|
|
@@ -1,9 +1,9 @@
|
|
|
-diff -wur openssh-3.8p1.orig/servconf.c openssh-3.8p1/servconf.c
|
|
|
---- openssh-3.8p1.orig/servconf.c 2004-01-23 12:03:10.000000000 +0100
|
|
|
-+++ openssh-3.8p1/servconf.c 2004-03-29 10:44:26.000000000 +0200
|
|
|
-@@ -102,6 +102,15 @@
|
|
|
- options->authorized_keys_file = NULL;
|
|
|
+Index: servconf.c
|
|
|
+--- servconf.c.orig 2004-08-13 13:30:24 +0200
|
|
|
++++ servconf.c 2004-08-17 19:57:16 +0200
|
|
|
+@@ -103,6 +103,15 @@
|
|
|
options->authorized_keys_file2 = NULL;
|
|
|
+ options->num_accept_env = 0;
|
|
|
|
|
|
+ options->log_sftp = LOG_SFTP_NOT_SET;
|
|
|
+ options->sftp_log_facility = SYSLOG_FACILITY_NOT_SET;
|
|
|
@@ -17,7 +17,7 @@ diff -wur openssh-3.8p1.orig/servconf.c openssh-3.8p1/servconf.c
|
|
|
/* Needs to be accessable in many places */
|
|
|
use_privsep = -1;
|
|
|
}
|
|
|
-@@ -228,6 +237,24 @@
|
|
|
+@@ -231,6 +240,24 @@
|
|
|
if (options->authorized_keys_file == NULL)
|
|
|
options->authorized_keys_file = _PATH_SSH_USER_PERMITTED_KEYS;
|
|
|
|
|
|
@@ -42,9 +42,9 @@ diff -wur openssh-3.8p1.orig/servconf.c openssh-3.8p1/servconf.c
|
|
|
/* Turn privilege separation on by default */
|
|
|
if (use_privsep == -1)
|
|
|
use_privsep = 1;
|
|
|
-@@ -268,6 +295,9 @@
|
|
|
+@@ -272,6 +299,9 @@
|
|
|
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
|
|
|
- sGssAuthentication, sGssCleanupCreds,
|
|
|
+ sGssAuthentication, sGssCleanupCreds, sAcceptEnv,
|
|
|
sUsePrivilegeSeparation,
|
|
|
+ sLogSftp, sSftpLogFacility, sSftpLogLevel,
|
|
|
+ sSftpUmask,
|
|
|
@@ -52,20 +52,20 @@ diff -wur openssh-3.8p1.orig/servconf.c openssh-3.8p1/servconf.c
|
|
|
sDeprecated, sUnsupported
|
|
|
} ServerOpCodes;
|
|
|
|
|
|
-@@ -366,6 +396,12 @@
|
|
|
- { "authorizedkeysfile", sAuthorizedKeysFile },
|
|
|
- { "authorizedkeysfile2", sAuthorizedKeysFile2 },
|
|
|
- { "useprivilegeseparation", sUsePrivilegeSeparation},
|
|
|
-+ { "logsftp", sLogSftp},
|
|
|
-+ { "sftplogfacility", sSftpLogFacility},
|
|
|
-+ { "sftploglevel", sSftpLogLevel},
|
|
|
-+ { "sftpumask", sSftpUmask},
|
|
|
-+ { "sftppermitchmod", sSftpPermitChmod},
|
|
|
-+ { "sftppermitchown", sSftpPermitChown},
|
|
|
- { NULL, sBadOption }
|
|
|
- };
|
|
|
-
|
|
|
-@@ -431,6 +467,8 @@
|
|
|
+@@ -281,6 +311,12 @@
|
|
|
+ ServerOpCodes opcode;
|
|
|
+ } keywords[] = {
|
|
|
+ /* Portable-specific options */
|
|
|
++ { "logsftp", sLogSftp},
|
|
|
++ { "sftplogfacility", sSftpLogFacility},
|
|
|
++ { "sftploglevel", sSftpLogLevel},
|
|
|
++ { "sftpumask", sSftpUmask},
|
|
|
++ { "sftppermitchmod", sSftpPermitChmod},
|
|
|
++ { "sftppermitchown", sSftpPermitChown},
|
|
|
+ #ifdef USE_PAM
|
|
|
+ { "usepam", sUsePAM },
|
|
|
+ #else
|
|
|
+@@ -437,6 +473,8 @@
|
|
|
char *cp, **charptr, *arg, *p;
|
|
|
int *intptr, value, i, n;
|
|
|
ServerOpCodes opcode;
