*** This bug is a security vulnerability ***
Private security bug reported:
While specifying an IP address to ssh-keyscan works properly, piping its
output to ssh-vulnkey does not:
$ ssh-keyscan -t rsa vmfeisty386 | ssh-vulnkey -
# vmfeisty386 SSH-2.0-OpenSSH_4.3p2 Debian-8ubuntu1.2
COMPROMISED: 2048 e0:94:56:44:bd:a2:2d:ce:0b:69:0a:b3:af:63:f3:f9 -
$ ssh-keyscan -t rsa 192.168.122.244 | ssh-vulnkey -
# 192.168.122.244 SSH-2.0-OpenSSH_4.3p2 Debian-8ubuntu1.2
$ host vmfeisty386
vmfeisty386.XXX has address 192.168.122.244
$ host 192.168.122.244
244.122.168.192.in-addr.arpa domain name pointer vmfeisty386.XXX
** Affects: openssh (Ubuntu)
Importance: Medium
Status: New
** Changed in: openssh (Ubuntu)
Importance: Undecided => Medium
--
ssh-vulnkey doesn't scan keys when specifying IP address with ssh-keyscan
https://bugs.launchpad.net/bugs/230497
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.
--
Ubuntu-server-bugs mailing list
[email protected]
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs