Displaying 20 results from an estimated 4000 matches similar to: "deprecation of UsePrivilegeSeparation breaks container use cases"
2017 Mar 27
2
Is support being removed for ordinary users to run sshd?
Hello Darren,
Could you comment on this issue being raised by myself and
Corinna Vinschen?
This will create big problems for me.
I'm not clear if this is a conscious decision supported by solid
reasons or if it is just collateral damage.
Thank you for all you work!
Jack DoDDs
-------- Original Message --------
Date: Mon, 27 Mar 2017 16:31:03 +0200
Subject: Re: Announce: OpenSSH 7.5
2002 Apr 29
9
[Bug 230] UsePrivilegeSeparation turns off Banner.
http://bugzilla.mindrot.org/show_bug.cgi?id=230
------- Additional Comments From krh at lemniscate.net 2002-04-29 10:53 -------
I should add that I also have PrintMotd off so that the motd is
printed only once, and yes, I am connecting with the SSH 2 protocol.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Aug 12
1
PermitRootLogin=forced-commands-only does not work with UsePrivilegeSeparation=yes
Using openssh-3.4p1 on Linux I noticed that PermitRootLogin=forced-commands-only
does not work if UsePrivilegeSeparation is enabled; but it does work if privsep
is disabled.
Here are excerpts of debug from the server.
-----------UsePrivilegeSeparation DISABLED-------
...
Found matching DSA key: 56:9d:72:b0:4f:67:2e:ed:06:e7:41:03:e2:86:52:0d^M
debug1: restore_uid^M
debug1: ssh_dss_verify:
2002 Jun 21
5
[Bug 283] UsePrivilegeSeparation fails on AIX, Couldn't set usrinfo:
http://bugzilla.mindrot.org/show_bug.cgi?id=283
------- Additional Comments From janfrode at parallab.uib.no 2002-06-22 09:00 -------
hmm, I lost part of a sentence there.. I meant to say that commenting out:
if (usrinfo(SETUINFO, cp, i) == -1)
fatal("Couldn't set usrinfo: %s", strerror(errno));
from openbsd-compat/port-aix.c makes sshd function with
2002 May 28
5
Problems with UsePrivilegeSeparation (was: port fwd as user != root?
I just upgraded to OpenSSH3.2.3p1 as it seemed that
UsePrivilegeSeparation yes
might help with my problem (connections forwarded
are owned by root instead of the user I logged in as
on the server), but instead, sshd barfs on receiving
a connection. Without UsePrivilegeSeparation
the server works fine.
# strace -o /tmp/sshd.str sshd -d
debug1: sshd version OpenSSH_3.2.3p1
debug1: private host
2011 Oct 20
2
[Bug 1945] New: Only 1 of the 2 krb cache files is removed on closing the ssh connection with UsePrivilegeSeparation=yes
https://bugzilla.mindrot.org/show_bug.cgi?id=1945
Bug #: 1945
Summary: Only 1 of the 2 krb cache files is removed on closing
the ssh connection with UsePrivilegeSeparation=yes
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: HP-UX
Status: NEW
2017 Mar 14
5
Call for testing: OpenSSH 7.5p1
Hi,
OpenSSH 7.5p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at
2002 Jun 24
4
README.privsep
Hi,
This is included in the release now; any feedback?
Privilege separation, or privsep, is method in OpenSSH by which
operations that require root privilege are performed by a separate
privileged monitor process. Its purpose is to prevent privilege
escalation by containing corruption to an unprivileged process.
More information is available at:
2002 Jun 26
5
[PATCH] improved chroot handling
There are a couple of niggles with the sandboxing of the unprivileged
child in the privsep code: the empty directory causes namespace pollution,
and it requires care to ensure that it is set up properly and remains set
up properly. The patch below (against the portable OpenSSH, although the
patch against the OpenBSD version is very similar) replaces the fixed
empty directory with one that is
2005 Apr 21
1
[Bug 339] 3.4p1: UsePrivilegeSeparation breaks key fingerprint logging
http://bugzilla.mindrot.org/show_bug.cgi?id=339
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
------- Additional Comments From djm at mindrot.org 2005-04-21 15:31
2005 Sep 07
4
[Bug 1080] 4.1p1 to 4.2p1 broke UsePrivilegeSeparation on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=1080
Summary: 4.1p1 to 4.2p1 broke UsePrivilegeSeparation on HPUX
Product: Portable OpenSSH
Version: 4.2p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: security
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
2004 Jun 01
2
issue with SE/Linux - sshd not giving access to /dev/pts/[n]
hi there,
i have an issue on my newly created Debian/SELinux/unstable system.
