Bug#366541: openssh-server: [security] use /bin/nologin instead of /bin/false

2006-07-14 Thread Colin Watson
tags 366541 pending
thanks

On Tue, May 09, 2006 at 06:30:00PM +0300, Jari Aalto wrote:
> Package: openssh-server
> Version: 1:4.2p1-8
> Severity: normal
> Tags: security
> 
> The /etc/passwd contains entry:
> 
>   sshd:x:101:65534::/var/run/sshd:/bin/false
> 
> SUGGESTION
> 
> The new login package includes /bin/nologin wich would be more secure, 
> because it leaves trace to syslog after login attemps.

(/usr/sbin/nologin, after an extensive discussion.)

Thanks for the suggestion; I've made this change in my local openssh
tree for my next upload.

Cheers,

-- 
Colin Watson   [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#366541: openssh-server: [security] use /bin/nologin instead of /bin/false

2006-05-12 Thread Jari Aalto
| On Wed, May 10, 2006 at 07:46:20AM +0300, Jari Aalto wrote:
| > | severity 366541 wishlist
| > | thanks
| > | 
| > | On Tue, May 09, 2006 at 06:30:00PM +0300, Jari Aalto wrote:
| > | > Package: openssh-server
| > | > Version: 1:4.2p1-8
| > | > Severity: normal
| > | > Tags: security
| > | > 
| > | > The /etc/passwd contains entry:
| > | > 
| > | >   sshd:x:101:65534::/var/run/sshd:/bin/false
| > | > 
| > | > SUGGESTION
| > | > 
| > | > The new login package includes /bin/nologin wich would be more secure, 
| > | > because it leaves trace to syslog after login attemps.
| > | I think it has the same functional effect:
| > |   May  9 12:46:31 andromeda nologin: Attempted login by pryzbyj on 
/dev/pts/2
| > |   May  9 12:47:34 andromeda login[6063]: FAILED LOGIN (1) on `tty1' FOR 
`sshd', Authentication failure
| > |   May  9 12:49:31 andromeda login[25987]: FAILED LOGIN (1) on `tty1' FOR 
`sshd', Authentication failure
| > 
| > Not at all. The nologin records the account that ws used to "crack in".
| I was unclear.  The first of those lines was when I ran
| /usr/sbin/nologin (note that the path is different from what you
| suggest) from the shell of an authenticated account.
| 
| The other 2 lines are the same, since the shell is never even run; I
| guess that this is a request for logging, in the accidental case that
| the shell *is* run?

Correct. The improved logging makes the difference, which I consider
"more secure", because this information can be gathered by security
auditing tools. The switch to /bin/nologin is easyly done.

Jari



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#366541: openssh-server: [security] use /bin/nologin instead of /bin/false

2006-05-10 Thread Justin Pryzby
On Wed, May 10, 2006 at 07:46:20AM +0300, Jari Aalto wrote:
> | severity 366541 wishlist
> | thanks
> | 
> | On Tue, May 09, 2006 at 06:30:00PM +0300, Jari Aalto wrote:
> | > Package: openssh-server
> | > Version: 1:4.2p1-8
> | > Severity: normal
> | > Tags: security
> | > 
> | > The /etc/passwd contains entry:
> | > 
> | >   sshd:x:101:65534::/var/run/sshd:/bin/false
> | > 
> | > SUGGESTION
> | > 
> | > The new login package includes /bin/nologin wich would be more secure, 
> | > because it leaves trace to syslog after login attemps.
> | I think it has the same functional effect:
> |   May  9 12:46:31 andromeda nologin: Attempted login by pryzbyj on 
> /dev/pts/2
> |   May  9 12:47:34 andromeda login[6063]: FAILED LOGIN (1) on `tty1' FOR 
> `sshd', Authentication failure
> |   May  9 12:49:31 andromeda login[25987]: FAILED LOGIN (1) on `tty1' FOR 
> `sshd', Authentication failure
> 
> Not at all. The nologin records the account that ws used to "crack in".
I was unclear.  The first of those lines was when I ran
/usr/sbin/nologin (note that the path is different from what you
suggest) from the shell of an authenticated account.

The other 2 lines are the same, since the shell is never even run; I
guess that this is a request for logging, in the accidental case that
the shell *is* run?

