Upcoming OpenSSH vulnerability

Ben Lindstrom mouring at etoh.eviladmin.org
Thu Jun 27 04:45:59 EST 2002


[..]
> > > diff -urN openssh-3.4p1-dist/sshd.c openssh-3.4p1/sshd.c
> > > --- openssh-3.4p1-dist/sshd.c	Tue Jun 25 18:24:19 2002
> > > +++ openssh-3.4p1/sshd.c	Wed Jun 26 10:42:00 2002
> > > @@ -624,7 +624,7 @@
> > >  	/* XXX - Remote port forwarding */
> > >  	x_authctxt = authctxt;
> > >
> > > -#ifdef BROKEN_FD_PASSING
> > > +#if defined(BROKEN_FD_PASSING) || defined(HAVE_OSF_SIA)
> > >  	if (1) {
> >
> > No.  Fix Configure.ac.  There is a reason Tim and I agreed on
> > that define.  So we don't have to litter the source with more #ifdef
> > changes.
>
> Then name the define something else, like "NO_POSTAUTH_PRIVSEP", and
> auto-define it if BROKEN_FD_PASSING is defined.  FD passing is not
> broken on Tru64 (4.x or 5.x as far as I can tell).  If something else is
> added in the future that uses FD passing, it should be supported on
> Tru64, so Tru64 should not set BROKEN_FD_PASSING in configure.ac.
>

It will be left at BROKEN_FD_PASSING because when all platforms are
sqaured away that will be what is set if we run accross such a platform.
No one said what was going in 3.4 was set in stone for changes.=)


> > Better yet now we are post 3.4 we need a real solution.
>
> As I said above, I don't see how to do post-auth privsep on Tru64.  The
> requirements just don't seem to match the capabilities.  The only thing
> I can see to do is to open a PTY unconditionally before post-auth
> privsep and close it later if it is not needed (but I don't know for
> sure that would work either).  That would be a fairly major change;
> would such a change be accepted back into "core" OpenSSH?
>

If you can get a preview fix posted.  I'll work within the OpenSSH porable
group to ensure that some version of it gets included.

If that preview fix says 'we always open a temporary TTY' then so be it.
We can look at how to handle non-tty case handled after.

- Ben




More information about the openssh-unix-dev mailing list