Considering shipping ssh-keysign non-setuid
Theo de Raadt
deraadt at openbsd.org
Fri May 15 23:53:33 AEST 2026
I'm pretty sure that would be a mistake.
The problem is not ssh-keysign.
It is a kernel bug.
It affects any setuid program and it is my understanding that a typical
Linux ships with almost a hundred of those.
It is also my understanding that this bug (set of bugs really) does not
just affect setuid binaries, but is already being extended to create other
artifacts.
> In light of things like
> https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn and the general
> attack surface of set-id, I'm considering changing Debian's OpenSSH
> packaging to ship ssh-keysign non-setuid, and patching the
> documentation to tell users that they need to make it setuid root
> (using a Debian-specific tool that causes that kind of change to be
> preserved across upgrades) if they want to use host-based
> authentication. My sense is that host-based authentication is quite
> niche these days and that it already involves a certain amount of
> specialized setup anyway.
>
> As far as upgrade considerations go, ssh-keysign is client-side, so
> there should be no risk of making people's machines inaccessible on
> upgrade. We could possibly detect whether `EnableSSHKeysign yes` is
> already set in the client configuration and preserve the setuid bit in
> that case.
>
> Would the upstream developers have any objection to this
> configuration? It would be a difference from what `make install` does
> and it's possible that it might result in the odd stray support
> request, so it seemed polite to check.
>
> Alternatively (or additionally), I'm considering splitting ssh-keysign
> out to a separate `openssh-keysign` package, since most users don't
> need to have it installed at all.
>
> It looks as though Fedora does both these things (a separate package,
> and no setuid bit). They seem to have no documentation of how to make
> ssh-keysign persistently setuid on systems that require it, at least
> not in their packaging.
>
> Thanks,
>
> --
> Colin Watson (he/him) [cjwatson at debian.org]
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
More information about the openssh-unix-dev
mailing list