Revert a local change that sets the default for UsePrivilegeSeparation to

"sandbox" instead of "yes".  In sandbox mode, the privsep child is unable
to load additional libraries and will therefore crash when trying to take
advantage of crypto offloading on CPUs that support it.
This commit is contained in:
Dag-Erling Smørgrav 2013-05-29 00:19:58 +00:00
parent 3c10f4198d
commit c89ea4d72b

View File

@ -298,7 +298,7 @@ fill_default_server_options(ServerOptions *options)
options->version_addendum = xstrdup(SSH_VERSION_FREEBSD);
/* Turn privilege separation on by default */
if (use_privsep == -1)
use_privsep = PRIVSEP_ON;
use_privsep = PRIVSEP_NOSANDBOX;
#ifndef HAVE_MMAP
if (use_privsep && options->compression == 1) {