Revert a local change that sets the default for UsePrivilegeSeparation to
"sandbox" instead of "yes". In sandbox mode, the privsep child is unable to load additional libraries and will therefore crash when trying to take advantage of crypto offloading on CPUs that support it.
This commit is contained in:
parent
3c10f4198d
commit
c89ea4d72b
@ -298,7 +298,7 @@ fill_default_server_options(ServerOptions *options)
|
||||
options->version_addendum = xstrdup(SSH_VERSION_FREEBSD);
|
||||
/* Turn privilege separation on by default */
|
||||
if (use_privsep == -1)
|
||||
use_privsep = PRIVSEP_ON;
|
||||
use_privsep = PRIVSEP_NOSANDBOX;
|
||||
|
||||
#ifndef HAVE_MMAP
|
||||
if (use_privsep && options->compression == 1) {
|
||||
|
Loading…
Reference in New Issue
Block a user