- markus@cvs.openbsd.org 2002/06/08 05:07:56
     [ssh.c]
     nuke ptrace comment
diff --git a/ChangeLog b/ChangeLog
index 3eb4100..9e48cbb 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,9 @@
+20020609
+ - (bal) OpenBSD CVS Sync
+   - markus@cvs.openbsd.org 2002/06/08 05:07:56
+     [ssh.c]
+     nuke ptrace comment
+
 20020607
  - (bal) Removed --{enable/disable}-suid-ssh
  - (bal) Missed __progname in ssh-keysign.c  patch by dtucker@zip.com.au
@@ -828,4 +834,4 @@
  - (stevesk) entropy.c: typo in debug message
  - (djm) ssh-keygen -i needs seeded RNG; report from markus@
 
-$Id: ChangeLog,v 1.2188 2002/06/07 16:49:11 mouring Exp $
+$Id: ChangeLog,v 1.2189 2002/06/09 20:00:09 mouring Exp $
diff --git a/ssh.c b/ssh.c
index 0afdba7..8b77a81 100644
--- a/ssh.c
+++ b/ssh.c
@@ -40,7 +40,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh.c,v 1.174 2002/05/23 19:39:34 markus Exp $");
+RCSID("$OpenBSD: ssh.c,v 1.175 2002/06/08 05:07:56 markus Exp $");
 
 #include <openssl/evp.h>
 #include <openssl/err.h>
@@ -717,14 +717,6 @@
 	 * user's home directory if it happens to be on a NFS volume where
 	 * root is mapped to nobody.
 	 */
-
-	/*
-	 * Note that some legacy systems need to postpone the following call
-	 * to permanently_set_uid() until the private hostkey is destroyed
-	 * with RSA_free().  Otherwise the calling user could ptrace() the
-	 * process, read the private hostkey and impersonate the host.
-	 * OpenBSD does not allow ptracing of setuid processes.
-	 */
 	permanently_set_uid(pw);
 
 	/*