|
|
|
@@ -74,7 +74,7 @@ diff -wur openssh-3.8p1.orig/servconf.c openssh-3.8p1/servconf.c
|
|
|
|
|
|
cp = line;
|
|
|
arg = strdelim(&cp);
|
|
|
-@@ -871,6 +909,58 @@
|
|
|
+@@ -881,6 +919,58 @@
|
|
|
case sBanner:
|
|
|
charptr = &options->banner;
|
|
|
goto parse_filename;
|
|
|
@@ -133,18 +133,10 @@ diff -wur openssh-3.8p1.orig/servconf.c openssh-3.8p1/servconf.c
|
|
|
/*
|
|
|
* These options can contain %X options expanded at
|
|
|
* connect time, so that you can specify paths like:
|
|
|
-@@ -913,6 +1003,7 @@
|
|
|
- if ((arg = strdelim(&cp)) != NULL && *arg != '\0')
|
|
|
- fatal("%s line %d: garbage at end of line; \"%.200s\".",
|
|
|
- filename, linenum, arg);
|
|
|
-+
|
|
|
- return 0;
|
|
|
- }
|
|
|
-
|
|
|
-diff -wur openssh-3.8p1.orig/servconf.h openssh-3.8p1/servconf.h
|
|
|
---- openssh-3.8p1.orig/servconf.h 2003-12-31 01:37:34.000000000 +0100
|
|
|
-+++ openssh-3.8p1/servconf.h 2004-03-29 10:44:26.000000000 +0200
|
|
|
-@@ -32,6 +32,18 @@
|
|
|
+Index: servconf.h
|
|
|
+--- servconf.h.orig 2004-06-25 05:33:20 +0200
|
|
|
++++ servconf.h 2004-08-17 19:55:16 +0200
|
|
|
+@@ -35,6 +35,19 @@
|
|
|
#define PERMIT_NO_PASSWD 2
|
|
|
#define PERMIT_YES 3
|
|
|
|
|
|
@@ -160,10 +152,11 @@ diff -wur openssh-3.8p1.orig/servconf.h openssh-3.8p1/servconf.h
|
|
|
+#define SFTP_PERMIT_NOT_SET -1
|
|
|
+#define SFTP_PERMIT_NO 0
|
|
|
+#define SFTP_PERMIT_YES 1
|
|
|
++
|
|
|
+ #define DEFAULT_AUTH_FAIL_MAX 6 /* Default for MaxAuthTries */
|
|
|
|
|
|
typedef struct {
|
|
|
- u_int num_ports;
|
|
|
-@@ -125,6 +137,13 @@
|
|
|
+@@ -133,6 +146,13 @@
|
|
|
char *authorized_keys_file; /* File containing public keys */
|
|
|
char *authorized_keys_file2;
|
|
|
int use_pam; /* Enable auth via PAM */
|
|
|
@@ -177,9 +170,9 @@ diff -wur openssh-3.8p1.orig/servconf.h openssh-3.8p1/servconf.h
|
|
|
} ServerOptions;
|
|
|
|
|
|
void initialize_server_options(ServerOptions *);
|
|
|
-diff -wur openssh-3.8p1.orig/session.c openssh-3.8p1/session.c
|
|
|
---- openssh-3.8p1.orig/session.c 2004-02-23 14:01:27.000000000 +0100
|
|
|
-+++ openssh-3.8p1/session.c 2004-03-29 10:44:26.000000000 +0200
|
|
|
+Index: session.c
|
|
|
+--- session.c.orig 2004-08-12 14:40:25 +0200
|
|
|
++++ session.c 2004-08-17 19:54:21 +0200
|
|
|
@@ -112,6 +112,15 @@
|
|
|
|
|
|
static int is_child = 0;
|
|
|
@@ -196,7 +189,7 @@ diff -wur openssh-3.8p1.orig/session.c openssh-3.8p1/session.c
|
|
|
/* Name and directory of socket for authentication agent forwarding. */
|
|
|
static char *auth_sock_name = NULL;
|
|
|
static char *auth_sock_dir = NULL;
|
|
|
-@@ -971,6 +980,7 @@
|
|
|
+@@ -974,6 +983,7 @@
|
|
|
env = xmalloc(envsize * sizeof(char *));
|
|
|
env[0] = NULL;
|
|
|
|
|
|
@@ -204,7 +197,7 @@ diff -wur openssh-3.8p1.orig/session.c openssh-3.8p1/session.c
|
|
|
#ifdef HAVE_CYGWIN
|
