Re: Does a known security issue allow ssh login via system accounts?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Hi Whit,

Did you solve the riddle already? When not, maybe use another
approach? My favorite is:

"HAL: I would recommend that we put the unit back in operation
and let it fail." (http://miscel.wikidot.com/2001-transcript)

Could you enable the old state with the spurious login being
possible again (maybe blocking external SSH access to the machine
for a moment), attach to the SSH root process by calling something
like

strace -o x.dump -s1024 -vvv -f -tt -p [pid]

and then try yourself to perform a password login as backup
to the machine?

Then hook SSH on another machine in the similar way and login
there too. Then compare the two dumps. If you you do not easily
see the difference try focusing only on the output of the PID
running the login process. Maybe also create to text files
with only the syscall names from both attempts and "diff" them
to see when things start getting weird.

If the syscall sequence is identical, the mmaps might be interesting
to compare. With same software version, the PROT_x flags and
also the file offsets should be identical. Differences indicate
backdoored libraries, sometimes even unmasking kernel root kits
hiding that changes with normal command line ls/stat - what might
be unlikely on a host just used for spamming. For that kind of
analysis grep "mmap" and sed works best (get rid of ASLR entropy
with sed).

Kind regards,
hd
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux