEW,v 1.13 2018/07/10 06:45:29 djm Exp $ +$OpenBSD: OVERVIEW,v 1.14 2018/07/27 03:55:22 dtucker Exp $ |