| Summary: | sshd fails when / mounted read-only | ||
|---|---|---|---|
| Product: | Base System | Reporter: | Archie Cobbs <archie> |
| Component: | bin | Assignee: | Brian Feldman <green> |
| Status: | Closed FIXED | ||
| Severity: | Affects Only Me | ||
| Priority: | Normal | ||
| Version: | 4.3-RELEASE | ||
| Hardware: | Any | ||
| OS: | Any | ||
|
Description
Archie Cobbs
2001-04-30 21:30:00 UTC
On Mon, Apr 30, 2001 at 01:21:31PM -0700, Archie Cobbs wrote:
> This patch fixes the problem, but may cause other
> security problems (or may not, I'm not sure):
In fact it does; if the ownership and permissions of pty devices isn't
changed it allows any other users on the system to read and write to
that pty, snooping passwords and the like. The real solution would be
to use devfs or mount your /dev on a MFS or something (with a minimal
static /dev on / to handle bootstrapping).
Kris
Kris Kennaway wrote: > > This patch fixes the problem, but may cause other > > security problems (or may not, I'm not sure): > > In fact it does; if the ownership and permissions of pty devices isn't > changed it allows any other users on the system to read and write to > that pty, snooping passwords and the like. The real solution would be > to use devfs or mount your /dev on a MFS or something (with a minimal > static /dev on / to handle bootstrapping). So, how about a flag to sshd to make it allow this behavior with suitably strong warnings in the man page? Also, how come e.g. telnetd doesn't have the same problem? If telnetd can work why can't sshd? -Archie __________________________________________________________________________ Archie Cobbs * Packet Design * http://www.packetdesign.com On Wed, May 02, 2001 at 03:38:07PM -0700, Archie Cobbs wrote: > Kris Kennaway wrote: > > > This patch fixes the problem, but may cause other > > > security problems (or may not, I'm not sure): > > > > In fact it does; if the ownership and permissions of pty devices isn't > > changed it allows any other users on the system to read and write to > > that pty, snooping passwords and the like. The real solution would be > > to use devfs or mount your /dev on a MFS or something (with a minimal > > static /dev on / to handle bootstrapping). > > So, how about a flag to sshd to make it allow this behavior with > suitably strong warnings in the man page? I'm not sure about this..our ssh code is already difficult enough to update because of divergences. It would be up to Brian. > Also, how come e.g. telnetd doesn't have the same problem? If telnetd > can work why can't sshd? Not immediately sure. Kris Kris Kennaway wrote: > > Kris Kennaway wrote: > > > > This patch fixes the problem, but may cause other > > > > security problems (or may not, I'm not sure): > > > > > > In fact it does; if the ownership and permissions of pty devices isn't > > > changed it allows any other users on the system to read and write to > > > that pty, snooping passwords and the like. The real solution would be > > > to use devfs or mount your /dev on a MFS or something (with a minimal > > > static /dev on / to handle bootstrapping). > > > > So, how about a flag to sshd to make it allow this behavior with > > suitably strong warnings in the man page? > > I'm not sure about this..our ssh code is already difficult enough to > update because of divergences. It would be up to Brian. > > > Also, how come e.g. telnetd doesn't have the same problem? If telnetd > > can work why can't sshd? > > Not immediately sure. ...so either telnetd has a security hole, or this bug can be fixed without lessening security. Either way, we should do something.. :-) It seems like it should be OK to leave the tty owned by root/wheel (if that's who owns it) because they are a secure user and group..? I.e., if either one is broken then you have larger security problems to worry about. -Archie __________________________________________________________________________ Archie Cobbs * Packet Design * http://www.packetdesign.com Responsible Changed From-To: freebsd-bugs->green green is the SSH maintainer State Changed From-To: open->closed Fixed in newer versions. |