mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-07-27 07:44:29 +02:00
- (djm) Update README.privsep; spotted by fries@
This commit is contained in:
parent
c7d6d55521
commit
263d68fc56
@ -1,3 +1,6 @@
|
|||||||
|
20020622
|
||||||
|
- (djm) Update README.privsep; spotted by fries@
|
||||||
|
|
||||||
20020621
|
20020621
|
||||||
- (djm) Sync:
|
- (djm) Sync:
|
||||||
- djm@cvs.openbsd.org 2002/06/21 05:50:51
|
- djm@cvs.openbsd.org 2002/06/21 05:50:51
|
||||||
@ -1000,4 +1003,4 @@
|
|||||||
- (stevesk) entropy.c: typo in debug message
|
- (stevesk) entropy.c: typo in debug message
|
||||||
- (djm) ssh-keygen -i needs seeded RNG; report from markus@
|
- (djm) ssh-keygen -i needs seeded RNG; report from markus@
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.2238 2002/06/21 06:42:41 djm Exp $
|
$Id: ChangeLog,v 1.2239 2002/06/21 14:45:50 djm Exp $
|
||||||
|
@ -1,13 +1,12 @@
|
|||||||
Privilege separation, or privsep, is an experimental feature in
|
Privilege separation, or privsep, is method in OpenSSH by which
|
||||||
OpenSSH in which operations that require root privilege are performed
|
operations that require root privilege are performed by a separate
|
||||||
by a separate privileged monitor process. Its purpose is to prevent
|
privileged monitor process. Its purpose is to prevent privilege
|
||||||
privilege escalation by containing corruption to an unprivileged
|
escalation by containing corruption to an unprivileged process.
|
||||||
process. More information is available at:
|
More information is available at:
|
||||||
http://www.citi.umich.edu/u/provos/ssh/privsep.html
|
http://www.citi.umich.edu/u/provos/ssh/privsep.html
|
||||||
|
|
||||||
Privilege separation is not enabled by default, and may be enabled by
|
Privilege separation is now enabled by default; see the
|
||||||
specifying "UsePrivilegeSeparation yes" in sshd_config; see the
|
UsePrivilegeSeparation option in sshd_config(5).
|
||||||
UsePrivilegeSeparation option in sshd(8).
|
|
||||||
|
|
||||||
When privsep is enabled, the pre-authentication sshd process will
|
When privsep is enabled, the pre-authentication sshd process will
|
||||||
chroot(2) to "/var/empty" and change its privileges to the "sshd" user
|
chroot(2) to "/var/empty" and change its privileges to the "sshd" user
|
||||||
@ -34,8 +33,8 @@ privsep user and chroot directory:
|
|||||||
Privsep requires operating system support for file descriptor passing
|
Privsep requires operating system support for file descriptor passing
|
||||||
and mmap(MAP_ANON).
|
and mmap(MAP_ANON).
|
||||||
|
|
||||||
PAM-enabled OpenSSH is known to function with privsep on Linux and
|
PAM-enabled OpenSSH is known to function with privsep on Linux.
|
||||||
Solaris 8. It does not function on HP-UX with a trusted system
|
It does not function on HP-UX with a trusted system
|
||||||
configuration. PAMAuthenticationViaKbdInt does not function with
|
configuration. PAMAuthenticationViaKbdInt does not function with
|
||||||
privsep.
|
privsep.
|
||||||
|
|
||||||
@ -54,4 +53,4 @@ process 1005 is the sshd process listening for new connections.
|
|||||||
process 6917 is the privileged monitor process, 6919 is the user owned
|
process 6917 is the privileged monitor process, 6919 is the user owned
|
||||||
sshd process and 6921 is the shell process.
|
sshd process and 6921 is the shell process.
|
||||||
|
|
||||||
$Id: README.privsep,v 1.5 2002/05/22 01:02:15 djm Exp $
|
$Id: README.privsep,v 1.6 2002/06/21 14:45:50 djm Exp $
|
||||||
|
Loading…
x
Reference in New Issue
Block a user