|
|
/*
|
|
|
* The Windows environment contains some setting which are
|
|
|
-@@ -1111,6 +1121,67 @@
|
|
|
+@@ -1118,6 +1128,67 @@
|
|
|
child_set_env(&env, &envsize, SSH_AUTHSOCKET_ENV_NAME,
|
|
|
auth_sock_name);
|
|
|
|
|
|
@@ -272,9 +265,9 @@ diff -wur openssh-3.8p1.orig/session.c openssh-3.8p1/session.c
|
|
|
/* read $HOME/.ssh/environment. */
|
|
|
if (options.permit_user_env && !options.use_login) {
|
|
|
snprintf(buf, sizeof buf, "%.200s/.ssh/environment",
|
|
|
-diff -wur openssh-3.8p1.orig/sftp-server.8 openssh-3.8p1/sftp-server.8
|
|
|
---- openssh-3.8p1.orig/sftp-server.8 2003-10-15 07:50:43.000000000 +0200
|
|
|
-+++ openssh-3.8p1/sftp-server.8 2004-03-29 10:44:26.000000000 +0200
|
|
|
+Index: sftp-server.8
|
|
|
+--- sftp-server.8.orig 2003-10-15 07:50:43 +0200
|
|
|
++++ sftp-server.8 2004-08-17 19:54:21 +0200
|
|
|
@@ -41,6 +41,20 @@
|
|
|
.Cm Subsystem
|
|
|
option.
|
|
|
@@ -296,9 +289,9 @@ diff -wur openssh-3.8p1.orig/sftp-server.8 openssh-3.8p1/sftp-server.8
|
|
|
.Xr sshd_config 5
|
|
|
for more information.
|
|
|
.Sh SEE ALSO
|
|
|
-diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
---- openssh-3.8p1.orig/sftp-server.c 2004-02-23 23:19:15.000000000 +0100
|
|
|
-+++ openssh-3.8p1/sftp-server.c 2004-03-29 10:45:39.000000000 +0200
|
|
|
+Index: sftp-server.c
|
|
|
+--- sftp-server.c.orig 2004-07-17 06:07:42 +0200
|
|
|
++++ sftp-server.c 2004-08-17 19:56:22 +0200
|
|
|
@@ -31,6 +31,13 @@
|
|
|
#define get_string(lenp) buffer_get_string(&iqueue, lenp);
|
|
|
#define TRACE debug
|
|
|
@@ -310,10 +303,10 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
+static int permit_chown = 1;
|
|
|
+static int permit_logging = 0;
|
|
|
+
|
|
|
- #ifdef HAVE___PROGNAME
|
|
|
extern char *__progname;
|
|
|
- #else
|
|
|
-@@ -385,6 +392,14 @@
|
|
|
+
|
|
|
+ /* input and output queue */
|
|
|
+@@ -381,6 +388,14 @@
|
|
|
a = get_attrib();
|
|
|
flags = flags_from_portable(pflags);
|
|
|
mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a->perm : 0666;
|
|
|
@@ -328,7 +321,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
TRACE("open id %u name %s flags %d mode 0%o", id, name, pflags, mode);
|
|
|
fd = open(name, flags, mode);
|
|
|
if (fd < 0) {
|
|
|
-@@ -398,6 +413,8 @@
|
|
|
+@@ -394,6 +409,8 @@
|
|
|
status = SSH2_FX_OK;
|
|
|
}
|
|
|
}
|
|
|
@@ -337,7 +330,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
if (status != SSH2_FX_OK)
|
|
|
send_status(id, status);
|
|
|
xfree(name);
|
|
|
-@@ -434,6 +451,7 @@
|
|
|
+@@ -430,6 +447,7 @@
|
|
|
(u_int64_t)off, len);
|
|
|
if (len > sizeof buf) {
|
|
|
len = sizeof buf;
|
|
|
@@ -345,7 +338,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
logit("read change len %d", len);
|
|
|
}
|
|
|
fd = handle_to_fd(handle);
|
|
|
-@@ -453,6 +471,8 @@
|
|
|
+@@ -449,6 +467,8 @@
|
