Bug 25572

Summary: sshd core dump
Product: Base System Reporter: curtis <curtis>
Component: binAssignee: Dag-Erling Smørgrav <des>
Status: Closed FIXED    
Severity: Affects Only Me    
Priority: Normal    
Version: Unspecified   
Hardware: Any   
OS: Any   

Description curtis 2001-03-06 20:20:01 UTC
I typed "slogin laptoy770-ether" without the "-l root" which would
have slogin attempt to login as a user who was not yet in the
/etc/master.passwd file.  At that point sshd dumped core.

This is not a big problem for me since I normally move a few public
keys over disable PasswordAuthentication and go with DSAAuthentication
but maintainers of sshd might want to look at the core dump.

How-To-Repeat: 
This is just before I changed PermitRootLogin to yes.  The sshd_config
file contained:

# This is ssh server systemwide configuration file.
#
# $FreeBSD: src/crypto/openssh/sshd_config,v 1.4.2.5 2001/01/18
#22:36:53 green Exp $

Port 22
#Protocol 2,1
#ListenAddress 0.0.0.0
#ListenAddress ::
HostKey /etc/ssh/ssh_host_key
HostDsaKey /etc/ssh/ssh_host_dsa_key
ServerKeyBits 768
LoginGraceTime 120
KeyRegenerationInterval 3600
PermitRootLogin no
# ConnectionsPerPeriod has been deprecated completely

# After 10 unauthenticated connections, refuse 30% of the new ones,
  and
# refuse any more than 60 total.
MaxStartups 10:30:60
# Don't read ~/.rhosts and ~/.shosts files
IgnoreRhosts yes
# Uncomment if you don't trust ~/.ssh/known_hosts for
  RhostsRSAAuthentication
#IgnoreUserKnownHosts yes
StrictModes yes
X11Forwarding yes
X11DisplayOffset 10
PrintMotd yes
KeepAlive yes

# Logging
SyslogFacility AUTH
LogLevel INFO
#obsoletes QuietMode and FascistLogging

RhostsAuthentication no
#
# For this to work you will also need host keys in
/etc/ssh_known_hosts
RhostsRSAAuthentication no
#
RSAAuthentication yes

# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication yes
PermitEmptyPasswords no
# Uncomment to disable s/key passwords 
#SkeyAuthentication no
#KbdInteractiveAuthentication yes

# To change Kerberos options
#KerberosAuthentication no
#KerberosOrLocalPasswd yes
#AFSTokenPassing no
#KerberosTicketCleanup no

# Kerberos TGT Passing does only work with the AFS kaserver
#KerberosTgtPassing yes

CheckMail yes
#UseLogin no

# Uncomment if you want to enable sftp
#Subsystem      sftp    /usr/libexec/sftp-server

To reproduce the problem, attempt to slogin from an ordinary user
account where the uid does not exist on the machine being logged into.
Core file available on request.
Comment 1 Poul-Henning Kamp freebsd_committer freebsd_triage 2001-04-04 08:38:57 UTC
Responsible Changed
From-To: gnats-admin->freebsd-bugs

over to bugs
Comment 2 Poul-Henning Kamp freebsd_committer freebsd_triage 2001-04-04 08:38:57 UTC
Responsible Changed
From-To: gnats-admin->freebsd-bugs

over to bugs
Comment 3 Poul-Henning Kamp freebsd_committer freebsd_triage 2001-04-04 08:38:57 UTC
Responsible Changed
From-To: gnats-admin->freebsd-bugs

over to bugs
Comment 4 Poul-Henning Kamp freebsd_committer freebsd_triage 2001-04-04 08:38:57 UTC
Responsible Changed
From-To: gnats-admin->freebsd-bugs

over to bugs
Comment 5 Poul-Henning Kamp freebsd_committer freebsd_triage 2001-04-04 08:38:57 UTC
Responsible Changed
From-To: gnats-admin->freebsd-bugs

over to bugs
Comment 6 Kris Kennaway freebsd_committer freebsd_triage 2003-07-13 01:57:31 UTC
Responsible Changed
From-To: freebsd-bugs->des

Assign to SSH maintainer
Comment 7 Dag-Erling Smørgrav 2003-07-14 11:41:04 UTC
Does this still occur with more recent versions of FreeBSD / OpenSSH?

DES
--=20
Dag-Erling Sm=F8rgrav - des@des.no
Comment 8 Dag-Erling Smørgrav freebsd_committer freebsd_triage 2003-08-19 11:51:16 UTC
State Changed
From-To: open->closed

Feedback timeout.