Date: Sat, 26 Feb 2000 15:55:37 -0800 (PST) From: Kris Kennaway <kris@FreeBSD.org> To: sthaug@nethelp.no Cc: jkh@zippy.cdrom.com, current@FreeBSD.ORG, markm@FreeBSD.ORG Subject: Re: OpenSSH /etc patch Message-ID: <Pine.BSF.4.21.0002261550480.217-100000@freefall.freebsd.org> In-Reply-To: <68686.951563042@verdi.nethelp.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 26 Feb 2000 sthaug@nethelp.no wrote:
> > If you want to tinker with the file permissions, can't you deal with the
> > fact that the startup scripts will create a host key for you the first
> > time you boot with it installed?
>
> As long as there is an easy way of running ssh without any special privs,
> I'm happy.
ssh 'seemed to work' when not setuid. I could log in using RSA
authentication as well as password-based, but didnt try much else.
From /usr/src/crypto/openssh/OVERVIEW:
- The client is suid root. It tries to temporarily give up this
rights while reading the configuration data. The root
privileges are only used to make the connection (from a
privileged socket). Any extra privileges are dropped before
calling ssh_login.
This comment doesn't seem to be completely accurate given what I earlier
posted from the code (it's also used for RSA-rhosts authentication), but
for most purposes you can safely remove the setuid flag.
Kris
----
"How many roads must a man walk down, before you call him a man?"
"Eight!"
"That was a rhetorical question!"
"Oh..then, seven!" -- Homer Simpson
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0002261550480.217-100000>
