summaryrefslogtreecommitdiff
path: root/ssh.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2002-06-09 20:00:09 +0000
committerBen Lindstrom <mouring@eviladmin.org>2002-06-09 20:00:09 +0000
commitece420413bbcc272300bc14f8944bb2679e4afd2 (patch)
treef6070a210cdcb12a3a03fd9938416ada7f6edcef /ssh.c
parent5a6abdae0f6f2312d8bfd60b8bf2420a3393428d (diff)
- markus@cvs.openbsd.org 2002/06/08 05:07:56
[ssh.c] nuke ptrace comment
Diffstat (limited to 'ssh.c')
-rw-r--r--ssh.c10
1 files changed, 1 insertions, 9 deletions
diff --git a/ssh.c b/ssh.c
index 0afdba7b..8b77a810 100644
--- a/ssh.c
+++ b/ssh.c
@@ -40,7 +40,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: ssh.c,v 1.174 2002/05/23 19:39:34 markus Exp $");
+RCSID("$OpenBSD: ssh.c,v 1.175 2002/06/08 05:07:56 markus Exp $");
#include <openssl/evp.h>
#include <openssl/err.h>
@@ -717,14 +717,6 @@ again:
* user's home directory if it happens to be on a NFS volume where
* root is mapped to nobody.
*/
-
- /*
- * Note that some legacy systems need to postpone the following call
- * to permanently_set_uid() until the private hostkey is destroyed
- * with RSA_free(). Otherwise the calling user could ptrace() the
- * process, read the private hostkey and impersonate the host.
- * OpenBSD does not allow ptracing of setuid processes.
- */
permanently_set_uid(pw);
/*