followup to Bernd Eckenfels:
Quote:> Hello,
> Theo de Raadt is alerting the Vendors that ISS will publish an remote
> exploit for OpenSSH and that 3.3p1 is able to limit the scope of the exploit
> due to privsep.
PrivSep has apparently nothing to do with this whatsoever.
OpenSSH is vulnerable only if one of these two conditions meet:
BSD Auththentication is compiled in and enabled (probably only when
running on BSD Systems)
or
SKEY Authentication is compiled in and enabled.
So the Fix would be to eigther disable these two options or to upgrade
to OpenSSH 3.4, which has just been released on http://www.openssh.org/
Quote:> Some vendors like Debian have already reacted and new versions of openssh
> available, unfortunatelly the new openssh veriosn does not work pretty wel
> with kerberos, pam or linux 2.0/2.2
Theo de Raadt's "fix" is horribly broken on everything that is not
OpenBSD.
Ignore Theo's rants about other Systems and read the ISS advisory on
their Website. PrivSep is broken in Portable relase of OpenSSH. It
breaks PAM, Compression and other thing. Some People have even locked
themselve out of remote systems following Theo's advice.
Disable ChallengeResponseAuthentication in sshd-config when running
non-BSD Unix systems (Linux, Solaris, HP/UX...) and be fine.
Upgrade to OpenSSH 3.4. (especially when running any *BSD)
BTW: Theo de Raadt's advice only prevents instant-root-shell, but
still leaves attackers with a remote shell on the server, with the
ability to run further attacks from there. (i.e. against 127.0.0.1
or other hosts).
Juergen
--
Juergen P. Meier - "This World is about to be Destroyed!"
This is it. Nothing more to come. There is no more text. It's the
end