Skip to content

Commit

Permalink
upstream: ssh(1) no longer supports being setuid root. Remove reference
Browse files Browse the repository at this point in the history
to crc32 which went with protocol 1.  Pointed out by deraadt@.

OpenBSD-Commit-ID: f8763c25fd96ed91dd1abdab5667fd2e27e377b6
  • Loading branch information
daztucker authored and djmdjm committed Jul 27, 2018
1 parent 4492e2e commit c12033e
Showing 1 changed file with 2 additions and 8 deletions.
10 changes: 2 additions & 8 deletions OVERVIEW
Expand Up @@ -61,7 +61,7 @@ these programs.
code in packet.c does not concern itself with packet types or their
execution; it contains code to build packets, to receive them and
extract data from them, and the code to compress and/or encrypt
packets. CRC code comes from crc32.c.
packets.

- The code in packet.c calls the buffer manipulation routines
(buffer.c, bufaux.c), compression routines (zlib), and the
Expand Down Expand Up @@ -105,12 +105,6 @@ these programs.
calls client_loop in clientloop.c. This does the real work for
the session.

- The client is suid root. It tries to temporarily give up this
rights while reading the configuration data. The root
privileges are only used to make the connection (from a
privileged socket). Any extra privileges are dropped before
calling ssh_login.

Pseudo-tty manipulation and tty modes

- Code to allocate and use a pseudo tty is in pty.c. Code to
Expand Down Expand Up @@ -164,4 +158,4 @@ these programs.
uidswap.c uid-swapping
xmalloc.c "safe" malloc routines

$OpenBSD: OVERVIEW,v 1.13 2018/07/10 06:45:29 djm Exp $
$OpenBSD: OVERVIEW,v 1.14 2018/07/27 03:55:22 dtucker Exp $

0 comments on commit c12033e

Please sign in to comment.