Re: time to fix silly ssh bug

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 6/19/12 11:02 AM, Kevin Kofler wrote:
Neal Becker wrote:
Jun 19 09:44:41 nbecker5 sshd[25418]: Authentication refused: bad
ownership or modes for directory /home/nbecker

Looks like a new change in OpenSSH then, which is IMHO a regression, unless
there's a clear security vulnerability being addressed there.

So, having actually bothered to read and think about the code now, the thing it's addressing is that if we're in the same group I can rename directories in your ~. If there are any other files you own but I can write to (in directories I can write to), then I can clobber them with my pubkey and rename them to authorized_keys. If there's another directory you own but I can write to, I can install that directory as your ~/.ssh. Then I ssh to the machine with my own pubkey and suddenly I can log in as you.

Which isn't normally a thing, the way we work, because the group that owns your ~/.ssh is composed solely of you. But sshd doesn't do the getgrent() thing to verify that, so it has no choice but to assume that group-writable directories are potential uid escalation attacks.

The code's not wrong, it's just perhaps not as right as it could be.

That said, since one's ~ is normally group-owned by a group consisting solely of one user, defaulting it to 755 instead of 775 would make sshd happy without any real side effects.

- ajax
--
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux