From owner-freebsd-security Tue Jun 25 8:48:51 2002 Delivered-To: freebsd-security@freebsd.org Received: from hyperreal.org (taz3.hyperreal.org [209.133.83.22]) by hub.freebsd.org (Postfix) with SMTP id 3CF7937B403 for ; Tue, 25 Jun 2002 08:48:49 -0700 (PDT) Received: (qmail 93585 invoked from network); 25 Jun 2002 15:48:43 -0000 Received: from localhost.hyperreal.org (HELO yez.hyperreal.org) (127.0.0.1) by localhost.hyperreal.org with SMTP; 25 Jun 2002 15:48:43 -0000 Received: (qmail 3252 invoked by uid 1000); 25 Jun 2002 15:50:44 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 25 Jun 2002 15:50:44 -0000 Date: Tue, 25 Jun 2002 08:50:44 -0700 (PDT) From: Brian Behlendorf To: Niels Provos Cc: security@freebsd.org Subject: Re: UseLogin and openssh-portable priv separation In-Reply-To: <20020625105312.GH15772@citi.citi.umich.edu> Message-ID: <20020625084414.K310-100000@yez.hyperreal.org> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Spam-Rating: localhost.hyperreal.org 1.6.2 0/1000/N Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Tue, 25 Jun 2002, Niels Provos wrote: > If you do UseLogin, that means that you will loose privilege > separation after authentication. The Pre-authentication phase is > still privilege separated even with UseLogin enabled. Right, I got that from the man page, but was still slightly unclear: does using UseLogin remove the security that prevents the to-be-released exploit from being exploitable? Sounds like it does not remove that security, *unless* the attack came from someone who successfully authenticated, who could then get root? Brian To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message