[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] Re: OpenSSH key blacklisting
From: Mike Frysinger <vapier () gentoo ! org>
Date: 2008-05-31 8:33:22
Message-ID: g1r2gi$96g$1 () ger ! gmane ! org
[Download RAW message or body]
On Sat, 17 May 2008 01:50:00 +0400, Solar Designer wrote:
> Thanks for the "bug" reference. FWIW, the shell script in this comment
> is vulnerable itself, in more than one way:
>
> http://bugs.gentoo.org/show_bug.cgi?id=221759#c9
>
> For example, it lets a user have any other user's or root's
> authorized_keys removed, by replacing .ssh with a symlink to someone
> else's .ssh directory. It's just bad practice to access users' files as
> root (or as another user); this is difficult to do safely.
>
> Also, it misses authorized_keys2.
while the issues you raise are certainly valid in the general case, i
wrote it for use on a constrained system -- users are not allowed login
nor are they allowed to control any files directly. it's a gforge
system, so all keys are managed via a web interface and the ssh backend
is only for committing to svn/cvs/git repositories. so in this setup,
none of the concerns you raise need to be accounted for. i leave it up
to others to extend it for their own safe use ;).
-mike
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic