- markus@cvs.openbsd.org 2000/12/12 14:45:21
[sshd.c] source port < 1024 is no longer required for rhosts-rsa since it adds no additional security. - markus@cvs.openbsd.org 2000/12/12 16:11:49 [ssh.1 ssh.c] rhosts-rsa is no longer automagically disabled if ssh is not privileged. UsePrivilegedPort=no disables rhosts-rsa _only_ for old servers. these changes should not change the visible default behaviour of the ssh client.
This commit is contained in:
parent
fa72ddac73
commit
fcec7f82bb
|
@ -15,6 +15,15 @@
|
||||||
- deraadt@cvs.openbsd.org 2000/12/13 06:36:05
|
- deraadt@cvs.openbsd.org 2000/12/13 06:36:05
|
||||||
[pty.c]
|
[pty.c]
|
||||||
KNF
|
KNF
|
||||||
|
- markus@cvs.openbsd.org 2000/12/12 14:45:21
|
||||||
|
[sshd.c]
|
||||||
|
source port < 1024 is no longer required for rhosts-rsa since it
|
||||||
|
adds no additional security.
|
||||||
|
- markus@cvs.openbsd.org 2000/12/12 16:11:49
|
||||||
|
[ssh.1 ssh.c]
|
||||||
|
rhosts-rsa is no longer automagically disabled if ssh is not privileged.
|
||||||
|
UsePrivilegedPort=no disables rhosts-rsa _only_ for old servers.
|
||||||
|
these changes should not change the visible default behaviour of the ssh client.
|
||||||
|
|
||||||
20001213
|
20001213
|
||||||
- (djm) Make sure we reset the SIGPIPE disposition after we fork. Report
|
- (djm) Make sure we reset the SIGPIPE disposition after we fork. Report
|
||||||
|
|
8
ssh.1
8
ssh.1
|
@ -34,7 +34,7 @@
|
||||||
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
||||||
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
.\"
|
.\"
|
||||||
.\" $OpenBSD: ssh.1,v 1.71 2000/12/07 04:24:59 djm Exp $
|
.\" $OpenBSD: ssh.1,v 1.72 2000/12/12 23:11:48 markus Exp $
|
||||||
.Dd September 25, 1999
|
.Dd September 25, 1999
|
||||||
.Dt SSH 1
|
.Dt SSH 1
|
||||||
.Os
|
.Os
|
||||||
|
@ -464,7 +464,8 @@ not permit connections from privileged ports.
|
||||||
Note that this option turns off
|
Note that this option turns off
|
||||||
.Cm RhostsAuthentication
|
.Cm RhostsAuthentication
|
||||||
and
|
and
|
||||||
.Cm RhostsRSAAuthentication .
|
.Cm RhostsRSAAuthentication
|
||||||
|
for older servers.
|
||||||
.It Fl q
|
.It Fl q
|
||||||
Quiet mode.
|
Quiet mode.
|
||||||
Causes all warning and diagnostic messages to be suppressed.
|
Causes all warning and diagnostic messages to be suppressed.
|
||||||
|
@ -948,7 +949,8 @@ Note that setting this option to
|
||||||
turns off
|
turns off
|
||||||
.Cm RhostsAuthentication
|
.Cm RhostsAuthentication
|
||||||
and
|
and
|
||||||
.Cm RhostsRSAAuthentication .
|
.Cm RhostsRSAAuthentication
|
||||||
|
for older servers.
|
||||||
.It Cm User
|
.It Cm User
|
||||||
Specifies the user to log in as.
|
Specifies the user to log in as.
|
||||||
This can be useful if you have a different user name on different machines.
|
This can be useful if you have a different user name on different machines.
