[Bug 117] New: OpenSSH second-guesses PAM

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Fri Feb 15 09:56:26 EST 2002


http://bugzilla.mindrot.org/show_bug.cgi?id=117

           Summary: OpenSSH second-guesses PAM
           Product: Portable OpenSSH
           Version: -current
          Platform: Other
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: sshd
        AssignedTo: openssh-unix-dev at mindrot.org
        ReportedBy: abartlet at samba.org


As I described in bug 114, OpenSSH makes assumptions about how PAM operates, and
denies it acess to potentially critical information about failed logins. 

This problem occurs if you want to use PAM to obtain a consistant audit history
across all system deamons - OpenSSH traditionally would not even start PAM, and
now starts it specifying 'NOUSER' as the login name.

I feel that the correct behaviour is to always call PAM.  There are two
particular reasons:  Firstly, it ensures that PAM gets to decide that a user is
invalid, and log it appropriatly.  OpenSSH can add its own checks to the top,
but the first decision should be with PAM.

The second is to prevent username guessing attacks - by always calling PAM the
system should always suffer the same timeouts/delays no matter the existance of
the attempted login.

Another (almost certainly less convincing) reason is that it would make it
easier for sombody to write an OpenSSH based deamon that didn't service logins -
like an authenticated proxy service that uses SSH for secure transport to the
firewall.  In this case the user almost certainly doesn't exist locally, but PAM
can still be useful for authenticaion.  (OK, so this is really oddball, but my
main concern is the first two reasons).



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the openssh-unix-dev mailing list