Date: Mon, 02 Sep 2013 19:36:57 +0200 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: Slawa Olhovchenkov <slw@zxy.spb.ru> Cc: freebsd-security@FreeBSD.org Subject: Re: OpenSSH, PAM and kerberos Message-ID: <8661uj9lc6.fsf@nine.des.no> In-Reply-To: <20130830131455.GW3796@zxy.spb.ru> (Slawa Olhovchenkov's message of "Fri, 30 Aug 2013 17:14:55 %2B0400") References: <20130829004844.GA70584@zxy.spb.ru> <86d2ovy64p.fsf@nine.des.no> <20130830100926.GU3796@zxy.spb.ru> <20130830103009.GV3796@zxy.spb.ru> <86sixrwdcv.fsf@nine.des.no> <20130830131455.GW3796@zxy.spb.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
Slawa Olhovchenkov <slw@zxy.spb.ru> writes: > Hmmm, now I try to compile sshd with UNSUPPORTED_POSIX_THREADS_HACK and > it works (/tmp/krb5cc_NNNN created, kerberosied login to other host > working w/o entering password).=20 So they didn't break the thread version? You shouldn't use it, though, as the rest of OpenSSH is not thread-safe. The threads are only partially synchronized, and service modules may for instance call getpwent() and thereby clobber global state which OpenSSH relies on. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8661uj9lc6.fsf>