- markus@cvs.openbsd.org 2007/08/15 08:14:46
[clientloop.c] do NOT fall back to the trused x11 cookie if generation of an untrusted cookie fails; from security-alert at sun.com; ok dtucker
This commit is contained in:
parent
2d9636471b
commit
513d13accd
|
@ -1,3 +1,10 @@
|
||||||
|
20070815
|
||||||
|
- (dtucker) OpenBSD CVS Sync
|
||||||
|
- markus@cvs.openbsd.org 2007/08/15 08:14:46
|
||||||
|
[clientloop.c]
|
||||||
|
do NOT fall back to the trused x11 cookie if generation of an untrusted
|
||||||
|
cookie fails; from security-alert at sun.com; ok dtucker
|
||||||
|
|
||||||
20070813
|
20070813
|
||||||
- (dtucker) [session.c] Bug #1339: ensure that pam_setcred() is always
|
- (dtucker) [session.c] Bug #1339: ensure that pam_setcred() is always
|
||||||
called with PAM_ESTABLISH_CRED at least once, which resolves a problem
|
called with PAM_ESTABLISH_CRED at least once, which resolves a problem
|
||||||
|
@ -3152,4 +3159,4 @@
|
||||||
OpenServer 6 and add osr5bigcrypt support so when someone migrates
|
OpenServer 6 and add osr5bigcrypt support so when someone migrates
|
||||||
passwords between UnixWare and OpenServer they will still work. OK dtucker@
|
passwords between UnixWare and OpenServer they will still work. OK dtucker@
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.4725 2007/08/13 13:11:56 dtucker Exp $
|
$Id: ChangeLog,v 1.4726 2007/08/15 09:13:41 dtucker Exp $
|
||||||
|
|
12
clientloop.c
12
clientloop.c
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: clientloop.c,v 1.180 2007/08/07 07:32:53 djm Exp $ */
|
/* $OpenBSD: clientloop.c,v 1.181 2007/08/15 08:14:46 markus Exp $ */
|
||||||
/*
|
/*
|
||||||
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
* Author: Tatu Ylonen <ylo@cs.hut.fi>
|
||||||
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
||||||
|
@ -290,6 +290,13 @@ client_x11_get_proto(const char *display, const char *xauth_path,
|
||||||
generated = 1;
|
generated = 1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* When in untrusted mode, we read the cookie only if it was
|
||||||
|
* successfully generated as an untrusted one in the step
|
||||||
|
* above.
|
||||||
|
*/
|
||||||
|
if (trusted || generated) {
|
||||||
snprintf(cmd, sizeof(cmd),
|
snprintf(cmd, sizeof(cmd),
|
||||||
"%s %s%s list %s 2>" _PATH_DEVNULL,
|
"%s %s%s list %s 2>" _PATH_DEVNULL,
|
||||||
xauth_path,
|
xauth_path,
|
||||||
|
@ -303,6 +310,9 @@ client_x11_get_proto(const char *display, const char *xauth_path,
|
||||||
got_data = 1;
|
got_data = 1;
|
||||||
if (f)
|
if (f)
|
||||||
pclose(f);
|
pclose(f);
|
||||||
|
} else
|
||||||
|
error("Warning: untrusted X11 forwarding setup failed: "
|
||||||
|
"xauth key data not generated");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (do_unlink) {
|
if (do_unlink) {
|
||||||
|
|
Loading…
Reference in New Issue