Turn sandboxing on by default.

This commit is contained in:
Dag-Erling Smørgrav 2014-02-01 00:07:16 +00:00
parent 3f84e63ede
commit 2b1970f362
3 changed files with 3 additions and 3 deletions

View File

@ -314,7 +314,7 @@ fill_default_server_options(ServerOptions *options)
options->version_addendum = xstrdup(SSH_VERSION_FREEBSD);
/* Turn privilege separation on by default */
if (use_privsep == -1)
use_privsep = PRIVSEP_NOSANDBOX;
use_privsep = PRIVSEP_ON;
#ifndef HAVE_MMAP
if (use_privsep && options->compression == 1) {

View File

@ -110,7 +110,7 @@
#PrintLastLog yes
#TCPKeepAlive yes
#UseLogin no
#UsePrivilegeSeparation yes
#UsePrivilegeSeparation sandbox
#PermitUserEnvironment no
#Compression delayed
#ClientAliveInterval 0

View File

@ -1227,7 +1227,7 @@ the privilege of the authenticated user.
The goal of privilege separation is to prevent privilege
escalation by containing any corruption within the unprivileged processes.
The default is
.Dq yes .
.Dq sandbox .
If
.Cm UsePrivilegeSeparation
is set to