[Bug 2311] simple attack when control channel muxing is used
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Thu Dec 11 15:19:46 EST 2014
https://bugzilla.mindrot.org/show_bug.cgi?id=2311
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |WONTFIX
CC| |djm at mindrot.org
Status|NEW |RESOLVED
--- Comment #4 from Damien Miller <djm at mindrot.org> ---
As I mentioned, root being able to access user sockets is intentional
behaviour. I'm not interested in adding additional checks to prevent
this - they would need to be behind an option to avoid breaking
existing, legitimate uses and I don't believe that the maintenance and
complexity cost of a new config option is warranted.
Don't use shared directories for mux sockets.
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list