diff options
author | dtucker@openbsd.org <dtucker@openbsd.org> | 2018-07-27 07:13:02 +0200 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-07-31 04:18:49 +0200 |
commit | 73ddb25bae4c33a0db361ac13f2e3a60d7c6c4a5 (patch) | |
tree | 9e0b4b1f0866800e6ff6ce1d66f1b97631c13414 /misc.h | |
parent | upstream: ssh(1) no longer supports being setuid root. Remove reference (diff) | |
download | openssh-73ddb25bae4c33a0db361ac13f2e3a60d7c6c4a5.tar.xz openssh-73ddb25bae4c33a0db361ac13f2e3a60d7c6c4a5.zip |
upstream: Remove uid checks from low port binds. Now that ssh
cannot be setuid and sshd always has privsep on, we can remove the uid checks
for low port binds and just let the system do the check. We leave a sanity
check for the !privsep case so long as the code is stil there. with & ok
djm@
OpenBSD-Commit-ID: 9535cfdbd1cd54486fdbedfaee44ce4367ec7ca0
Diffstat (limited to 'misc.h')
-rw-r--r-- | misc.h | 3 |
1 files changed, 1 insertions, 2 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: misc.h,v 1.73 2018/06/09 03:01:12 djm Exp $ */ +/* $OpenBSD: misc.h,v 1.74 2018/07/27 05:13:02 dtucker Exp $ */ /* * Author: Tatu Ylonen <ylo@cs.hut.fi> @@ -31,7 +31,6 @@ struct Forward { }; int forward_equals(const struct Forward *, const struct Forward *); -int bind_permitted(int, uid_t); int daemonized(void); /* Common server and client forwarding options. */ |