bugzilla-daemon at bugzilla.mindrot.org
2010-Aug-13 19:42 UTC
[Bug 1806] New: SSH Client - Militant Identity File Permission Potentially Increases Security Risk
https://bugzilla.mindrot.org/show_bug.cgi?id=1806 Summary: SSH Client - Militant Identity File Permission Potentially Increases Security Risk Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: unassigned-bugs at mindrot.org ReportedBy: JakubSadowski at GMail.com The SSH client (in all versions, on all UNIX-like platforms) that I've ever used refuses to connect using a key file if it's permissions are "too open" with no option or bypass provided to the user. This can potentially undermine the client's own goal of protecting keys under some circumstances such as the one posted here: http://forums.debian.net/viewtopic.php?t=31129 My circumstance is similar in that I have an ecrypted USB key with underlying VFAT filesystem which is used for securely storing all my encryption keys. It is sometimes used under a guest account on systems with a default install to which I do not have root access. The refusal of the client to connect using this secured file forces me to copy it to a home or temp directory and change the permissions. Aside from being inconvenient it also introduces the risk that either the user forgets to delete the key from the temporary location or that the key is scraped from the hard drive at some future date (such as after the machine it was used on is retired). This also defeats the purpose of keeping the key on a USB stick which is to keep it OFF of local hard drives. Some recommendations: 1) An override for the user. Inform them, but allow them to "take it under advisement", so to speak. 2) An ssh + ssh_config option to control this behaviour. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2010-Aug-13 19:43 UTC
[Bug 1806] SSH Client - Excessively Militant Identity File Permission Checking Potentially Increases Security Risk
https://bugzilla.mindrot.org/show_bug.cgi?id=1806 Jakub Sadowski <JakubSadowski at GMail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|SSH Client - Militant |SSH Client - Excessively |Identity File Permission |Militant Identity File |Potentially Increases |Permission Checking |Security Risk |Potentially Increases | |Security Risk -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2010-Aug-13 19:43 UTC
[Bug 1806] SSH Client - Excessively Militant Identity File Permission Checking Potentially Increases Risk of Key Compromise
https://bugzilla.mindrot.org/show_bug.cgi?id=1806 Jakub Sadowski <JakubSadowski at GMail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|SSH Client - Excessively |SSH Client - Excessively |Militant Identity File |Militant Identity File |Permission Checking |Permission Checking |Potentially Increases |Potentially Increases Risk |Security Risk |of Key Compromise -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2011-Oct-04 14:05 UTC
[Bug 1806] SSH Client - Excessively Militant Identity File Permission Checking Potentially Increases Risk of Key Compromise
https://bugzilla.mindrot.org/show_bug.cgi?id=1806 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |djm at mindrot.org Status|NEW |RESOLVED Resolution| |WONTFIX --- Comment #1 from Damien Miller <djm at mindrot.org> 2011-10-05 01:05:15 EST --- Solution: don't store keys on filesystems that lack permissions support Workaround (as of 5.9): ssh-add - < /path/to/key We don't intend to relax the permissions requirement -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
Reasonably Related Threads
- [Bug 1806] SSH Client - Excessively Militant Identity File Permission Checking Potentially Increases Risk of Key Compromise
- [cfe-dev] FYI: Landing the initial draft for an LLVM Code of Conduct
- [cfe-dev] FYI: Landing the initial draft for an LLVM Code of Conduct
- RE: Mediacast1 yp dir update
- Name Change