Date: Sat, 2 Sep 2000 18:09:48 -0400 (EDT) From: Robert Watson <rwatson@FreeBSD.ORG> To: "Jacques A. Vidrine" <n@nectar.com> Cc: Neil Blakey-Milner <nbm@mithrandr.moria.org>, Dan Nelson <dnelson@emsphone.com>, sthaug@nethelp.no, phk@critter.freebsd.dk, ume@FreeBSD.ORG, arch@FreeBSD.ORG Subject: Re: setuid ssh should die (Re: Request for review: nsswitch) Message-ID: <Pine.NEB.3.96L.1000902180724.60028G-100000@fledge.watson.org> In-Reply-To: <20000902164819.B1497@hamlet.nectar.com>
index | next in thread | previous in thread | raw e-mail
On Sat, 2 Sep 2000, Jacques A. Vidrine wrote:
> On Sat, Sep 02, 2000 at 05:45:14PM -0400, Robert Watson wrote:
> > > @@ -546,6 +546,10 @@
> > > }
> > > /* Disable rhosts authentication if not running as root. */
> > > if (original_effective_uid != 0 || !options.use_privileged_port) {
> > > + if (options.rhosts_authentication ||
> > > + options.rhosts_rsa_authentication)
> > > + log("Warning: rhosts disabled - "
> > > + "insufficient privileges");
> > > options.rhosts_authentication = 0;
> > > options.rhosts_rsa_authentication = 0;
> > > }
> >
> > That sucks. Don't do that. :-)
>
> I didn't. That is a patch for OpenSSH's ssh.c, just adding a warning.
Sorry about that -- in any case, we should probably correct that issue.
If no one else does, I'll get to it on the capability patch sooner or
later. I've been picking up a lot of similar limits elsewhere in the
system: it's fine for userland applications to use uid's to enforce
application policies, but short-circuiting kernel access control results
in userland can make it difficult to modify the kernel policy later. The
two policy realms are really fairly different: su's wheel limitation for
root access is an example of an application policy limiting the scope of
access to kernel resources in a useful way. SSH checking whether it
thinks the kernel will let it read a key file or bind a port is less so.
Robert N M Watson
robert@fledge.watson.org http://www.watson.org/~robert/
PGP key fingerprint: AF B5 5F FF A6 4A 79 37 ED 5F 55 E9 58 04 6A B1
TIS Labs at Network Associates, Safeport Network Services
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-arch" in the body of the message
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1000902180724.60028G-100000>