|
|
}
|
|
|
}
|
|
|
}
|
|
|
@@ -354,7 +347,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
if (status != SSH2_FX_OK)
|
|
|
send_status(id, status);
|
|
|
}
|
|
|
-@@ -487,10 +507,13 @@
|
|
|
+@@ -483,10 +503,13 @@
|
|
|
} else if (ret == len) {
|
|
|
status = SSH2_FX_OK;
|
|
|
} else {
|
|
|
@@ -368,7 +361,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
send_status(id, status);
|
|
|
xfree(data);
|
|
|
}
|
|
|
-@@ -583,24 +606,46 @@
|
|
|
+@@ -579,24 +602,46 @@
|
|
|
a = get_attrib();
|
|
|
TRACE("setstat id %u name %s", id, name);
|
|
|
if (a->flags & SSH2_FILEXFER_ATTR_SIZE) {
|
|
|
@@ -415,7 +408,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
}
|
|
|
send_status(id, status);
|
|
|
xfree(name);
|
|
|
-@@ -615,6 +660,9 @@
|
|
|
+@@ -611,6 +656,9 @@
|
|
|
int status = SSH2_FX_OK;
|
|
|
char *name;
|
|
|
|
|
|
@@ -425,7 +418,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
id = get_int();
|
|
|
handle = get_handle();
|
|
|
a = get_attrib();
|
|
|
-@@ -625,11 +673,14 @@
|
|
|
+@@ -621,11 +669,14 @@
|
|
|
status = SSH2_FX_FAILURE;
|
|
|
} else {
|
|
|
if (a->flags & SSH2_FILEXFER_ATTR_SIZE) {
|
|
|
@@ -440,7 +433,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
#ifdef HAVE_FCHMOD
|
|
|
ret = fchmod(fd, a->perm & 0777);
|
|
|
#else
|
|
|
-@@ -637,8 +688,18 @@
|
|
|
+@@ -633,8 +684,18 @@
|
|
|
#endif
|
|
|
if (ret == -1)
|
|
|
status = errno_to_portable(errno);
|
|
|
@@ -459,7 +452,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
#ifdef HAVE_FUTIMES
|
|
|
ret = futimes(fd, attrib_to_tv(a));
|
|
|
#else
|
|
|
-@@ -648,6 +709,7 @@
|
|
|
+@@ -644,6 +705,7 @@
|
|
|
status = errno_to_portable(errno);
|
|
|
}
|
|
|
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
|
|
|
@@ -467,7 +460,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
#ifdef HAVE_FCHOWN
|
|
|
ret = fchown(fd, a->uid, a->gid);
|
|
|
#else
|
|
|
-@@ -655,6 +717,14 @@
|
|
|
+@@ -651,6 +713,14 @@
|
|
|
#endif
|
|
|
if (ret == -1)
|
|
|
status = errno_to_portable(errno);
|
|
|
@@ -482,7 +475,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
}
|
|
|
}
|
|
|
send_status(id, status);
|
|
|
-@@ -684,6 +754,8 @@
|
|
|
+@@ -680,6 +750,8 @@
|
|
|
}
|
|
|
|
|
|
}
|
|
|
@@ -491,7 +484,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
if (status != SSH2_FX_OK)
|
|
|
send_status(id, status);
|
|
|
xfree(path);
|
|
|
-@@ -757,6 +829,8 @@
|
|
|
+@@ -753,6 +825,8 @@
|
|
|
TRACE("remove id %u name %s", id, name);
|
|
|
ret = unlink(name);
|
|
|
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
|
|
@@ -500,7 +493,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
send_status(id, status);
|
|
|
xfree(name);
|
|
|
}
|
|
|
-@@ -774,9 +848,19 @@
|
|
|
+@@ -770,9 +844,19 @@
|
|
|
a = get_attrib();
|
|
|
mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ?
