bugzilla-daemon at bugzilla.mindrot.org
2008-May-26 14:02 UTC
[Bug 1471] New: sshd can block if authorized_keys is a named pipe
https://bugzilla.mindrot.org/show_bug.cgi?id=1471 Summary: sshd can block if authorized_keys is a named pipe Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: All OS/Version: Linux Status: NEW Severity: minor Priority: P2 Component: sshd AssignedTo: bitbucket at mindrot.org ReportedBy: cjwatson at debian.org Solar Designer noticed indirectly that sshd child processes (and probably other parts of OpenSSH) can block if ~/.ssh/authorized_keys is a named pipe with an open writer. Perhaps it would be worth checking S_ISREG before trying to open a key file? (I'm hoping nobody is actually relying on this as a feature. I can't imagine how you'd do so reliably.) -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2008-Jun-13 03:19 UTC
[Bug 1471] sshd can block if authorized_keys is a named pipe
https://bugzilla.mindrot.org/show_bug.cgi?id=1471 --- Comment #1 from Damien Miller <djm at mindrot.org> 2008-06-13 13:19:30 --- Created an attachment (id=1517) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1517) open authorized_keys and shosts in non-blocking mode, check st_mode .shosts is another file that the server can be made to open. This diff should fix it and authorized_keys. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2008-Jun-13 04:41 UTC
[Bug 1471] sshd can block if authorized_keys is a named pipe
https://bugzilla.mindrot.org/show_bug.cgi?id=1471 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |FIXED CC| |djm at mindrot.org Blocks| |1452 --- Comment #2 from Damien Miller <djm at mindrot.org> 2008-06-13 14:41:29 --- that patch has a small bug (don't use it), but a similar one has been submitted and will be in openssh-5.1. Thanks! -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2008-Jun-16 07:38 UTC
[Bug 1471] sshd can block if authorized_keys is a named pipe
https://bugzilla.mindrot.org/show_bug.cgi?id=1471 Solar Designer <solar at openwall.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |solar at openwall.com --- Comment #3 from Solar Designer <solar at openwall.com> 2008-06-16 17:38:34 --- I'd add O_NOCTTY. On some systems it is a no-op, but on others it makes a difference. Also, a maximum size check both before and during reads could make sense, but it is not clear what the limit should be (1 MB maybe? or would anyone want to put thousands of keys on an account?) I suppose O_NOFOLLOW would break some existing setups and it does not buy all that much (at least not when arbitrary hard links are allowed by the kernel and there are interesting things on the same device). -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2008-Jul-22 02:24 UTC
[Bug 1471] sshd can block if authorized_keys is a named pipe
https://bugzilla.mindrot.org/show_bug.cgi?id=1471 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #4 from Damien Miller <djm at mindrot.org> 2008-07-22 12:24:45 --- Mass update RESOLVED->CLOSED after release of openssh-5.1 -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
Maybe Matching Threads
- [Bug 1469] New: Should sshd detect and reject vulnerable SSH keys (re: Debian DSA-1571 and DSA-1576)
- OpenSSH-3.6.1p2 PAM Problems
- @cert-authority for hostbased auth - sans shosts?
- SSHD password authentication issue in 4.9-RELEASE and 5.1-RELEASE
- When the 1.0 release is planed?