On Mon, 24 Jun 2002, Rick Moen wrote:

> The problem is that (1) de Raadt says enabling privilege separation
> "may break some ssh functionality".  de Raadt mentions PAM as a possible
> problem area, and some have interpreted this as meaning that priv sep
> breaks PAM.  _But_ understand that de Raadt is just generically
> anti-PAM:  Nothing he's said has claimed specific breakage in that area.
> (2) Since priv sep is very new code, it might not work as designed.  (3)
> The implication of all this is that the bad guys _may_ already have a
> not-publicly-known exploit and been using it for some time.
>
> I've been running 3.3p on my Debian-testing (3.0 = woody) systems -- and
> with priv sep enabled -- since this morning, with no problems so far.
> Note that Debian 2.2 (I think?) and later has used PAM.

Just a sidebar here: from the mandrakesoft camp, Vincent Danen has indeed
encountered some problems with PAM and the latest openssh.

Quoting:

==================================================
I don't think it will.  So far it seems to work really good except
there is a problem with the PAM support... currently if you have an
expired password, it will just punt you without giving you an
opportunity to change your password.  This is a known bug in 3.3, but
no good workaround/solution exists yet.
==================================================

So there seems to be at least one issue with PAM.


> 4.  Add this new line to /etc/ssh/sshd_config:
>
>     UsePrivilegeSeparation yes

And as i said, when running on kernel 2.2.x

        Compression no

(simply ommitting the compression setting is not good enough as the
default is compression enabled)



_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]

To subscribe to the Linux Newbies' List: send "subscribe" in the body to 
[EMAIL PROTECTED]

Reply via email to