|
|
|
a->perm & 0777 : 0777;
|
|
|
@@ -520,7 +513,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
send_status(id, status);
|
|
|
xfree(name);
|
|
|
}
|
|
|
-@@ -793,6 +877,8 @@
|
|
|
+@@ -789,6 +873,8 @@
|
|
|
TRACE("rmdir id %u name %s", id, name);
|
|
|
ret = rmdir(name);
|
|
|
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
|
|
@@ -529,7 +522,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
send_status(id, status);
|
|
|
xfree(name);
|
|
|
}
|
|
|
-@@ -819,6 +905,8 @@
|
|
|
+@@ -815,6 +901,8 @@
|
|
|
s.name = s.long_name = resolvedname;
|
|
|
send_names(id, 1, &s);
|
|
|
}
|
|
|
@@ -538,7 +531,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
xfree(path);
|
|
|
}
|
|
|
|
|
|
-@@ -854,6 +942,8 @@
|
|
|
+@@ -870,6 +958,8 @@
|
|
|
status = SSH2_FX_OK;
|
|
|
}
|
|
|
send_status(id, status);
|
|
|
@@ -547,8 +540,8 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
xfree(oldpath);
|
|
|
xfree(newpath);
|
|
|
}
|
|
|
-@@ -879,6 +969,8 @@
|
|
|
- s.name = s.long_name = link;
|
|
|
+@@ -895,6 +985,8 @@
|
|
|
+ s.name = s.long_name = buf;
|
|
|
send_names(id, 1, &s);
|
|
|
}
|
|
|
+ if ( permit_logging == 1 )
|
|
|
@@ -556,7 +549,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
xfree(path);
|
|
|
}
|
|
|
|
|
|
-@@ -897,6 +989,8 @@
|
|
|
+@@ -913,6 +1005,8 @@
|
|
|
ret = symlink(oldpath, newpath);
|
|
|
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
|
|
send_status(id, status);
|
|
|
@@ -565,7 +558,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
xfree(oldpath);
|
|
|
xfree(newpath);
|
|
|
}
|
|
|
-@@ -1018,6 +1112,8 @@
|
|
|
+@@ -1034,6 +1128,8 @@
|
|
|
{
|
|
|
fd_set *rset, *wset;
|
|
|
int in, out, max;
|
|
|
@@ -574,7 +567,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
ssize_t len, olen, set_size;
|
|
|
|
|
|
/* XXX should use getopt */
|
|
|
-@@ -1025,6 +1121,16 @@
|
|
|
+@@ -1041,6 +1137,16 @@
|
|
|
__progname = ssh_get_progname(av[0]);
|
|
|
handle_init();
|
|
|
|
|
|
@@ -591,7 +584,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
#ifdef DEBUG_SFTP_SERVER
|
|
|
log_init("sftp-server", SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 0);
|
|
|
#endif
|
|
|
-@@ -1032,6 +1138,39 @@
|
|
|
+@@ -1048,6 +1154,39 @@
|
|
|
in = dup(STDIN_FILENO);
|
|
|
out = dup(STDOUT_FILENO);
|
|
|
|
|
|
@@ -631,7 +624,7 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
#ifdef HAVE_CYGWIN
|
|
|
setmode(in, O_BINARY);
|
|
|
setmode(out, O_BINARY);
|
|
|
-@@ -1071,6 +1210,8 @@
|
|
|
+@@ -1087,6 +1226,8 @@
|
|
|
len = read(in, buf, sizeof buf);
|
|
|
if (len == 0) {
