Date: Thu, 31 Jan 2002 13:40:02 -0800 (PST) From: "Jin Guojun[ITG]" <j_guojun@lbl.gov> To: freebsd-bugs@FreeBSD.org Subject: Re: bin/34502: ssh can crash the 4.5 system Message-ID: <200201312140.g0VLe2V98483@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
The following reply was made to PR bin/34502; it has been noted by GNATS. From: "Jin Guojun[ITG]" <j_guojun@lbl.gov> To: parv <parv_@yahoo.com> Cc: FreeBSD-gnats-submit@freebsd.org Subject: Re: bin/34502: ssh can crash the 4.5 system Date: Thu, 31 Jan 2002 13:31:50 -0800 parv wrote: > > in message <200201312023.g0VKNex00336@eubie.lbl.gov>, > wrote Jin.Guojun@eubie.lbl.gov thusly... > > > > System: FreeBSD 4.5-RELEASE FreeBSD 4.5-RELEASE #0: Wed Jan 30 09:39:25 PST 2002 > > > > OpenSSH_2.9 FreeBSD localisations 20011202 > > > > >Description: > > Problem 1: > > ssh localhost > > cause system panic. A local user can use it to crash all 4.5 systems. > > i just tried "ssh localhost" w/o any problems on 4.5-release > 2002.01.24.19.00.47 utc. # ssh -v localhost OpenSSH_2.9 FreeBSD localisations 20011202, SSH protocols 1.5/2.0, OpenSSL 0x0090601f debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: restore_uid debug1: ssh_connect: getuid 0 geteuid 0 anon 1 debug1: Connecting to localhost [::1] port 22. debug1: temporarily_use_uid: 0/0 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 0/0 (e=0) ---- crashing Read from remote host peer.lbl.gov: Connection reset by peer Connection to peer.lbl.gov closed. This time I tried as a root who has no ssh set up at all. So, I do not think this is related to .ssh/ set up. I have tried on three machines: Dual 200Mhz Pentium 500Mhz Celeron 700MHz AMD > > > Problem 2: > > > > does not work for protocol 2. After rename authorized_keys to > > x.authorized_keys (i.e., disable protocol 1), then ssh will ask > > password instead of passphase: > > isn't that the way ssh supposed to work: in absence of keys ask the > password? The authorized_keys2 is there (not missing). Below is the manual page: ... SSH protocol version 2 When a user connects using the protocol version 2 different authentica- tion methods are available: At first, the client attempts to authenticate using the public key method. If this method fails password authentica- tion is tried. The public key method is similar to RSA authentication described in the previous section except that the DSA algorithm is used instead of the patented RSA algorithm. The client uses his private DSA key $HOME/.ssh/id_dsa to sign the session identifier and sends the result to the server. The server checks whether the matching public key is listed in $HOME/.ssh/authorized_keys2 and grants access if both the key is found and the signature is correct. The session identifier is derived from a shared Diffie-Hellman value and is only known to the client and the serv- er. If public key authentication fails or is not available a password can be sent encrypted to the remote host for proving the user's identity. This protocol 2 implementation does not yet support Kerberos or OPIE authenti- cation. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200201312140.g0VLe2V98483>