Mercurial > dropbear
diff svr-kex.c @ 1921:284c3837891c
Allow user space file locations (rootless support)
Why:
Running dropbear as a user (rootless) is aided if
files and programs can be saved/removed without
needing sudo.
What:
Use the same convention as DROPBEAR_DEFAULT_CLI_AUTHKEY;
if not starting with '/', then is relative to hedge's /home/hedge:
*_PRIV_FILENAME
DROPBEAR_PIDFILE
SFTPSERVER_PATH
default_options.h commentary added.
Changes kept to a minimum, so log entry in svr_kex.c#163
is refactored.
From:
Generated hostkey is <path> ... <finger-print>
to:
Generated hostkey path is <path>
Generated hostkey fingerprint is <fp>
Otherwise the unexpanded path was reported.
Patch modified by Matt Johnston
Signed-off-by: Begley Brothers Inc <[email protected]>
author | Begley Brothers Inc <begleybrothers@gmail.com> |
---|---|
date | Thu, 09 Jul 2020 17:47:58 +1000 |
parents | 435cfb9ec96e |
children |
line wrap: on
line diff
--- a/svr-kex.c Wed Mar 30 12:56:09 2022 +0800 +++ b/svr-kex.c Thu Jul 09 17:47:58 2020 +1000 @@ -106,6 +106,7 @@ static void svr_ensure_hostkey() { const char* fn = NULL; + char *expand_fn = NULL; enum signkey_type type = ses.newkeys->algo_hostkey; void **hostkey = signkey_key_ptr(svr_opts.hostkey, type); int ret = DROPBEAR_FAILURE; @@ -142,15 +143,19 @@ dropbear_assert(0); } - if (readhostkey(fn, svr_opts.hostkey, &type) == DROPBEAR_SUCCESS) { - return; + expand_fn = expand_homedir_path(fn); + + ret = readhostkey(expand_fn, svr_opts.hostkey, &type); + if (ret == DROPBEAR_SUCCESS) { + goto out; } - if (signkey_generate(type, 0, fn, 1) == DROPBEAR_FAILURE) { + if (signkey_generate(type, 0, expand_fn, 1) == DROPBEAR_FAILURE) { goto out; } - ret = readhostkey(fn, svr_opts.hostkey, &type); + /* Read what we just generated (or another process raced us) */ + ret = readhostkey(expand_fn, svr_opts.hostkey, &type); if (ret == DROPBEAR_SUCCESS) { char *fp = NULL; @@ -161,16 +166,16 @@ len = key_buf->len - key_buf->pos; fp = sign_key_fingerprint(buf_getptr(key_buf, len), len); dropbear_log(LOG_INFO, "Generated hostkey %s, fingerprint is %s", - fn, fp); + expand_fn, fp); m_free(fp); buf_free(key_buf); } out: - if (ret == DROPBEAR_FAILURE) - { - dropbear_exit("Couldn't read or generate hostkey %s", fn); + if (ret == DROPBEAR_FAILURE) { + dropbear_exit("Couldn't read or generate hostkey %s", expand_fn); } + m_free(expand_fn); } #endif