Justin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#366541: openssh-server: [security] use /bin/nologin instead of /bin/false

2006-05-09 Thread Jari Aalto
| severity 366541 wishlist
| thanks
| 
| On Tue, May 09, 2006 at 06:30:00PM +0300, Jari Aalto wrote:
| > Package: openssh-server
| > Version: 1:4.2p1-8
| > Severity: normal
| > Tags: security
| > 
| > The /etc/passwd contains entry:
| > 
| >   sshd:x:101:65534::/var/run/sshd:/bin/false
| > 
| > SUGGESTION
| > 
| > The new login package includes /bin/nologin wich would be more secure, 
| > because it leaves trace to syslog after login attemps.
| I think it has the same functional effect:
|   May  9 12:46:31 andromeda nologin: Attempted login by pryzbyj on /dev/pts/2
|   May  9 12:47:34 andromeda login[6063]: FAILED LOGIN (1) on `tty1' FOR 
`sshd', Authentication failure
|   May  9 12:49:31 andromeda login[25987]: FAILED LOGIN (1) on `tty1' FOR 
`sshd', Authentication failure

Not at all. The nologin records the account that ws used to "crack in".
 
| Also, nologin.5 reads:
| 
|It is intended as a replacement shell field for accounts that
|have been disabled
| 
| which isn't the case for 'sshd', which should never be enabled in the
| first place; it is just a special use for running the ssh parent
| daemon process.

This is an error in nologin's manual page and needs inprovement.
I know, because I was the one that ported the nologin from bsd to
Linux and submitted it to "login" package maintainers.

The /bin/nologin is straight alternative to /bin/false

Jari


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#366541: openssh-server: [security] use /bin/nologin instead of /bin/false

2006-05-09 Thread Justin Pryzby
severity 366541 wishlist
thanks

On Tue, May 09, 2006 at 06:30:00PM +0300, Jari Aalto wrote:
> Package: openssh-server
> Version: 1:4.2p1-8
> Severity: normal
> Tags: security
> 
> The /etc/passwd contains entry:
> 
>   sshd:x:101:65534::/var/run/sshd:/bin/false
> 
> SUGGESTION
> 
> The new login package includes /bin/nologin wich would be more secure, 
> because it leaves trace to syslog after login attemps.
I think it has the same functional effect:
  May  9 12:46:31 andromeda nologin: Attempted login by pryzbyj on /dev/pts/2
  May  9 12:47:34 andromeda login[6063]: FAILED LOGIN (1) on `tty1' FOR `sshd', 
Authentication failure
  May  9 12:49:31 andromeda login[25987]: FAILED LOGIN (1) on `tty1' FOR 
`sshd', Authentication failure

Also, nologin.5 reads:

   It is intended as a replacement shell field for accounts that
   have been disabled

which isn't the case for 'sshd', which should never be enabled in the
first place; it is just a special use for running the ssh parent
daemon process.

Justin


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#366541: openssh-server: [security] use /bin/nologin instead of /bin/false

2006-05-09 Thread Jari Aalto
Package: openssh-server
Version: 1:4.2p1-8
Severity: normal
Tags: security

The /etc/passwd contains entry:

  sshd:x:101:65534::/var/run/sshd:/bin/false

SUGGESTION

The new login package includes /bin/nologin wich would be more secure, 
because it leaves trace to syslog after login attemps.

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.16-1-686
Locale: LANG=C, LC_CTYPE=C (charmap=ISO-8859-1) (ignored: LC_ALL set to en_US)

Versions of packages openssh-server depends on:
ii  adduser   3.87   Add and remove users and groups
ii  debconf [debc 1.5.0  Debian configuration management sy
ii  dpkg  1.13.19package maintenance system for Deb
ii  libc6 2.3.6-7GNU C Library: Shared libraries
ii  libcomerr21.38+1.39-WIP-2006.04.09-1 common error description library
ii  libkrb53  1.4.3-7MIT Kerberos runtime libraries
ii  libpam-module 0.79-3.1   Pluggable Authentication Modules f
ii  libpam-runtim 0.79-3.1   Runtime support for the PAM librar
ii  libpam0g  0.79-3.1   Pluggable Authentication Modules l
ii  libselinux1   1.30-1 SELinux shared libraries
ii  libssl0.9.8   0.9.8a-8   SSL shared libraries
ii  libwrap0  7.6.dbs-9  Wietse Venema's TCP wrappers libra
ii  openssh-clien 1:4.2p1-8  Secure shell client, an rlogin/rsh
ii  zlib1g1:1.2.3-11 compression library - runtime

openssh-server recommends no packages.

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]