X-Git-Url: https://mattmccutchen.net/rsync/rsync.git/blobdiff_plain/379e689dacec3b520d0e6fd6d655034f924a811b..3060d4aa1d5586c085aaec108ac6ced094304322:/authenticate.c diff --git a/authenticate.c b/authenticate.c index 885e40b6..f87fceef 100644 --- a/authenticate.c +++ b/authenticate.c @@ -56,7 +56,7 @@ static void gen_challenge(char *addr, char *challenge) memset(input, 0, sizeof(input)); strlcpy((char *)input, addr, 17); - gettimeofday(&tv, NULL); + sys_gettimeofday(&tv); SIVAL(input, 16, tv.tv_sec); SIVAL(input, 20, tv.tv_usec); SIVAL(input, 24, getpid()); @@ -87,12 +87,14 @@ static int get_secret(int module, char *user, char *secret, int len) if (do_stat(fname, &st) == -1) { rprintf(FERROR,"stat(%s) : %s\n", fname, strerror(errno)); ok = 0; - } else if ((st.st_mode & 06) != 0) { - rprintf(FERROR,"secrets file must not be other-accessible\n"); - ok = 0; - } else if (am_root && (st.st_uid != 0)) { - rprintf(FERROR,"secrets file must be owned by root when running as root\n"); - ok = 0; + } else if (lp_strict_modes(module)) { + if ((st.st_mode & 06) != 0) { + rprintf(FERROR,"secrets file must not be other-accessible (see strict modes option)\n"); + ok = 0; + } else if (am_root && (st.st_uid != 0)) { + rprintf(FERROR,"secrets file must be owned by root when running as root (see strict modes)\n"); + ok = 0; + } } if (!ok) { rprintf(FERROR,"continuing without secrets file\n");