Bugzilla – Attachment 485 Details for
Bug 745
agent-ptrace.sh fails
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
Set sgid bit on ssh-agent and fix agent test
openssh-agent-ptrace.patch (text/plain), 6.08 KB, created by
Darren Tucker
on 2003-10-18 19:26:57 AEST
(
hide
)
Description:
Set sgid bit on ssh-agent and fix agent test
Filename:
MIME Type:
Creator:
Darren Tucker
Created:
2003-10-18 19:26:57 AEST
Size:
6.08 KB
patch
obsolete
>Index: ssh_config >=================================================================== >RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/ssh_config,v >retrieving revision 1.21 >diff -u -p -r1.21 ssh_config >--- ssh_config 13 Aug 2003 10:37:05 -0000 1.21 >+++ ssh_config 18 Oct 2003 09:23:26 -0000 >@@ -1,37 +1,18 @@ >-# $OpenBSD: ssh_config,v 1.19 2003/08/13 08:46:31 markus Exp $ >- >-# This is the ssh client system-wide configuration file. See >-# ssh_config(5) for more information. This file provides defaults for >-# users, and the values can be changed in per-user configuration files >-# or on the command line. >- >-# Configuration data is parsed as follows: >-# 1. command line options >-# 2. user-specific file >-# 3. system-wide file >-# Any configuration value is only changed the first time it is set. >-# Thus, host-specific definitions should be at the beginning of the >-# configuration file, and defaults at the end. >- >-# Site-wide defaults for various options >- >-# Host * >-# ForwardAgent no >-# ForwardX11 no >-# RhostsRSAAuthentication no >-# RSAAuthentication yes >-# PasswordAuthentication yes >-# HostbasedAuthentication no >-# BatchMode no >-# CheckHostIP yes >-# AddressFamily any >-# ConnectTimeout 0 >-# StrictHostKeyChecking ask >-# IdentityFile ~/.ssh/identity >-# IdentityFile ~/.ssh/id_rsa >-# IdentityFile ~/.ssh/id_dsa >-# Port 22 >-# Protocol 2,1 >-# Cipher 3des >-# Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc >-# EscapeChar ~ >+Host * >+ Hostname 127.0.0.1 >+ HostKeyAlias localhost-with-alias >+ Port 4242 >+ User dtucker >+ GlobalKnownHostsFile /home/dtucker/openssh/openssh-regress//known_hosts >+ UserKnownHostsFile /home/dtucker/openssh/openssh-regress//known_hosts >+ RSAAuthentication yes >+ PubkeyAuthentication yes >+ ChallengeResponseAuthentication no >+ HostbasedAuthentication no >+ PasswordAuthentication no >+ RhostsAuthentication no >+ RhostsRSAAuthentication no >+ BatchMode yes >+ StrictHostKeyChecking yes >+IdentityFile /home/dtucker/openssh/openssh-regress//rsa >+IdentityFile /home/dtucker/openssh/openssh-regress//rsa1 >Index: sshd_config >=================================================================== >RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/sshd_config,v >retrieving revision 1.65 >diff -u -p -r1.65 sshd_config >--- sshd_config 2 Oct 2003 06:20:54 -0000 1.65 >+++ sshd_config 18 Oct 2003 09:23:26 -0000 >@@ -1,96 +1,9 @@ >-# $OpenBSD: sshd_config,v 1.66 2003/09/29 20:19:57 markus Exp $ >- >-# This is the sshd server system-wide configuration file. See >-# sshd_config(5) for more information. >- >-# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin >- >-# The strategy used for options in the default sshd_config shipped with >-# OpenSSH is to specify options with their default value where >-# possible, but leave them commented. Uncommented options change a >-# default value. >- >-#Port 22 >-#Protocol 2,1 >-#ListenAddress 0.0.0.0 >-#ListenAddress :: >- >-# HostKey for protocol version 1 >-#HostKey /etc/ssh/ssh_host_key >-# HostKeys for protocol version 2 >-#HostKey /etc/ssh/ssh_host_rsa_key >-#HostKey /etc/ssh/ssh_host_dsa_key >- >-# Lifetime and size of ephemeral version 1 server key >-#KeyRegenerationInterval 1h >-#ServerKeyBits 768 >- >-# Logging >-#obsoletes QuietMode and FascistLogging >-#SyslogFacility AUTH >-#LogLevel INFO >- >-# Authentication: >- >-#LoginGraceTime 2m >-#PermitRootLogin yes >-#StrictModes yes >- >-#RSAAuthentication yes >-#PubkeyAuthentication yes >-#AuthorizedKeysFile .ssh/authorized_keys >- >-# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts >-#RhostsRSAAuthentication no >-# similar for protocol version 2 >-#HostbasedAuthentication no >-# Change to yes if you don't trust ~/.ssh/known_hosts for >-# RhostsRSAAuthentication and HostbasedAuthentication >-#IgnoreUserKnownHosts no >-# Don't read the user's ~/.rhosts and ~/.shosts files >-#IgnoreRhosts yes >- >-# To disable tunneled clear text passwords, change to no here! >-#PasswordAuthentication yes >-#PermitEmptyPasswords no >- >-# Change to no to disable s/key passwords >-#ChallengeResponseAuthentication yes >- >-# Kerberos options >-#KerberosAuthentication no >-#KerberosOrLocalPasswd yes >-#KerberosTicketCleanup yes >- >-# GSSAPI options >-#GSSAPIAuthentication no >-#GSSAPICleanupCredentials yes >- >-# Set this to 'yes' to enable PAM authentication (via challenge-response) >-# and session processing. Depending on your PAM configuration, this may >-# bypass the setting of 'PasswordAuthentication' >-#UsePAM no >- >-#AllowTcpForwarding yes >-#GatewayPorts no >-#X11Forwarding no >-#X11DisplayOffset 10 >-#X11UseLocalhost yes >-#PrintMotd yes >-#PrintLastLog yes >-#KeepAlive yes >-#UseLogin no >-#UsePrivilegeSeparation yes >-#PermitUserEnvironment no >-#Compression yes >-#ClientAliveInterval 0 >-#ClientAliveCountMax 3 >-#UseDNS yes >-#PidFile /var/run/sshd.pid >-#MaxStartups 10 >- >-# no default banner path >-#Banner /some/path >- >-# override default of no subsystems >-Subsystem sftp /usr/libexec/sftp-server >+ Port 4242 >+ ListenAddress 127.0.0.1 >+ #ListenAddress ::1 >+ PidFile /home/dtucker/openssh/openssh-regress//pidfile >+ AuthorizedKeysFile /home/dtucker/openssh/openssh-regress//authorized_keys_dtucker >+ KeepAlive no >+ LogLevel VERBOSE >+HostKey /home/dtucker/openssh/openssh-regress//host.rsa >+HostKey /home/dtucker/openssh/openssh-regress//host.rsa1 >Index: regress/agent-ptrace.sh >=================================================================== >RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/regress/agent-ptrace.sh,v >retrieving revision 1.7 >diff -u -p -r1.7 agent-ptrace.sh >--- regress/agent-ptrace.sh 12 Sep 2003 18:20:32 -0000 1.7 >+++ regress/agent-ptrace.sh 18 Oct 2003 09:21:32 -0000 >@@ -5,7 +5,7 @@ tid="disallow agent ptrace attach" > > if have_prog uname ; then > case `uname` in >- Linux|HP-UX|SunOS|NetBSD|AIX|CYGWIN*) >+ CYGWIN*) > echo "skipped (not supported on this platform)" > exit 0 > ;; >@@ -17,6 +17,15 @@ if have_prog gdb ; then > else > echo "skipped (gdb not found)" > exit 0 >+fi >+ >+if test -z "$SUDO" ; then >+ echo "skipped (SUDO not set)" >+ exit 0 >+else >+ $SUDO chown root ${OBJ}${SSHAGENT} >+ $SUDO chgrp root ${OBJ}${SSHAGENT} >+ $SUDO chmod 2755 ${OBJ}${SSHAGENT} > fi > > trace "start agent"
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 745
:
485
|
486