[Bug 2311] simple attack when control channel muxing is used

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Thu Dec 11 15:19:46 EST 2014


https://bugzilla.mindrot.org/show_bug.cgi?id=2311

Damien Miller <djm at mindrot.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|---                         |WONTFIX
                 CC|                            |djm at mindrot.org
             Status|NEW                         |RESOLVED

--- Comment #4 from Damien Miller <djm at mindrot.org> ---
As I mentioned, root being able to access user sockets is intentional
behaviour. I'm not interested in adding additional checks to prevent
this - they would need to be behind an option to avoid breaking
existing, legitimate uses and I don't believe that the maintenance and
complexity cost of a new config option is warranted.

Don't use shared directories for mux sockets.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list