bugzilla-daemon at bugzilla.mindrot.org
2010-Aug-13 19:42 UTC
[Bug 1806] New: SSH Client - Militant Identity File Permission Potentially Increases Security Risk
https://bugzilla.mindrot.org/show_bug.cgi?id=1806
Summary: SSH Client - Militant Identity File Permission
Potentially Increases Security Risk
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: JakubSadowski at GMail.com
The SSH client (in all versions, on all UNIX-like platforms) that I've
ever used refuses to connect using a key file if it's permissions are
"too open" with no option or bypass provided to the user.
This can potentially undermine the client's own goal of protecting keys
under some circumstances such as the one posted here:
http://forums.debian.net/viewtopic.php?t=31129
My circumstance is similar in that I have an ecrypted USB key with
underlying VFAT filesystem which is used for securely storing all my
encryption keys. It is sometimes used under a guest account on systems
with a default install to which I do not have root access. The refusal
of the client to connect using this secured file forces me to copy it
to a home or temp directory and change the permissions.
Aside from being inconvenient it also introduces the risk that either
the user forgets to delete the key from the temporary location or that
the key is scraped from the hard drive at some future date (such as
after the machine it was used on is retired). This also defeats the
purpose of keeping the key on a USB stick which is to keep it OFF of
local hard drives.
Some recommendations:
1) An override for the user. Inform them, but allow them to "take it
under advisement", so to speak.
2) An ssh + ssh_config option to control this behaviour.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2010-Aug-13 19:43 UTC
[Bug 1806] SSH Client - Excessively Militant Identity File Permission Checking Potentially Increases Security Risk
https://bugzilla.mindrot.org/show_bug.cgi?id=1806
Jakub Sadowski <JakubSadowski at GMail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|SSH Client - Militant |SSH Client - Excessively
|Identity File Permission |Militant Identity File
|Potentially Increases |Permission Checking
|Security Risk |Potentially Increases
| |Security Risk
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2010-Aug-13 19:43 UTC
[Bug 1806] SSH Client - Excessively Militant Identity File Permission Checking Potentially Increases Risk of Key Compromise
https://bugzilla.mindrot.org/show_bug.cgi?id=1806
Jakub Sadowski <JakubSadowski at GMail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|SSH Client - Excessively |SSH Client - Excessively
|Militant Identity File |Militant Identity File
|Permission Checking |Permission Checking
|Potentially Increases |Potentially Increases Risk
|Security Risk |of Key Compromise
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2011-Oct-04 14:05 UTC
[Bug 1806] SSH Client - Excessively Militant Identity File Permission Checking Potentially Increases Risk of Key Compromise
https://bugzilla.mindrot.org/show_bug.cgi?id=1806
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Status|NEW |RESOLVED
Resolution| |WONTFIX
--- Comment #1 from Damien Miller <djm at mindrot.org> 2011-10-05 01:05:15
EST ---
Solution: don't store keys on filesystems that lack permissions support
Workaround (as of 5.9): ssh-add - < /path/to/key
We don't intend to relax the permissions requirement
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
Maybe Matching Threads
- [Bug 1806] SSH Client - Excessively Militant Identity File Permission Checking Potentially Increases Risk of Key Compromise
- [cfe-dev] FYI: Landing the initial draft for an LLVM Code of Conduct
- [cfe-dev] FYI: Landing the initial draft for an LLVM Code of Conduct
- RE: Mediacast1 yp dir update
- Name Change