[Bug 3853] New: Potential Match User block evasion for kerberos realm users
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Thu Jul 31 22:54:49 AEST 2025
https://bugzilla.mindrot.org/show_bug.cgi?id=3853
Bug ID: 3853
Summary: Potential Match User block evasion for kerberos realm
users
Product: Portable OpenSSH
Version: 10.0p2
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: zlatistiv at gmail.com
I have a Linux server joined in Microsoft Active Directory
I have enforced only lowercase letters for usernames through PAM to
avoid the pitfall where due to the case-insensitivity of AD the "Match
User" block can be skipped,
which from what I've read is expected and is not an issue of openssh,
but there seems to be 1 more tricky condition,
which is when the user precedes their username with the domain, as in
"ssh <domain>\\<username>@<server name>"
Doing this, their username will not match the "Match User" block.
I'm not completely sure whether this is expected behavior or not, but
backslashes are not valid for unix usernames, so perhaps the preceding
<domain>\\ should be ignored?
--
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list