Upcoming OpenSSH vulnerability

Chris Adams cmadams at hiwaay.net
Thu Jun 27 04:50:46 EST 2002


Once upon a time, Ben Lindstrom <mouring at etoh.eviladmin.org> said:
> > 1) I've done most of the work getting OpenSSH working on Tru64 Unix, not
> >    any "vendor".  Compaq^WHP doesn't support OpenSSH because they've got
> >    a license for SSH.com's software and make that version available for
> >    free for Tru64 (I don't use it because I prefer OpenSSH).  Telling
> >    them to fix something they not only don't support but supply a
> >    different implementation of is not real bright.
> 
> HP/Compaq uses OpenSSH in their routers and switches.

I really don't think they use Tru64 Unix in their routers and switches,
nor are any of the same people involved.

> > 2) What happened to the interim release on Friday?  I (as everyone is)
> >    am very busy, and allocated my time according to what was said.  I
> >    did submit a patch late Tuesday, but it was not included (hence,
> >    privsep still does not work on Tru64).  There was a "test" release
> >    for a few hours last night (sorry, I guess I'm deficient because I
> >    need sleep).  The following patch is still needed on Tru64 (not
> >    because FD passing is broken but because audit and enhanced security
> >    modes require root in the session setup, and if a PTY is allocated,
> >    the session setup needs to be done after PTY allocation - I don't see
> >    how to make that work with privsep):
> 
> Say thank you to who ever leaked the expliot.

Sorry, I wasn't aware of that.  It would have been nice if that had been
at least mentioned in the release notes or something, since it was a
significant change from the previously announced schedule.

> Next track them down and cut their hands off.

That I would love to do.

> > diff -urN openssh-3.4p1-dist/sshd.c openssh-3.4p1/sshd.c
> > --- openssh-3.4p1-dist/sshd.c	Tue Jun 25 18:24:19 2002
> > +++ openssh-3.4p1/sshd.c	Wed Jun 26 10:42:00 2002
> > @@ -624,7 +624,7 @@
> >  	/* XXX - Remote port forwarding */
> >  	x_authctxt = authctxt;
> >
> > -#ifdef BROKEN_FD_PASSING
> > +#if defined(BROKEN_FD_PASSING) || defined(HAVE_OSF_SIA)
> >  	if (1) {
> 
> No.  Fix Configure.ac.  There is a reason Tim and I agreed on
> that define.  So we don't have to litter the source with more #ifdef
> changes.

Then name the define something else, like "NO_POSTAUTH_PRIVSEP", and
auto-define it if BROKEN_FD_PASSING is defined.  FD passing is not
broken on Tru64 (4.x or 5.x as far as I can tell).  If something else is
added in the future that uses FD passing, it should be supported on
Tru64, so Tru64 should not set BROKEN_FD_PASSING in configure.ac.

> Better yet now we are post 3.4 we need a real solution.

As I said above, I don't see how to do post-auth privsep on Tru64.  The
requirements just don't seem to match the capabilities.  The only thing
I can see to do is to open a PTY unconditionally before post-auth
privsep and close it later if it is not needed (but I don't know for
sure that would work either).  That would be a fairly major change;
would such a change be accepted back into "core" OpenSSH?

-- 
Chris Adams <cmadams at hiwaay.net>
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.



More information about the openssh-unix-dev mailing list