summaryrefslogtreecommitdiffstats
path: root/sshd.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2011-09-22 13:38:30 +0200
committerDamien Miller <djm@mindrot.org>2011-09-22 13:38:30 +0200
commit9ee2c606c1d03ecb955aa8a2624b9db4aa9752a2 (patch)
treeeef2e8ce9fec47a88d6cb9d1d31706734412ffec /sshd.c
parent - djm@cvs.openbsd.org 2011/09/09 22:37:01 (diff)
downloadopenssh-9ee2c606c1d03ecb955aa8a2624b9db4aa9752a2.tar.xz
openssh-9ee2c606c1d03ecb955aa8a2624b9db4aa9752a2.zip
- djm@cvs.openbsd.org 2011/09/09 22:38:21
[sshd.c] kill the preauth privsep child on fatal errors in the monitor; ok markus@
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c22
1 files changed, 17 insertions, 5 deletions
diff --git a/sshd.c b/sshd.c
index cc1039558..28a8a489b 100644
--- a/sshd.c
+++ b/sshd.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: sshd.c,v 1.385 2011/06/23 09:34:13 djm Exp $ */
+/* $OpenBSD: sshd.c,v 1.386 2011/09/09 22:38:21 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -239,6 +239,7 @@ int startup_pipe; /* in child */
/* variables used for privilege separation */
int use_privsep = -1;
struct monitor *pmonitor = NULL;
+int privsep_is_preauth = 1;
/* global authentication context */
Authctxt *the_authctxt = NULL;
@@ -650,10 +651,13 @@ privsep_preauth(Authctxt *authctxt)
/* Wait for the child's exit status */
while (waitpid(pid, &status, 0) < 0) {
- if (errno != EINTR)
- fatal("%s: waitpid: %s", __func__,
- strerror(errno));
+ if (errno == EINTR)
+ continue;
+ pmonitor->m_pid = -1;
+ fatal("%s: waitpid: %s", __func__, strerror(errno));
}
+ privsep_is_preauth = 0;
+ pmonitor->m_pid = -1;
if (WIFEXITED(status)) {
if (WEXITSTATUS(status) != 0)
fatal("%s: preauth child exited with status %d",
@@ -2360,8 +2364,16 @@ do_ssh2_kex(void)
void
cleanup_exit(int i)
{
- if (the_authctxt)
+ if (the_authctxt) {
do_cleanup(the_authctxt);
+ if (privsep_is_preauth && pmonitor->m_pid > 1) {
+ debug("Killing privsep child %d", pmonitor->m_pid);
+ if (kill(pmonitor->m_pid, SIGKILL) != 0 &&
+ errno == ESRCH)
+ error("%s: kill(%d): %s", __func__,
+ pmonitor->m_pid, strerror(errno));
+ }
+ }
#ifdef SSH_AUDIT_EVENTS
/* done after do_cleanup so it can cancel the PAM auth 'thread' */
if (!use_privsep || mm_is_monitor())