Upcoming OpenSSH vulnerability
Theo de Raadt
deraadt at cvs.openbsd.org
Wed Jun 26 10:23:52 EST 2002
Obviously you can't think this thing through. Everyone who
understands, please educate him. I'm sick of people who are not
thinking this through.
> Date: Tue, 25 Jun 2002 16:47:03 -0500
> From: "Douglas E. Engert" <deengert at anl.gov>
> X-Mailer: Mozilla 4.79 [en] (Windows NT 5.0; U)
> X-Accept-Language: en
> MIME-Version: 1.0
> CC: openssh-unix-dev at mindrot.org, openssh at openbsd.org
> Subject: Upcoming OpenSSH vulnerability
> References: <20020625104024.GA29885 at faui02> <20020625171724.GA2020 at jenny.crlsca.adelphia.net>
> Content-Type: text/plain; charset=us-ascii
> Content-Transfer-Encoding: 7bit
>
> >From all of the e-mail recently, it appears that the "solution" to the
> upcomming OpenSSH vulnerability will be to run OpenSSH-3.3 with the Privilege
> Separation enabled.
>
> This scares the daylights out of me! Think about what you are doing here.
>
> (1) OpenSSH 3.3 with the privsep code has been only out for less then a week.
>
> (2) Its hundreds of lines of code.
>
> (3) The privsep does not run on all platforms
>
> (4) The privsep does not work with all the features in current ssh.
>
> (5) The privsep code has SSHD using here-to-for unused operating system features.
>
> (6) People with local modifications to SSH may not be able to
> integrate them in such a short time frame.
>
> Don't get me wrong, the privsep concept looks like a great idea, as a second
> line of defense. But it should not be the primary defense.
>
> A fix is needed for the original bug. You still need it to keep the hackers
> off the machine. Saying that they are confined to the unprivileged child process
> still lets then have access to cycles and the network where they can try and
> attack the operating system and your network from inside.
>
> The other aspect of this is the reliability of 3.3. With all the new code
> what other problems might be introduced?
>
> If you publish the problem, with out a real fix, and expect everyone to
> implement 3.3 with privsep you will have a lot of people upset who can't run 3.3 or
> can't run the privsep code. These people will be left out in the cold.
>
> You need to provide a universal fix for all, not a partial fix for only some.
>
> Thanks for listening.
>
> --
>
> Douglas E. Engert <DEEngert at anl.gov>
> Argonne National Laboratory
> 9700 South Cass Avenue
> Argonne, Illinois 60439
> (630) 252-5444
More information about the openssh-unix-dev
mailing list