Date: Sat, 2 Sep 2000 18:09:48 -0400 (EDT) From: Robert Watson <rwatson@FreeBSD.ORG> To: "Jacques A. Vidrine" <n@nectar.com> Cc: Neil Blakey-Milner <nbm@mithrandr.moria.org>, Dan Nelson <dnelson@emsphone.com>, sthaug@nethelp.no, phk@critter.freebsd.dk, ume@FreeBSD.ORG, arch@FreeBSD.ORG Subject: Re: setuid ssh should die (Re: Request for review: nsswitch) Message-ID: <Pine.NEB.3.96L.1000902180724.60028G-100000@fledge.watson.org> In-Reply-To: <20000902164819.B1497@hamlet.nectar.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 2 Sep 2000, Jacques A. Vidrine wrote: > On Sat, Sep 02, 2000 at 05:45:14PM -0400, Robert Watson wrote: > > > @@ -546,6 +546,10 @@ > > > } > > > /* Disable rhosts authentication if not running as root. */ > > > if (original_effective_uid != 0 || !options.use_privileged_port) { > > > + if (options.rhosts_authentication || > > > + options.rhosts_rsa_authentication) > > > + log("Warning: rhosts disabled - " > > > + "insufficient privileges"); > > > options.rhosts_authentication = 0; > > > options.rhosts_rsa_authentication = 0; > > > } > > > > That sucks. Don't do that. :-) > > I didn't. That is a patch for OpenSSH's ssh.c, just adding a warning. Sorry about that -- in any case, we should probably correct that issue. If no one else does, I'll get to it on the capability patch sooner or later. I've been picking up a lot of similar limits elsewhere in the system: it's fine for userland applications to use uid's to enforce application policies, but short-circuiting kernel access control results in userland can make it difficult to modify the kernel policy later. The two policy realms are really fairly different: su's wheel limitation for root access is an example of an application policy limiting the scope of access to kernel resources in a useful way. SSH checking whether it thinks the kernel will let it read a key file or bind a port is less so. Robert N M Watson robert@fledge.watson.org http://www.watson.org/~robert/ PGP key fingerprint: AF B5 5F FF A6 4A 79 37 ED 5F 55 E9 58 04 6A B1 TIS Labs at Network Associates, Safeport Network Services To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-arch" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1000902180724.60028G-100000>