Feature Request (re: CVE-2023-3840)

Jochen Bern Jochen.Bern at binect.de
Thu Jul 20 16:31:12 AEST 2023


On 19.07.23 16:40, Damien Miller wrote:
> Exploitation can also be prevented by starting ssh-agent(1) with an
> empty PKCS#11/FIDO allowlist (ssh-agent -P '') or by configuring
> an allowlist that contains only specific provider libraries.

Upon trying to deploy such a workaround, I found that the call to 
ssh-agent(1) nowadays is hidden *ridiculously* deep in the GUI startup 
mechanisms. (As in, did "find | xargs grep ssh-agent" and such across 
the entire OS install and *still* haven't found it.)

Feature request: Please consider giving ssh-agent(1) a config file(s) to 
drop at least the potentially security-relevant options into.

(One would think that when the maintainers of hulking package X call out 
to an executable of entirely different package Y that has a nontrivial 
command line syntax, it'd be a no-brainer to put an X-maintained wrapper 
script in between, just in case that the maintainers of Y pull an 
ncat(1) and rename a bunch of options, but noooo ...)

Kind regards,
-- 
Jochen Bern
Systemingenieur

Binect GmbH
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3449 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20230720/e57676be/attachment-0001.p7s>


More information about the openssh-unix-dev mailing list