|
||||||
|
|
21
ssh.c
21
ssh.c
|
@ -39,7 +39,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: ssh.c,v 1.75 2000/11/30 07:02:35 markus Exp $");
|
RCSID("$OpenBSD: ssh.c,v 1.77 2000/12/12 23:11:48 markus Exp $");
|
||||||
|
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#include <openssl/dsa.h>
|
#include <openssl/dsa.h>
|
||||||
|
@ -575,11 +575,10 @@ main(int ac, char **av)
|
||||||
if (!options.use_privileged_port) {
|
if (!options.use_privileged_port) {
|
||||||
#else
|
#else
|
||||||
if (original_effective_uid != 0 || !options.use_privileged_port) {
|
if (original_effective_uid != 0 || !options.use_privileged_port) {
|
||||||
debug("Rhosts Authentication methods disabled, "
|
|
||||||
"originating port will not be trusted.");
|
|
||||||
#endif
|
#endif
|
||||||
|
debug("Rhosts Authentication disabled, "
|
||||||
|
"originating port will not be trusted.");
|
||||||
options.rhosts_authentication = 0;
|
options.rhosts_authentication = 0;
|
||||||
options.rhosts_rsa_authentication = 0;
|
|
||||||
}
|
}
|
||||||
/*
|
/*
|
||||||
* If using rsh has been selected, exec it now (without trying
|
* If using rsh has been selected, exec it now (without trying
|
||||||
|
@ -602,17 +601,13 @@ main(int ac, char **av)
|
||||||
/* Restore our superuser privileges. */
|
/* Restore our superuser privileges. */
|
||||||
restore_uid();
|
restore_uid();
|
||||||
|
|
||||||
/*
|
/* Open a connection to the remote host. */
|
||||||
* Open a connection to the remote host. This needs root privileges
|
|
||||||
* if rhosts_{rsa_}authentication is enabled.
|
|
||||||
*/
|
|
||||||
|
|
||||||
ok = ssh_connect(host, &hostaddr, options.port,
|
ok = ssh_connect(host, &hostaddr, options.port,
|
||||||
options.connection_attempts,
|
options.connection_attempts,
|
||||||
!options.rhosts_authentication &&
|
original_effective_uid != 0 || !options.use_privileged_port,
|
||||||
!options.rhosts_rsa_authentication,
|
original_real_uid,
|
||||||
original_real_uid,
|
options.proxy_command);
|
||||||
options.proxy_command);
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* If we successfully made the connection, load the host private key
|
* If we successfully made the connection, load the host private key
|
||||||
|
|
9
sshd.c
9
sshd.c
|
@ -40,7 +40,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: sshd.c,v 1.136 2000/12/05 16:47:28 todd Exp $");
|
RCSID("$OpenBSD: sshd.c,v 1.137 2000/12/12 21:45:21 markus Exp $");
|
||||||
|
|
||||||
#include "xmalloc.h"
|
#include "xmalloc.h"
|
||||||
#include "rsa.h"
|
#include "rsa.h"
|
||||||
|
@ -1119,18 +1119,17 @@ main(int ac, char **av)
|
||||||
|
|
||||||
sshd_exchange_identification(sock_in, sock_out);
|
sshd_exchange_identification(sock_in, sock_out);
|
||||||
/*
|
/*
|
||||||
* Check that the connection comes from a privileged port. Rhosts-
|
* Check that the connection comes from a privileged port.
|
||||||
* and Rhosts-RSA-Authentication only make sense from priviledged
|
* Rhosts-Authentication only makes sense from priviledged
|
||||||
* programs. Of course, if the intruder has root access on his local
|
* programs. Of course, if the intruder has root access on his local
|
||||||
* machine, he can connect from any port. So do not use these
|
* machine, he can connect from any port. So do not use these
|
||||||
* authentication methods from machines that you do not trust.
|
* authentication methods from machines that you do not trust.
|
||||||
*/
|
*/
|
||||||
if (remote_port >= IPPORT_RESERVED ||
|
if (remote_port >= IPPORT_RESERVED ||
|
||||||
remote_port < IPPORT_RESERVED / 2) {
|
remote_port < IPPORT_RESERVED / 2) {
|
||||||
debug("Rhosts Authentication methods disabled, "
|
debug("Rhosts Authentication disabled, "
|
||||||
"originating port not trusted.");
|
"originating port not trusted.");
|
||||||
options.rhosts_authentication = 0;
|
options.rhosts_authentication = 0;
|
||||||
options.rhosts_rsa_authentication = 0;
|
|
||||||
}
|
}
|
||||||
#ifdef KRB4
|
#ifdef KRB4
|
||||||
if (!packet_connection_is_ipv4() &&
|
if (!packet_connection_is_ipv4() &&
|
||||||
|
|
Loading…
Reference in New Issue