From owner-freebsd-security@FreeBSD.ORG Sun Oct 27 18:58:05 2013 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 96C4E123 for ; Sun, 27 Oct 2013 18:58:05 +0000 (UTC) (envelope-from az@azsupport.com) Received: from as1.azsupport.com (azsupport.com [74.52.186.194]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 781B726A4 for ; Sun, 27 Oct 2013 18:58:04 +0000 (UTC) Received: from localhost (unknown [109.75.144.107]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by as1.azsupport.com (Postfix) with ESMTPSA id BB7143AF; Sun, 27 Oct 2013 19:57:57 +0100 (CET) Date: Sun, 27 Oct 2013 19:57:55 +0100 From: Andrei To: freebsd-security@freebsd.org, des@des.no Subject: Re: OpenPAM/SSHD privacy hole (FreeBSD 9.2+ affected) Message-ID: <20131027195755.00b0cb2c@azsupport.com> In-Reply-To: <86y55emw8a.fsf@nine.des.no> References: <20131023135408.38752099@azsupport.com> <1382529986.729788.498652166.90148.2@c-st.net> <86y55emw8a.fsf@nine.des.no> Organization: azsupport.com X-Mailer: Claws Mail 3.9.2 (GTK+ 2.24.19; amd64-portbld-freebsd10.0) Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Oct 2013 18:58:05 -0000 On Sun, 27 Oct 2013 18:58:45 +0100 Dag-Erling Sm=C3=B8rgrav wrote: > >> I found that in the new FreeBSD 9.2 (probably in 10 also) updated > >> OpenPAM sources. The big embarrassment was in pam_get_authtok.c. > >> The problem is that even without a valid SSH login it's possible > >> to know the server's hostname. > > I agree. That looks like an unnecessary privacy violation to me. > > What do you think des@? >=20 > No. This is intentional, and I will not change it. If you don't like > it, you can override the default prompt in your PAM policy; see the > pam_get_authtok() man page for details. In /etc/pam.d/sshd from: auth required pam_unix.so no_warn try_first_p= ass to: auth required pam_unix.so no_warn try_first_p= ass authtok_prompt Right? Kind regards, Andrei.