Read-only on /dev/tty causes ssh-add to show passwords when typed and ssh'ing to new hosts to fail

Gert Doering gert at greenie.muc.de
Mon Jul 21 17:10:12 EST 2014


Hi,

On Mon, Jul 21, 2014 at 09:49:10AM +1000, Damien Miller wrote:
> > On Sun, Jul 20, 2014 at 08:01:42PM +1000, Damien Miller wrote:
> > > There isn't much ssh can do with bad permissions on /dev/tty.
> > 
> > Well - you could issue an error message and die.
> > 
> > Termios operation on stdin(-connected-to-a-tty) do not need /dev/tty, so
> 
> we can't depend on stdin as tty. Otherwise "ssh foo < /somefile" wouldn't
> work.

Understood.  I think we're slightly misunderstanding each other - I was
only explaining why the success or failure of termios operations is 
(generally) independent from the permissions of /dev/tty.

> > there must be some explicit open() somewhere - and if that fails, do not
> > go on.  Without having checked the code, it might be some sort of corner
> > case ("if this fails we do not have a controlling tty, so use stdin instead
> > and do not try to turn off echo instead!" - not differenciating between
> > the error for "no controlling tty" and "broken permissions").
> 
> that sounds like a whole lot of special cases to deal with someone who
> has broken their /dev

Well, you already *have* that special case - "if /dev/tty isn't working,
assume we do not have a controlling tty and use stdin".  The question is
whether you can (and want to) distinguish "I have no controlling tty"
from "/dev/tty is messed up -> print error and die".

gert

-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             gert at greenie.muc.de
fax: +49-89-35655025                        gert at net.informatik.tu-muenchen.de


More information about the openssh-unix-dev mailing list