132f8f8
diff -up openssh-6.8p1/sftp-server.8.sftp-force-mode openssh-6.8p1/sftp-server.8
132f8f8
--- openssh-6.8p1/sftp-server.8.sftp-force-mode	2015-03-17 06:49:20.000000000 +0100
132f8f8
+++ openssh-6.8p1/sftp-server.8	2015-03-18 13:18:05.898306477 +0100
132f8f8
@@ -38,6 +38,7 @@
558fb7b
 .Op Fl P Ar blacklisted_requests
558fb7b
 .Op Fl p Ar whitelisted_requests
558fb7b
 .Op Fl u Ar umask
558fb7b
+.Op Fl m Ar force_file_perms
558fb7b
 .Ek
558fb7b
 .Nm
558fb7b
 .Fl Q Ar protocol_feature
132f8f8
@@ -138,6 +139,10 @@ Sets an explicit
558fb7b
 .Xr umask 2
558fb7b
 to be applied to newly-created files and directories, instead of the
558fb7b
 user's default mask.
558fb7b
+.It Fl m Ar force_file_perms
558fb7b
+Sets explicit file permissions to be applied to newly-created files instead
558fb7b
+of the default or client requested mode.  Numeric values include:
558fb7b
+777, 755, 750, 666, 644, 640, etc.  Option -u is ineffective if -m is set.
558fb7b
 .El
558fb7b
 .Pp
558fb7b
 On some systems,
132f8f8
diff -up openssh-6.8p1/sftp-server.c.sftp-force-mode openssh-6.8p1/sftp-server.c
132f8f8
--- openssh-6.8p1/sftp-server.c.sftp-force-mode	2015-03-18 13:18:05.883306513 +0100
132f8f8
+++ openssh-6.8p1/sftp-server.c	2015-03-18 13:18:36.697232193 +0100
132f8f8
@@ -70,6 +70,10 @@ struct sshbuf *oqueue;
558fb7b
 /* Version of client */
558fb7b
 static u_int version;
558fb7b
 
558fb7b
+/* Force file permissions */
558fb7b
+int permforce = 0;
558fb7b
+long permforcemode;
558fb7b
+
558fb7b
 /* SSH2_FXP_INIT received */
558fb7b
 static int init_done;
558fb7b
 
132f8f8
@@ -693,6 +697,10 @@ process_open(u_int32_t id)
132f8f8
 	debug3("request %u: open flags %d", id, pflags);
558fb7b
 	flags = flags_from_portable(pflags);
132f8f8
 	mode = (a.flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a.perm : 0666;
558fb7b
+	if (permforce == 1) {   /* Force perm if -m is set */
558fb7b
+		mode = permforcemode;
558fb7b
+		(void)umask(0); /* so umask does not interfere		 */
558fb7b
+	}	
558fb7b
 	logit("open \"%s\" flags %s mode 0%o",
558fb7b
 	    name, string_from_portable(pflags), mode);
558fb7b
 	if (readonly &&
132f8f8
@@ -1495,7 +1503,7 @@ sftp_server_usage(void)
558fb7b
 	fprintf(stderr,
558fb7b
 	    "usage: %s [-ehR] [-d start_directory] [-f log_facility] "
558fb7b
 	    "[-l log_level]\n\t[-P blacklisted_requests] "
558fb7b
-	    "[-p whitelisted_requests] [-u umask]\n"
558fb7b
+	    "[-p whitelisted_requests] [-u umask] [-m force_file_perms]\n"
558fb7b
 	    "       %s -Q protocol_feature\n",
558fb7b
 	    __progname, __progname);
558fb7b
 	exit(1);
132f8f8
@@ -1520,7 +1528,7 @@ sftp_server_main(int argc, char **argv,
558fb7b
 	pw = pwcopy(user_pw);
558fb7b
 
558fb7b
 	while (!skipargs && (ch = getopt(argc, argv,
558fb7b
-	    "d:f:l:P:p:Q:u:cehR")) != -1) {
558fb7b
+	    "d:f:l:P:p:Q:u:m:cehR")) != -1) {
558fb7b
 		switch (ch) {
558fb7b
 		case 'Q':
558fb7b
 			if (strcasecmp(optarg, "requests") != 0) {
132f8f8
@@ -1580,6 +1588,15 @@ sftp_server_main(int argc, char **argv,
558fb7b
 				fatal("Invalid umask \"%s\"", optarg);
558fb7b
 			(void)umask((mode_t)mask);
558fb7b
 			break;
558fb7b
+		case 'm':
558fb7b
+			/* Force permissions on file received via sftp */
558fb7b
+			permforce = 1;
558fb7b
+			permforcemode = strtol(optarg, &cp, 8);
558fb7b
+			if (permforcemode < 0 || permforcemode > 0777 ||
558fb7b
+			    *cp != '\0' || (permforcemode == 0 &&
558fb7b
+			    errno != 0))
558fb7b
+				fatal("Invalid file mode \"%s\"", optarg);
558fb7b
+			break;
558fb7b
 		case 'h':
558fb7b
 		default:
558fb7b
 			sftp_server_usage();