|
|
|
debug("read eof");
|
|
|
@@ -640,28 +633,10 @@ diff -wur openssh-3.8p1.orig/sftp-server.c openssh-3.8p1/sftp-server.c
|
|
|
exit(0);
|
|
|
} else if (len < 0) {
|
|
|
error("read error");
|
|
|
-diff -wur openssh-3.8p1.orig/sshd_config openssh-3.8p1/sshd_config
|
|
|
---- openssh-3.8p1.orig/sshd_config 2003-12-31 01:38:32.000000000 +0100
|
|
|
-+++ openssh-3.8p1/sshd_config 2004-03-29 10:44:26.000000000 +0200
|
|
|
-@@ -95,3 +95,14 @@
|
|
|
-
|
|
|
- # override default of no subsystems
|
|
|
- Subsystem sftp /usr/libexec/sftp-server
|
|
|
-+
|
|
|
-+# sftp-server logging
|
|
|
-+#LogSftp no
|
|
|
-+#SftpLogFacility AUTH
|
|
|
-+#SftpLogLevel INFO
|
|
|
-+
|
|
|
-+# sftp-server umask control
|
|
|
-+#SftpUmask
|
|
|
-+
|
|
|
-+#SftpPermitChmod yes
|
|
|
-+#SftpPermitChown yes
|
|
|
-diff -wur openssh-3.8p1.orig/sshd_config.5 openssh-3.8p1/sshd_config.5
|
|
|
---- openssh-3.8p1.orig/sshd_config.5 2004-02-18 04:31:24.000000000 +0100
|
|
|
-+++ openssh-3.8p1/sshd_config.5 2004-03-29 10:44:26.000000000 +0200
|
|
|
-@@ -374,6 +374,10 @@
|
|
|
+Index: sshd_config.5
|
|
|
+--- sshd_config.5.orig 2004-06-30 14:39:34 +0200
|
|
|
++++ sshd_config.5 2004-08-17 19:54:21 +0200
|
|
|
+@@ -407,6 +407,10 @@
|
|
|
DEBUG and DEBUG1 are equivalent.
|
|
|
DEBUG2 and DEBUG3 each specify higher levels of debugging output.
|
|
|
Logging with a DEBUG level violates the privacy of users and is not recommended.
|
|
|
@@ -672,7 +647,7 @@ diff -wur openssh-3.8p1.orig/sshd_config.5 openssh-3.8p1/sshd_config.5
|
|
|
.It Cm MACs
|
|
|
Specifies the available MAC (message authentication code) algorithms.
|
|
|
The MAC algorithm is used in protocol version 2
|
|
|
-@@ -526,6 +530,37 @@
|
|
|
+@@ -567,6 +571,37 @@
|
|
|
.It Cm ServerKeyBits
|
|
|
Defines the number of bits in the ephemeral protocol version 1 server key.
|
|
|
The minimum value is 512, and the default is 768.
|
|
|
@@ -710,3 +685,21 @@ diff -wur openssh-3.8p1.orig/sshd_config.5 openssh-3.8p1/sshd_config.5
|
|
|
.It Cm StrictModes
|
|
|
Specifies whether
|
|
|
.Nm sshd
|
|
|
+Index: sshd_config
|
|
|
+--- sshd_config.orig 2004-05-24 02:36:24 +0200
|
|
|
++++ sshd_config 2004-08-17 19:54:21 +0200
|
|
|
+@@ -101,3 +101,14 @@
|
|
|
+
|
|
|
+ # override default of no subsystems
|
|
|
+ Subsystem sftp /usr/libexec/sftp-server
|
|
|
++
|
|
|
++# sftp-server logging
|
|
|
++#LogSftp no
|
|
|
++#SftpLogFacility AUTH
|
|
|
++#SftpLogLevel INFO
|
|
|
++
|
|
|
++# sftp-server umask control
|
|
|
++#SftpUmask
|
|
|
++
|
|
|
++#SftpPermitChmod yes
|
|
|
++#SftpPermitChown yes
|