From owner-freebsd-security@FreeBSD.ORG Thu Nov 13 01:42:44 2003 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 69E0816A4CE for ; Thu, 13 Nov 2003 01:42:44 -0800 (PST) Received: from relay.netbox.cz (relay.netbox.cz [212.96.166.9]) by mx1.FreeBSD.org (Postfix) with ESMTP id D597D43FCB for ; Thu, 13 Nov 2003 01:42:42 -0800 (PST) (envelope-from unix_list@post.cz) Received: from localhost (localhost [127.0.0.1]) by localhost.netbox.cz (Postfix) with ESMTP id 1636837BA4 for ; Thu, 13 Nov 2003 10:42:41 +0100 (CET) Received: from relay.netbox.cz ([127.0.0.1]) by localhost (relay [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 12054-01-30 for ; Thu, 13 Nov 2003 10:42:40 +0100 (CET) Received: from daemon (r71s11p19.home.nbox.cz [213.211.37.145]) by relay.netbox.cz (Postfix) with SMTP id F069137BA3 for ; Thu, 13 Nov 2003 10:42:39 +0100 (CET) Date: Thu, 13 Nov 2003 10:42:39 +0100 From: unix_list To: freebsd-security@freebsd.org Message-Id: <20031113104239.453f9019.unix_list@post.cz> In-Reply-To: <001601c3a9c9$5732e620$640aa8c0@nisse> References: <001601c3a9c9$5732e620$640aa8c0@nisse> X-Mailer: Sylpheed version 0.9.6 (GTK+ 1.2.10; i386-portbld-freebsd5.1) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Virus-Scanned: by amavisd-new-20030616-p5 (Debian) at netbox.cz Subject: Re: SSHD password authentication issue in 4.9-RELEASE and 5.1-RELEASE X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 13 Nov 2003 09:42:44 -0000 Hello, try disable PAM auth. ChallengeResponseAuthentication no -=Snoopy=- On Thu, 13 Nov 2003 10:34:31 +0100 "Nils von Greyerz" wrote: > Wonder if you guys could help me out...have a security problem with sshd > wich enables a user to do a password login tough the sshd_config states > PasswordAuthentication no > My config works fine in both gentoo and openbsd 3.3 but users are able to > login with tunneled clear text passwords in both 4.9 and 5.1 > Im lost.tried everything I can think of. > Here is the config: > > ------------------------------------------------------------------- > # $OpenBSD: sshd_config,v 1.59 2002/09/25 11:17:16 markus Exp $ > # $FreeBSD: src/crypto/openssh/sshd_config,v 1.32 2003/04/23 17:10:53 > des > Exp $ > # This is the sshd server system-wide configuration file. See > # sshd_config(5) for more information. > # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin > # The strategy used for options in the default sshd_config shipped with > # OpenSSH is to specify options with their default value where > # possible, but leave them commented. Uncommented options change a > # default value. > # Note that some of FreeBSD's defaults differ from OpenBSD's, and > # FreeBSD has a few additional options. > > #VersionAddendum FreeBSD-20030423 > > Port 22 > Protocol 2 > #ListenAddress 0.0.0.0 > #ListenAddress :: > > # HostKey for protocol version 1 > #HostKey /etc/ssh/ssh_host_key > # HostKeys for protocol version 2 > #HostKey /etc/ssh/ssh_host_dsa_key > > # Lifetime and size of ephemeral version 1 server key > #KeyRegenerationInterval 3600 > #ServerKeyBits 768 > > # Logging > #obsoletes QuietMode and FascistLogging > SyslogFacility AUTH > LogLevel INFO > > # Authentication: > > #LoginGraceTime 120 > PermitRootLogin no > StrictModes yes > > RSAAuthentication yes > PubkeyAuthentication yes > AuthorizedKeysFile .ssh/authorized_keys > > # rhosts authentication should not be used > #RhostsAuthentication no > # Don't read the user's ~/.rhosts and ~/.shosts files > IgnoreRhosts yes > # For this to work you will also need host keys in /etc/ssh/ssh_known_hosts > #RhostsRSAAuthentication no > # similar for protocol version 2 > #HostbasedAuthentication no > # Change to yes if you don't trust ~/.ssh/known_hosts for > # RhostsRSAAuthentication and HostbasedAuthentication > #IgnoreUserKnownHosts no > > # To disable tunneled clear text passwords, change to no here! > PasswordAuthentication no > PermitEmptyPasswords no > > # Change to no to disable PAM authentication > #ChallengeResponseAuthentication yes > > # Kerberos options > #KerberosAuthentication no > #KerberosOrLocalPasswd yes > #KerberosTicketCleanup yes > > #AFSTokenPassing no > > # Kerberos TGT Passing only works with the AFS kaserver > #KerberosTgtPassing no > > #X11Forwarding yes > #X11DisplayOffset 10 > #X11UseLocalhost yes > #PrintMotd yes > #PrintLastLog yes > #KeepAlive yes > #UseLogin no > #UsePrivilegeSeparation yes > #PermitUserEnvironment no > #Compression yes > > #MaxStartups 10 > # no default banner path > #Banner /some/path > #VerifyReverseMapping no > > # override default of no subsystems > Subsystem sftp /usr/libexec/sftp-server > ------------------------------------------------------------------- > > Everything else is default.I'm not starting SSHD with any additional > parameters than the defaults in /etc/defaults/rc.conf and just added > sshd_enable="YES" in /etc/rc.conf > I have of course restarted sshd after changes in the config. > Nothing is patched or updated in any ways, its from the stock install from > the ISOs. > Any ideas? > Regards /Nils > > Nils von Greyerz > Senior Network Consultant, > Juniper Certified Internet Associate: JNCIA-M #0090 > > _______________________________________________ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org" >