[Bug 2352] New: also look for host-prefixed ar, to avoid using ie /usr/bin/ar when cross compiling

2015-02-19 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2352

Bug ID: 2352
   Summary: also look for host-prefixed ar, to avoid using ie
/usr/bin/ar when cross compiling
   Product: Portable OpenSSH
   Version: -current
  Hardware: Other
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P5
 Component: Build system
  Assignee: unassigned-b...@mindrot.org
  Reporter: astr...@lysator.liu.se

It seems like this patch:

http://lists.mindrot.org/pipermail/openssh-unix-dev/2013-September/031646.html

...was never accepted. If there are no good reasons to object it,
please apply.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2319] [PATCH REVIEW] U2F authentication

2015-02-19 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2319

Matt Johnston m...@ucc.asn.au changed:

   What|Removed |Added

 CC||m...@ucc.asn.au

--- Comment #10 from Matt Johnston m...@ucc.asn.au ---
(I'm looking at
https://datatracker.ietf.org/doc/draft-josefsson-secsh-u2f/?include_text=1
)

I think it would be worth using the 32 byte challenge to bind the
authentication to the current SSH session. Otherwise an attacker
running a SSH server can get their clients to sign a response for
another server if they know an entry from authorized_keys (because of
origin/appid of ssh://localhost)?

Maybe something like

challenge = chal_sess_hash | 16_random_bytes

where chal_sess_hash is a 16 byte truncated sha256 hash of
  stringsession identifier
  byte  SSH_MSG_USERAUTH_REQUEST
  stringuser name
  stringservice name
  stringu2f

The client MUST check that the first 16 bytes is correct - that's
slightly more complexity (decoding JSON) though the code's already
there for the server. 

That would also improve resistance to MITM even if the server hostkey
is compromised/ignored. Existing SSH public key authentication does
that by including the sessionid in the hash being signed (rfc4253 page
9).

For integration with SSH I think a constant origin/appid string is
probably useful - people expect to be able to connect to a host at
varying IPs/hostnames. Copy/pasting from one host's authorized_keys to
another is also common practise.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2355] general protection / segfaults when PermitOpen=none

2015-02-19 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2355

Christoph Anton Mitterer cales...@scientia.net changed:

   What|Removed |Added

   See Also||http://bugs.debian.org/7788
   ||07

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2353] New: options allowed for Match blocks missing form documentation

2015-02-19 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2353

Bug ID: 2353
   Summary: options allowed for Match blocks missing form
documentation
   Product: Portable OpenSSH
   Version: 6.7p1
  Hardware: All
OS: All
Status: NEW
  Severity: minor
  Priority: P5
 Component: Documentation
  Assignee: unassigned-b...@mindrot.org
  Reporter: cales...@scientia.net

Hi.

AFAIU such options which are allowed for Match blocks are marked with
SSHCFG_ALL in servconf.c.

Going through the list, a number of the is apparently allowed but
missing from sshd_config(5):

AllowStreamLocalForwarding
IPQoS
RevokedKeys
StreamLocalBindMask
StreamLocalBindUnlink
TrustedUserCAKeys

Could you please add these?

I'd have written a patch, but since all my pull requests are apparently
generally ignored it's probably just a waste of time :(


Cheers,
Chris.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2354] New: please document that PermitRootLogin really checks for uid=0

2015-02-19 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2354

Bug ID: 2354
   Summary: please document that PermitRootLogin really checks for
uid=0
   Product: Portable OpenSSH
   Version: 6.7p1
  Hardware: All
OS: All
Status: NEW
  Severity: enhancement
  Priority: P5
 Component: Documentation
  Assignee: unassigned-b...@mindrot.org
  Reporter: cales...@scientia.net

Hey.

I just found out that PermitRootLogin has the feature of really
checking for UID=0 and not for the username root

I.e. it makes sense to have something like:
Match user toor
   PermitRootLogin no

Which would allow root=0 to log in, but not e.g. the toor=0 user to
log in, if it is an alternative root user.

:) nice feature! (bad name, though ^^)

Cheers,
Chris.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs