Package: ssh Version: 1:3.8.1p1-8 Severity: grave hello,
after i tested it on two differnent boxes, one with up-to-date sarge, and one with up-to-date sid, i'm quite confident, that the PermitRootLogin option at sshd_config doesn't understand the without-password value. after i changed PermitRootLogin from 'yes' to 'without-password', i was still able to login from a remote box without any key, and with typing the root password, not the key passphrase. i tag this bug as grave, as this is a dangerous security hole. i don't know how long this appears, but many users may use the feature without any apprehension that this may open the ssh root account for more people. bye jonas -- System Information: Debian Release: 3.1 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Kernel: Linux 2.6.8-i386 Locale: LANG=en_GB.UTF-8, [EMAIL PROTECTED] Versions of packages ssh depends on: ii adduser 3.59 Add and remove users and groups ii debconf 1.4.36 Debian configuration management sy ii dpkg 1.10.23 Package maintenance system for Deb ii libc6 2.3.2.ds1-16 GNU C Library: Shared libraries an ii libpam-modules 0.76-22 Pluggable Authentication Modules f ii libpam-runtime 0.76-22 Runtime support for the PAM librar ii libpam0g 0.76-22 Pluggable Authentication Modules l ii libssl0.9.7 0.9.7d-5 SSL shared libraries ii libwrap0 7.6.dbs-6 Wietse Venema's TCP wrappers libra ii zlib1g 1:1.2.1.2-1 compression library - runtime -- debconf information: ssh/insecure_rshd: ssh/user_environment_tell: * ssh/forward_warning: ssh/insecure_telnetd: ssh/new_config: true * ssh/use_old_init_script: true * ssh/SUID_client: true ssh/ssh2_keys_merged: * ssh/protocol2_only: true ssh/encrypted_host_key_but_no_keygen: * ssh/run_sshd: true