i have pam 0.77 se1 installed
ssh 3.8.1p1-4 (OpenSSH)
and libselinux1 1.12-1.
i can log in as root, fine.
but i cannot log in as an ordinary user, and i had to grant
special permission to the _user_ process (NOT sshd or pam
before a setuid and exec is carried out) to access
/dev/pts/0.
in other
2002 Jun 23
13
[Bug 285] 3.3p1 on Linux 2.2.x doesn't accept connections
http://bugzilla.mindrot.org/show_bug.cgi?id=285
------- Additional Comments From dtucker at zip.com.au 2002-06-23 20:31 -------
Disabling PrivSep (add "UsePrivilegeSeparation no" to sshd_config) should get it
working on 2.2 kernels.
3.3p1 defaults PrivSep to on. Previous releases (that supported it) defaulted to
off.
------- You are receiving this mail because: -------
You
2002 Jul 15
10
Patch: Solaris packages don't create privsep user or group
Hi.
Solaris packages created by buildpkg.sh don't create privsep user or
group and sshd won't start until they are created (or privsep is
disabled):
## Executing postinstall script.
starting /usr/local/sbin/sshd... Privilege separation user sshd does not
exist
/etc/init.d/opensshd: Error 255 starting /usr/local/sbin/sshd...
bailing.
The attached patch (against -cvs) ports the relevant
2006 Jan 19
5
Only one chance to enter a new password?
Hello there,
We are using OpenSSH_3.9p1, OpenSSL 0.9.7d 17 Mar 2004 on various
Solaris boxes with PAM and an LDAP server back end.
Recently we have added a requirement for users to have complex
passwords. The problem is, if a user's password has expired, when they
log in they are prompted for a new password (good) but if they enter a
non-complex new password the session is closed rather than
2002 Jun 26
2
Problem with openssh on linux 2.0.34 mips
Hi
I tried to compile openssh 3.3p1 on a linux 2.0.34 mips system. First I
was not able to compile it at all, but then I added the following line
to monitor_fdpass.c
#define SCM_RIGHTS 0x01
Then it compiled fine, but I am not able to log in. After having entered
the password I get the following message in the logfile:
Jun 25 20:25:46 raq2 sshd[16129]: fatal: mm_receive_fd: expected type 1
got
2004 Sep 01
2
openssh-3.9p1: no pam_close_session() invocation
Hello,
I would like to point to this problem again as I have not seen a reply to
my original posting:
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=106458208520320&w=2
and the problem still exists in version 3.9p1.
After closing a ssh-session the pam_close_session() function is not
invoked. Enabling PrivilegeSeparation (UsePrivilegeSeparation yes) does not
help.
Could someone
2009 Sep 21
2
How to generate additional debug messages for sshd gssapi failures?
I'm trying to troubleshoot gssapi_with_mic authentication with OpenSSH
5.2p1 on FreeBSD 8.0.
If I run sshd with maximum debug "sshd -ddd" the most detail I get is:
GSSAPI MIC check failed
That comes from line 282 in auth2-gss.c
279 if (!GSS_ERROR(PRIVSEP(ssh_gssapi_checkmic(gssctxt, &gssbuf, &mic))))
280 authenticated =
2012 Aug 21
5
Call for testing: OpenSSH 6.1
Hi,
OpenSSH 6.1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains a
couple of new features and bug fixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available
2009 May 23
2
Memory leak caused by forwarded GSSAPI credential store
Hi guys
While debugging a GSSAPI memory allocation problem not related to OpenSSH, I found a memory leak in OpenSSH when storing forwarded GSSAPI credentials resulting in a growing process segment for each connection that uses GSSAPI credentials forwarding. What happens is the following:
In the privileged parent, we are calling ssh_gssapi_storecreds() which itself calls